Skip Navigation Links
ADAPT on Agile: Focus on DevOps Open Meeting
ADAPT on Agile Breakfast Briefing
Coalition Information Sharing
Battlespace Awareness and C2
Agile for Government Summit Fall 2013
Agile in Defense Spring Workshop 2013
DI2E Plugfest 2013
Agile in Defense Fall Workshop 2012
Supply Chain Innovations
Agile in Defense Spring Meeting 2012
3rd Annual SOA & Semantic Technology Symposium
Supply Chain Cyber Risk Forum
DoD Agile Development
ADAPT Open Meeting
Agile and EVM in DoD
Agile in Government
Agile In Government
Army Cyber Innovation
Army Cyber Innovation Challenge II
Army Cyberspace Industry and Innovation Day
Battlespace Awareness
Bending the Cost Curve: PlugFest PLUS
Coalition Information Sharing II
CyberWest
Background
NIST Framework
Agenda May 13
Agenda May 14 AM
Agenda May 14 PM
Armaments Demo May 15
ACTRA Registration
CYBERWEST: the Southwest Cybersecurity Summit
DI2E Plugfest 2014
DI2E Plugfest 2015
FITARA Implementation Symposium
ODG Workshop: Operational Efficiency
Outcome Driven Government Forum
Outcome Driven Government Workshop
Outcome Driven Government Workshop 2
Webinar 2: DoD Adoption of NIEM
Webinar: DoD Adoption of NIEM

 Agenda May 14 AM 

Back to CyberWest web site

May 14, 2014

GENERAL SESSION - INDUSTRY SPEAKS

8:00 AM Welcome

 

Cyber for Intelligence Systems

Cameron Chehreh
Chief Technology Officer Intelligence Solutions Division, General Dynamics Information Technology

Cameron is responsible for leading the solution architecture and enterprise engineering efforts in support of establishing advanced customer centric solutions for the enterprise. He is also a member of the executive management team responsible for corporate development, leadership council, merger and acquisition strategy, and vision creation.

8:35 AM

Computer Network Defense and the Cyber Kill Chain

Mike Gordon, CISSP, IAM/IEM
Director, Intelligence & Operations
Lockheed Martin, Corporate Information Security

The LM CIRT has developed the Cyber Kill Chain, which is gaining wide recognition and adoption as well as the Framework for Intelligence Driven Defense which measures the maturity on any CND operation as Ad Hoc, Spectators, Consumers, Producers and beyond providing insight on organization on how to mature their CND capabilities.

9:10 AM

Managing Cyber Risk from Multiple Angles

Greg Deiter
Vice-President, Information Services & Information Management, The Boeing Company

Greg vice president and leader of the Information Services and Information Management Initiative at Boeing.  He leads the enterprise-wide effort to provide cyber-security solutions that safeguard Boeing information systems and intellectual property as well as drive cyber-security into the e-enabled commercial airplane and defense and space system environments – from resilient designs - to safe and secure operations - to supply chain cyber risk management.

9:45 AM

Threat Central –Breakthroughs in Threat Intelligence Sharing

Tomas Sander, Ph.D.
Senior Researcher, HP Labs

Tomas is a researcher in the Systems Security Lab, focused on working to create a trustworthy information system environment in the face of challenges such as the growth of organized cybercrime and the rapid adoption of social networking tools and cloud-based services.

10:10 AM Networking Break

10:30 AM

Transition to Practice: Making R&D Payoff

Douglas Maughan, Ph.D.
Division Director, Cyber Security Division, Homeland Security Advanced Research Projects Agency

Dr. Douglas Maughan is a Branch Chief in Homeland Security Advanced Research Projects Agency (HSARPA) within the Science and Technology (S&T) Directorate of DHS. Doug is directing the Cyber Security Research and Development activities at HSARPA. Prior to his appointment at DHS, Doug was a Program Manager in the Advanced Technology Office (ATO) of the Defense Advanced Research Projects Agency (DARPA) in Arlington, Virginia. His research interests and related programs were in the areas of networking and information assurance. Prior to his appointment at DARPA, Doug worked for the National Security Agency (NSA) as a senior computer scientist and led several research teams performing network security research.

11:15 AM

 

Closing Keynote

Strategic Security Programs: The Time Is Right!

Richard BejtlichRichard Bejtlich
Chief Security Strategist at FireEye, Inc.

Richard is Chief Security Strategist at FireEye, and was Mandiant's Chief Security Officer when FireEye acquired Mandiant in 2013. He is a nonresident senior fellow at the Brookings Institution, a board member at the Open Information Security Foundation, and an advisor to Threat Stack. He was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. His fourth book is The Practice of Network Security Monitoring. He also writes for his blog (taosecurity.blogspot.com) and Twitter (@taosecurity), and teaches for Black Hat.

12:00 PM   Lunch with the Joint Armaments Symposium

ERAU

College of Security and Intelligence

CAAL

the ERAU Worldwide Center for Aviation and Aerospace Leadership

and in conjunction with

NDIA

the NDIA Cyber Division

ACTRA

Infragard