Cyber SeCurity for Defense, intelligence and Homeland Security

6
— STRATEGIES, PLANS, OPPORTUNITIES AND CHALLENGES — Over 30 Experts from Joint Staff, DHS, DISA, Army Cyber Command, ANG, NSA, Army G-6, Air Force AF2, USMC, JMETC, US-Cert, Cyber Consequences Unit, USCYBERCOM, Boeing, Northrop Grumman, Cisco, Oracle, Intel, IBM, Cubic, Symantec, CSC, SAIC, Deloitte, Harris, Norman, ICF, Fusion-io, CLA, and Teradata will be presenting: Latest Government & DoD Policies, Strategies, and Imperatives Understanding Current & Emerging Threats to OSD and Service Systems and Networks Newest Developments in Interagency and International Cooperation and Information Sharing Cutting-Edge Multi Level Enterprise Cybersecurity Technologies National Vision for Critical Infrastructure Protection, Including Homeland Security Best Practices for Intelligence Sharing and Maximizing Cyber Protection Capabilities CYBER SECURITY for Defense, Intelligence and Homeland Security Announcing a Comprehensive & Critical Symposium on… Washington, DC May 8-10, 2013 www.TechnologyTraining.com Symposium Management by: Technology Training Corporation Special Keynote Presentation from: Major General Mark S. Bowman, USA Director, Command, Control, Communications and Computers, Joint Staff, J6 Co-Sponsor Military and Government Attendees Now FREE!

description

Cyber SeCurity for Defense, intelligence and Homeland Security

Transcript of Cyber SeCurity for Defense, intelligence and Homeland Security

Page 1: Cyber SeCurity for Defense, intelligence  and Homeland Security

— STRATEGIES, PLANS, OPPORTUNITIES AND CHALLENGES —

Over 30 Experts from Joint Staff, DHS, DISA, Army Cyber Command, ANG, NSA, Army G-6, Air Force AF2, USMC, JMETC, US-Cert, Cyber Consequences Unit, USCYBERCOM, Boeing, Northrop Grumman, Cisco, Oracle, Intel, IBM, Cubic, Symantec, CSC, SAIC, Deloitte, Harris, Norman, ICF, Fusion-io, CLA, and Teradata will be presenting:■ Latest Government & DoD Policies, Strategies, and Imperatives ■ Understanding Current & Emerging Threats to OSD and Service

Systems and Networks■ Newest Developments in Interagency and International Cooperation

and Information Sharing■ Cutting-Edge Multi Level Enterprise Cybersecurity Technologies ■ National Vision for Critical Infrastructure Protection, Including

Homeland Security■ Best Practices for Intelligence Sharing and Maximizing Cyber

Protection Capabilities

Cyber SeCurityfor Defense, intelligence and Homeland Security

Announcing a Comprehensive & Critical Symposium on…

Washington, DCMay 8-10, 2013

www.TechnologyTraining.comSymposium Management by:

Technology Training Corporation

Special Keynote Presentation from: Major General Mark S. Bowman, USA Director, Command, Control, Communications and Computers, Joint Staff, J6

Co-Sponsor

Military and Government

Attendees Now FREE!

Page 2: Cyber SeCurity for Defense, intelligence  and Homeland Security

Cyber Security for Defense, Intelligence, and Homeland Security As the growing number of cyber attacks on DoD and Government networks estimated at 400 million annually, continues to increase at an alarming pace, adversaries, (homegrown and foreign), are acquiring increasingly sophisticated tools with which to attempt to penetrate our systems. The President has identified cyber security as a critical imperative for national security. Increasing dependence upon the internet, declining IT budgets, and new computing paradigms (cloud, open source, etc.) have exacerbated cyber security problems.

This fall, DoD also plans to release cybersecurity certification requirements for private utilities and industrial infrastructure that supports military operations. Ultimately, the Pentagon, DHS, NSA and other critical organizations would like to develop safeguards that can be applied to protecting private industrial operations, much like how FIPS encryption specifications now protect privately owned data. This exceptional symposium brings together the senior level military, government and industry experts who are defining the requirements and shaping the solutions in cyber security and computer network defense.

