Computer Network Defense (CND) and Security Operations in the Cloud
Examining the Intersection of Cloud Computing and Cyber Security, with emphasis on Data Fusion and Visualization for Dynamic Cyber Defense
On Tuesday, February 2 Admiral Dennis Blair testified that “in the dynamic of cyberspace, the technology balance right now favors malicious actors rather than legal actors, and is likely to continue that way for quite some time.”
"Sensitive information is stolen daily from government and private-sector networks and intelligence officials often find persistent, unauthorized, and sometimes unattributable presences on exploited network."
“We cannot be certain that our cyberspace infrastructure will remain available and reliable during a time of crisis."
The purpose of this conference is to continue and expand the dialogue begun at two earlier AFEI events:
- a half-day seminar on Government Cloud Computing which identified the need for brutal standardization and the opportunity for enhanced security in cloud computing environments; and a
- Cyber Security Data Fusion and Visualization Roundtable for cyber operations personnel from 11 Federal Departments and Agencies that began a cross-agency dialogue among Federal Cyber Operations Centers on cyber intelligence data visualization and fusion.
The objective of this conference is to bring into focus the intersection of security and cloud computing. Questions to be addressed during the day include:
- Can a cloud environment be designed to be more secure than current network environments;
- How can organizations become more predictive and less reactive in CND;
- How and to what extent analysis can be automated;
- How to integrate disparate data;
- How to link cyber events to business and mission;
- What sources of intelligence can be brought to bear; and
- What extant obstacles to information sharing for shared situational awareness need to be overcome?
Sponsored by:
National Security Cyberspace Institute
Georgia Tech Research Institute
Syngress
Agenda
8:30 AM Opening and Welcome
Conference Chair - Mark Fedak, Senior Director, Cyber Security Solutions, SGIS
Keynote Presentations
|
|
Government Keynote: Mr. Steve Shirley, Executive Director, Department of Defense Cyber Crime Center |
|
|
|
|
|
Industry Keynote: Thomas Fuhrman, Senior Vice President, Booz Allen Hamilton specializing in cyber and information assurance support for the U.S. Department of Defense
|
10:00 AM - Networking Break
10:30 AM - Panel: Secure Clouds for Dynamic Defense
Will clouds provide the ability to support executive, analytic, compliance and information assurance requirements? |
Moderator: Steven P. Bucci, Cyber Security Lead, IBM Federal Panel |
- Patrick Stingley, CTO, Bureau of Land Management
- David S. Linthicum, noted author of “Cloud Computing and SOA Convergence”
- John McCumber, Chief Strategist, Symantec Corporation
|
12:00 PM - Lunch
1:15 PM - Panel: Visualization of Cyber Operations Information
Making data accessible and understandable by users and analysts |
Moderator: Mark Fedak, Senior Director, SGIS Panel |
- COL Steve McPherson, USAF, Senior Strategy Advisor Cyber-Command, US Coast Guard
- Thomas Lam, OASD(NII)/DoD CIO Lead for Enterprise Ops & Cyber Security
- Daniel Blum, Senior VP & Principal Analyst, Burton Group
- Carrie Gates, VP and Senior Research Staff, CA
|
2:45 PM - Networking Break
3:15 PM - Panel: Fusing Data and Analytics
Better security postures and rapid response to computer security threats, vulnerabilities, and incidents. |
Moderator: Mark Fedak, Senior Director, SGIS Panel |
- Gary Elliott, NSA 4011 Information Assurance, Chief Information Assurance Officer
- Freddie Beaver, Senior Managing Consultant-Cybersecurity, IBM and DoD FISMA Lead
- Lee Aber, Technical Director, ICF International
|
Location
Holiday Inn
625 First Street
Alexandria, VA 22314
(703) 548-6300
www.hioldtownalexandriahotel.com
Sponsorship
We would like to thank our Partners
SGIS
National Security Cyberspace Institute
Georgia Tech Research Insitute
Syngress
For Attendees
Attendance is limited to maximize your opportunity for interaction and networking with speakers and fellow attendees.
Why Attend
Understand common data fusion and information visualization needs across agencies
Build on the lessons learned by other government cyber operations centers and agencies
Foster ongoing dialogue among the cyber operations centers of the federal government
How you will benefit:
-
explore with experts how CND and security operations can be performed within the cloud to ensure customer services are secure
-
learn about secure cloud approaches and dynamic defense concepts
-
understand what Federal agencies need for secure network operations
-
engage in debate on security operations for cloud computing providers
-
interact with Government leaders on linking cyber events within the cloud to business and mission impacts
Who Should Attend
Information Assurance Executives
Cyber Security Specialists
CTOs
CIOs
IA Architects
Chief Information Security Officers
NetWork Operations
NetWork Defense Professionals
Information Warfare Specialists
Click here for the video and Power point presentations.
When you click on a video to view it, you will be prompted for first name, last name, and email address. The email address is for tagging purposes. If you ask a question in the discussion pane and the subject matter expert replies, you will receive an email alerting you of the response.