Computer Network Defense (CND) and Security Operations in the Cloud
Examining the Intersection of Cloud Computing and Cyber Security, with emphasis on Data Fusion and Visualization for Dynamic Cyber Defense
How you will benefit:
-
explore with experts how CND and security operations can be performed within the cloud to ensure customer services are secure
-
learn about secure cloud approaches and dynamic defense concepts
-
understand what Federal agencies need for secure network operations
-
engage in debate on security operations for cloud computing providers
-
interact with Government leaders on linking cyber events within the cloud to business and mission impacts
The purpose of this conference is to continue and expand the dialogue begun at two earlier AFEI events:
- a half-day seminar on Government Cloud Computing which identified the need for brutal standardization and the opportunity for enhanced security in cloud computing environments; and a
- Cyber Security Data Fusion and Visualization Roundtable for cyber operations personnel from 11 Federal Departments and Agencies that began a cross-agency dialogue among Federal Cyber Operations Centers on cyber intelligence data visualization and fusion.
The objective of this conference is to bring into focus the intersection of security and cloud computing. Questions to be addressed during the day include:
- Can a cloud environment be designed to be more secure than current network environments;
- How can organizations become more predictive and less reactive in CND;
- How and to what extent analysis can be automated;
- How to integrate disparate data;
- How to link cyber events to business and mission;
- What sources of intelligence can be brought to bear; and
- What extant obstacles to information sharing for shared situational awareness need to be overcome?
Sponsored by:
National Cyber Security Institute
Georgia Tech Research Institute
Agenda
8:30 AM Opening and Welcome
Conference Chair - Mark Fedak, Risk Defense
Keynote Presentations
|
|
Government Keynote: Mr. Steve Shirley, Executive Director, Department of Defense Cyber Crime Center (Invited) |
|
|
|
|
|
Industry Keynote: Thomas Fuhrman, Senior Vice President, Booz Allen Hamilton specializing in cyber and information assurance support for the U.S. Department of Defense
|
10:00 AM - Networking Break
10:30 AM - Panel: Secure Clouds for Dynamic Defense
Will clouds provide the ability to support executive, analytic, compliance and information assurance requirements? |
Moderator: John McLaughlin, Deputy CTO - Security, IBM Federal |
Panel |
|
- Patrick Stingley, CTO, Bureau of Land Management
- David S. Linthicum, author of “Cloud Computing and SOA Convergence”
- J P Morgenthal, Senior Principal Architect, QinetiQ North America
|
12:00 PM - Lunch
1:15 PM - Panel: Visualization of Cyber Operations Information
Making data accessible and understandable by users and analysts |
Moderator: Mark Fedak, RiskDefense |
Panel |
|
- COL Steve McPherson, USAF, Senior Strategy Advisor Cyber-Command, US Coast Guard
Thomas Lam, OASD(NII)/DoD CIO Lead for Enterprise Ops & Cyber Security
- Daniel Blum, Senior VP & Principal Analyst, Burton Group
|
2:45 PM - Networking Break
3:15 PM - Panel: Fusing Data and Analytics
Better security postures and rapid response to computer security threats, vulnerabilities, and incidents. |
Moderator: Mark Fedak, RiskDefense |
Panel |
|
- Bill Eber, Director, Defense Cyber Crime Institute
- Kevin Bingham, ASD(NII)/DASD(CIIA) (Invited)
- LtCol Joe Wolfkiel, USAF, Director, CND R&T PMO, NSA
- Gary Elliott, NSA 4011 Information Assurance, Chief Information Assurance Officer
|
Location
Holiday Inn
625 First Street
Alexandria, VA 22314
(703) 548-6300
www.hioldtownalexandriahotel.com
Lodging
No block of rooms has been secured for this event. Please contact the Holiday Inn directly at (703) 548-6300 for rates and availability.
Registration
Event Number 0A02 |
Early (before 01/11/10) |
Regular (01/11/10 - 02/08/10) |
On-site (after 02/08/10) |
Government* |
$150 |
$195 |
$220 |
AFEI Members |
$195 |
$250 |
$295 |
AFEI Non- Member |
$225 |
$295 |
$320 |
Registration Policy
Please do not fax or mail any registrations after February 8, 2010. After this date, please bring a registration form with you to the conference to register onsite. Registrations will not be taken over the phone. Payment must be made at the time of registration.
Cancellation Policy
Cancellations received before February 4, 2010 will receive a full refund. Cancellations received between February 4 and February 9, 2010 will receive a refund minus a $75 cancellation fee. No refunds will be given for cancellations received after February 9, 2010. Substitutions are welcome in lieu of cancellations. Substitutions and cancellations must be made in writing to [email protected].
Sponsorship
We would like to thank our Partners
National Cyber Security Institute
Georgia Tech Research Insitute
Limited Promotional Partnerships are available for $1,500.
Benefits include:
- Logo, sponsor info on the conference event web site
- Company description in the conference program
- Company name on filler slides at conference
- Podium recognition
- 1 complimentary conference registration
If you are interested in a promotional partnership, please contact Betsy Lauer at [email protected] or 703-247-9473.
For Attendees
Attendance is limited to maximize your opportunity for interaction and networking with speakers and fellow attendees.
Why Attend
Understand common data fusion and information visualization needs across agencies
Build on the lessons learned by other government cyber operations centers and agencies
Foster ongoing dialogue among the cyber operations centers of the federal government
Who Should Attend
Information Assurance Executives
Cyber Security Specialists
CTOs
CIOs
IA Architects
Chief Information Security Officers
NetWork Operations
NetWork Defense Professionals
Information Warfare Specialists