■ What are the latest latest OSD, Service and DHS strategies, plans, needs and initiatives?■ How is the US offensive cyber posture evolving? What are the challenges?■ What is the Way Forward for Interagency and Intra-DoD cooperation and information sharing?■ What are the emerging tools and techniques for continuous risk monitoring and management?■ What emerging challenges does security in cloud pose for DoD systems? What are the emerging solutions?

Our Distinguished Panel of Cyber Experts:Lieutenant General Mark S. Bowman, USA Director, Command, Control, Communications and Computers, (C4) Joint Staff, (J6)Mr. Emery Csulak Deputy Chief Information Security Officer, Department of Homeland Security Mr. Scott Borg Director, and Chief Economist, U.S. Cyber Consequences Unit Lieutenant General (ret) Peter Cuviello, USA Director, Networked Enabled Operational Support, Deloitte Consulting Services Brigadier General Frederick Henry, USA Chief of Staff, Defense Information Systems Agency (DISA)Mr. Antonio “T” Scurlock Senior Cybersecurity Strategist, DHS/DoD Joint Coordination Element Mr. Gary Blohm Director, Army Architecture Integration Center, CIO/G6Mr. Samuel Visner President, CSC Cyber Security Mr. Vergle Gipson Assistant Deputy Director, Fusion, Analysis & Mitigations, National Security AdministrationLTC Thomas Muehleisen, USA Chief Information Officer/G6 for the Washington Army National GuardMr. Chip Ferguson Deputy Director, Interoperability and Cyber Test Capability, JMETC, OSDMs. Ann Barron-DiCamillo Director, U.S. Computer Emergency Readiness Team (U.S.-Cert)Colonel Mary Henry, USA Chief Information Officer, Army National Guard, G-6Colonel James Taylor, USA Army National Guard, G-2Colonel Matthew Hurley, USAF Chief, ISR Doctrine and Policy Integration (AF/A2DD)Colonel Patrick L. Kerr, USA Deputy G3 Operations, Army Cyber Command/2nd ArmySenior Representative, USA US Cyber Command (USCYBERCOM)Mr. John Toomer Director, Intelligence, Information and Cyber Systems Government Operations, BoeingDr. Donald Robinson, Ph.D. Principal Cybersecurity Technologist, Northrop GrummanMr. Alfred Buckles Vice President, Defense & Maritime Solutions, SAIC/USSTRATCOMMr. Brian Hussey Director of Digital Forensics, Crucial Security, Harris CorporationMr. Ray Letteer, USMC Senior Information Assurance Official, Chief, Cybersecurity Division, HQMC C4Mr. Dan Chenok Executive Director, Center for the Business of Government, IBM Mr. Darin Andersen General Manager North America, Norman ASMr. Peter Bostrom Director, Public Sector, Oracle CorporationMr. Les McMonagle Principal Consultant & Managing Partner, TeradataColonel (ret) Cedric Leighton, USAF Founder & President, Cedric Leighton AssociatesMr. Dave Radtke Director, XD Products, Cubic CorporationMr. Gene Mezeivtch Vice President of Sales, Cubic CorporationMr. Christian Schrauder Chief Technology Officer, U.S. Federal, Fusion-ioMr. Kevin McDonald Technology Fellow, Senior Infrastructure & Cybersecurity and Cloud Strategist, ICF Intl. Mr. Patrick Gray Principal Security Strategist, Borderless Networks, CiscoMs. Gigi Schumm Vice President and General Manager, Public Sector, Symantec Mr. Steve Orrin Senior Security Architect and Principal Engineer, Intel Corporation

Page 3: Cyber SeCurity for Defense, intelligence  and Homeland Security

Cyber Securityfor Defense, Intelligence and Homeland Security

Washington, DC ● MAY 8-10, 2013

I. DoD/Services and DHS Challenges, Opportunities and Initiatives

“DHS Cyber Security Needs and Initiatives”MR. EMERY CSULAk, Deputy Chief Information Security Officer, Department of Homeland Security (DHS) (invited)

“Cyber Skills Gap, Where We Are, Where We Need to Be” BRIGADIER GENERAL FREDERICk HENRY, USA, Chief of Staff, Defense Information Systems Agency (DISA)

“Army Cyber Security Needs & Initiatives”COLONEL PATRICk L. kERR, US ARMY, Deputy G3 Operations, Army Cyber Command/2nd Army

“JMETC: Developing Cyber T&E Requirements and Infrastructure”MR. CHIP FERGUSON, Deputy Director, Interoperability and Cyber Test Capability, Test Resource Management Center and the Program Manager for TRMC’s Joint Mission Environment Test Capability (JMETC) Program

“USMC Cyber Security, Prepping the Battlefield”MR. RAY LETTEER, USMC, Senior Information Assurance Official, Chief, Cybersecurity Division (CY), Marine Corps Enterprise Network, Designated Accrediting Authority, (DAA), HQMC, Command, Control, Communications, Computers (C4) Department

“Integrating Army Networks for Improved Cyber Security”MR. GARY BLOHM, Director, Army Architecture Integration Center (AAIC), Headquarters, Department of the Army, Chief Information Office/G6

“Comprehensive National Cybersecurity Initiative Five (CNCI-5): Enhance Shared Situational Awareness”MR. ANTONIO T. SCURLOCk, Senior Cybersecurity Strategist, Department of Homeland Security/DoD Joint Coordination Element (JCE), Office of the Director of Cybersecurity Coordination, (DCC), DHS

“U.S-Cert: National Cyber Awareness Program Update”MS. ANN BARRON-DICAMILLO, Director, United States Computer Emergency Readiness Team (US-CERT), Department of Homeland Security, DHS

“Army Reserve National Guard Cybersecurity Capability-Always Ready, Always There”COLONEL MARY HENRY, USA, Chief Information Officer, Army National Guard, G-6 andCOLONEL JAMES TAYLOR, USA, Army National Guard, G-2

“USCYBERCOM Cyber Strategies and Imperatives”SENIOR REPRESENTATIVE, USA, U.S. Cyber Command, (Invited)

“Joint Staff Cyber Needs and Initiatives”LIEUTENANT GENERAL MARk S. BOWMAN, USA

Director Command, Control, Communications and Computers (C4), Chief Information Officer, Joint Staff, (J6/CIO)

MILITARY kEYNOTE PRESENTATION

Page 4: Cyber SeCurity for Defense, intelligence  and Homeland Security

“Cyber Defense within the National Cyber Incident Response Plan and Emergency Management Frameworks: A State Approach”LIEUTENANT COLONEL THOMAS MUEHLEISEN, USA, Chief Information Officer/G-6, Washington Army National Guard (tentative)

II. Assessing the Current and Emerging Threat Environment

“Cyber Risk Trends”MR. VERGLE GIPSON, Assistant Deputy Director, Fusion, Analysis and Mitigations (FAM), National Security Administration Central Security Services (NSA/CSS)

“National Security Conceptions of Cyber – Protection, Sovereignty, and National Power”MR. SAMUEL VISNER, President, CSC Cyber Security

“Confluence of Data Security Challenges” MR. PATRICk GRAY, Principal Security Strategist, Borderless Networks, Cisco

• The Cyber Threats Facing Us Today - The Who, Where and How • It is Paramount that We Understand Their Methodologies • Listen and Learn from One Who has Tracked these Entities for Over Two Decades

“Cybersecurity Strategies to Address Threats and Protect Privacy”MR. DAN CHENOk, Executive Director, Center for the Business of Government, IBM Global Business Solutions

• This Session will Focus on Strategies and Policies that can Help Government Work to Detect and Deter Cyber Threats and Vulnerabilities, Share Information About Mitigations, and Do So in a Way that is Protective of Private Information About Individuals and Businesses

III. Cyber Security, Cyber Intelligence and Information Sharing

“For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance and Reconnaissance”COLONEL MATTHEW HURLEY, USAF, Chief, ISR Doctrine and Policy Integration, AF/A2DD

“The Ultimate Stealth War: The Role of Logic Bombs and Triggers in Cyber Combat”MR. SCOTT BORG

Director, and Chief Economist, U.S. Cyber Consequences Unit• Critical Infrastructure Automation • Advanced Persistent Malware• Techniques for Hiding Malware • Triggering Strategies for Malware

SPECIAL kEYNOTE PRESENTATION

“A Military Offensive Cyber Security Plan – Needs & Challenges”MR. ALFRED BUCkLES

Vice President, Defense and Maritime Solutions Business Unit, SAIC, Account Manager, U.S. Strategic Command

“Need for an Offensive Component to a U.S. Cyber Strategy”COLONEL (ret) CEDRIC LEIGHTON, USAF

Founder & President, Cedric Leighton Associates

SPECIAL FOCUS: SHIFTING TO AN OFFENSIVE MILITARY CYBER SECURITY STRATEGY

Page 5: Cyber SeCurity for Defense, intelligence  and Homeland Security

“Cyber Security: Managing the Threat” MR. JOHN TOOMER, Director, Intelligence, Information and Cyber Systems Government, Operations, The Boeing Company

• USG – Industry Roles in Managing the Cyber Threat • Avoiding Onerous Legislation • Cyber Security in Our Products – Anti-Tamper, Mission Assurance, Secure Supply Chain

“The Next Level: Cloud Computing and Information Assurance”MR. kEVIN MCDONALD, Technology Fellow, Senior Infrastructure & Cybersecurity and Cloud Strategist, ICF International

“Multinational Cybersecurity Information Sharing”DR. DONALD ROBINSON, PH.D., Principal Cybersecurity Technologist, Northrop Grumman

“Protecting the Services: A Unified Cyber Defense Capability”MR. LES MCMONAGLE, Principal Consultant & Managing Partner, Teradata Information Security Center of Excellence (COE)

“Enhancing Speed-to-Intelligence”MR. CHRISTIAN SCHRAUDER, Chief Technology Officer, U.S. Federal, Fusion-io

• FLASH is Essential to Modern Datacenter Performance and Economy• FLASH Plays a Key Role in Real Time Monitoring for Cyber Security

IV. Strategies, Tools and Techniques for the Future Cyber Enterprise

“Building Trusted Clouds”MR. STEVE ORRIN, Senior Security Architect and Principal Engineer, Intel Corporation

• This Session Will Overview Challenges for Trust and Security in the Cloud • Describe Methods for Establishing and Assessing Trust and Compliance • Overview Some of the Ecosystem and Industry Initiatives for Deploying Trusted Private and Public Cloud Infrastructures

“Digital Forensic Analysis: Investigating a Point-of-Sale Server Attack”MR. BRIAN HUSSEY, Director of Digital Forensics, Crucial Security Inc., Harris Corporation

“Using a Cross Domain Guard to Enable One Way Print and One Way Email to Support the Growing Demand for High Stream Video”MR. DAVE RADTkE, Director, XD Products, Cubic Corporation andMR. GENE MEzEIVTCH, Vice President of Sales, Cubic Corporation

“Hunting for APTs: How Machines Will Win the Cyberwar”MR. DARIN ANDERSEN, General Manager, Norman AS

“Cyber Security Threats and Solutions”MS. GIGI SCHUMM, Vice President and General Manager, Public Sector, Symantec Corporation

“Reducing IT Total Cost of Ownership Through COTS Cyber Solutions”MR. PETER BOSTROM, Director, Public Sector, Oracle Corporation

• COTS Cyber Solutions for Offense and Defense Hold Potential for Achieving a Higher Level Return on Investment, a Lower Total Cost of Ownership, a Faster Speed to Capability • This Session will Describe a COTS-Based Vision for the Full Spectrum Cyber Capability

Would you like to be an exhibitor at this symposium?Host a breakfast, lunch or beverage reception during the symposium?

Please contact Marcus Min @ 310-320-8128 to find out how your organization can participate.

“All Things Cyber: What’s Next for the Cyber Enterprise?”LT. GEN. (ret) PETER CUVIELLO, USA

Director, Networked Enabled Operational Support, Deloitte Consulting Services LLP, and Former U.S. Army CIO/G6

SPECIAL PRESENTATION:

Page 6: Cyber SeCurity for Defense, intelligence  and Homeland Security

fee:

SOCO Advisory 11-02: Accordingly, the reasonable per day attendance fee for purposes of JER 3-211.a(7) is now $675.

SpeCial HardSHip SCHolarSHip prograM: A number of seats have been set aside for every seminar and symposium for any motivated attendee who is unable to attend due to severe financial limitations of his/her company or if they are under very tight military limitations. Students will be eligible for a very substantial discount.

payMenT poliCy: Payments, both domestic and international, must be received on or before the first day of the symposium. no attendee will be admitted into the symposium without payment by either check, credit card (VISA, Mastercard, AMEX, Discover and Diners Club accepted) or U.S. government purchase order.

CanCellaTionS: Substitutions may be made at any time. A cancellation service charge of $150 will be rendered for all cancellations received fifteen days or more prior to the start of the symposium date. Registrants whose cancellation requests are not received fifteen days prior to the individual symposium, as well as no shows, are liable for the entire registration fee. You must obtain a cancellation number from our registrar.

Tuition, symposium documentation, and refreshments, are included in the fee

information/registration: (310) 320-8110register by faX: (310) 320-8101register online: TechnologyTraining.comSponsor/exhibit inquires: (310) 320-8128Mail Registration to: Technology Training Corp. dept. CS-C p.o. Box 119 Torrance, Ca 90507

Mailing inforMaTionEnclosed is a check payable to “Technology Training Corporation” to cover registration(s) of the following individual(s):

Name: _______________________________________________________

Position: _____________________________________________________

Management approval by: _______________________________________

Company/Organization: _________________________________________

Street: ________________________________ Mail Code:_____________

City: ________________________ State:_______ ZIP: _______________

Phone (area code): (________) _________________ Ext: _____________

Fax (area code): (_______) ______________________________________

E-Mail: ______________________________________________________

Home address:

Street: ________________________________________________________

City: ________________________ State:_______ ZIP: ________________________________Mail or Fax the credit card information below directly to TTC.

Card Number

____________________________________________________________Signature Expiration Date Auth. Code

CYBER SECURITYFOR DEFENSE, INTELLIGENCE AND HOMELAND SECURITY

WaSHingTon, dC May 8-10, 2013❑ Govt/DoD ❑CSFI Member ❑Individual/Contractor ❑Teams 3/more ________________

© 2013 TTC Printed in USAM-022

regiSTraTion MeTHodS

BB/SF

Washington, dC • May 8-10, 2013Holiday inn rosslyn at Key Bridge 1900 North Fort Myer Drive, Arlington, VA 22209 Tel: (703) 807-2000 or (888) 465-4329

(Ask for a Special Rate by mentioning “Technology Training”)attendance is limited to US, naTo, and allied countries only.We reserve the right to alter the published program if necessitated by circumstances beyond our control. The material presented in this program is based on unclassified technology and unclassified technology application areas.

aCCoMModaTionS: Attendee accommodations must be arranged directly with the hotel.

registration: 8:15 a.m. May 8, 2013program begins at 9:00 a.m.

Co-Sponsored By:

Mission Statement: To provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.

Through the graduate School USa, 1.2 Continuing Education Units (CEUs) will be available for participants who attend the entire conference. Within 4-6 weeks after the event, attendees will receive their certificate of attendance via email. www.graduateschool.edu

Special Exhibitor and Sponsorships at Tiered Pricing from $3,000 (Includes General Session), Contact Marcus Min @ (310) 320-8128.

CS-C Free $1,935 $1,645 $995

Govt/DoD Individual/Contractor

CSFIMember

SymposiumTeams of3 or More

(each)