Agenda

Wednesday September 9, 2015
7:30 AM -
8:30 AM
Registration
Washington Convention Center
8:30 AM -
8:45 AM
Welcome and Opening Remarks
  • Dr. Charles Romine, Director of the Information Technology Laboratory, NIST
8:45 AM -
9:30 AM
Keynote
  • To Be Announced
9:30 AM -
10:30 AM
General Session: It’s Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and more
  • Host
  • Matt Scholl, Chief of the Computer Security Division, NIST
  •  
  • Guests
  • Malcolm Harkins, Global Chief Information Security Officer, Cylance Inc.
  •  
  • Donna Dodson, Chief Cybersecurity Advisor, NIST
  •  
  • Andy Ubel, Chief Intellectual Property Counsel, Valspar Corporation
10:30 AM -
11:00 AM
Break / Expo Opens
11:00 AM -
11:50 AM

Trusted Computing

Windows 10 Security
  • Rick Engle, Principal Windows Technologies Specialist, Microsoft

Security Automation

Vendor Perspectives on Security Automation Challenges
  • John Banghart, Microsoft
  •  
  • Steve Grubb, RedHat

Information Sharing

Legal and Privacy Considerations for Cyber Threat Information Sharing
  • Kimberly Peretti, Alston & Bird, LLP

Research

A Secure Toolchain Competition
  • Lee Badger, Manager of the Security Components and Mechanisms Group, NIST

Demonstration

NSTIC Pilots (invited)
11:50 AM -
1:00 PM
Lunch on your own/ Expo
1:00 PM -
1:50 PM

Trusted Computing

System Firmware: the emerging malware battlefront
  • Jim Mann (invited), HP

Security Automation

NISTIR 8060: Software Identification (SWID) Tag Interoperability Guidance Overview
  • Brant Cheikes, MITRE Corporation

Information Sharing

Cyber Threat Intelligence - Lessons Learned Across Industry and Government
  • Bob Gourley, Crucial Point, LLC

Research

FIPS 140, Quo Vadis?
  • Apostol Vassilev, NIST

Demonstration

A Secure Toolchain Competition
  • NIST
1:50 PM -
2:00 PM
2:00 PM -
2:50 PM

Trusted Computing

Platform Firmware Security Assessment with CHIPSEC
  • TBD, Intel

Security Automation

SWID Tag Implementation Panel
  • Moderator
  • Brant Cheikes, MITRE Corporation

Information Sharing

STIX/TAXII - Overview and Transition to OASIS
  • Richard Struse, Chief Advanced Technology Officer, NCCIC, U.S. Department of Homeland Security

Research

Cryptography for Future Cybersecurity
  • Host
  • Tim Polk, Computer Scientist, NIST
  •  
  • Guests
  • John Kelsey, NIST
  •  
  • Kerry McKay, NIST
  •  
  • Dustin Moody, NIST
  •  
  • Rene Peralta, NIST
2:50 PM -
3:00 PM
3:00 PM -
3:30 PM
Break / Expo
3:30 PM -
4:20 PM

Trusted Computing

Why TPM 2.0?
  • Dave Challener, Johns Hopkins University- Applied Physics Laboratory

Security Automation

Trusted Network Communications
  • Lisa Lorenzin, Juniper

Information Sharing

Challenges and Opportunities in Cyber Information Sharing
  • MITRE

Research

Derived PIV Credentials Proof of Concept Research
  • NIST

Demonstration

NCCoE Building Blocks and Use Cases Demonstrations
  • NIST
4:20 PM -
4:30 PM
4:30 PM -
5:30 PM

Trusted Computing

Enterprise Management of SEDs
  • Amy Nelson (invited), Dell

Security Automation

NCCoE Project Updates
  • NIST NCCoE Team

Information Sharing

Observations on ISAC Cyber Threat Information Sharing Efforts
  • Denise Anderson, FS-ISAC/NCI

Research

DevOps and Containers Security
  • Paul Chihonski, Lancope

Demonstration

Derived PIV Credentials Proof of Concept Research
  • NIST


Thursday September 10, 2015
8:00 AM -
8:30 AM
Registration
8:30 AM -
8:45 AM
Remarks
  • Matt Scholl, Chief of the Computer Security Division, NIST
8:45 AM -
9:30 AM
Keynote
  • To Be Announced
9:30 AM -
10:30 AM
General Session: USG Research Focus
  • Host
  • Hemma Prafullchandra, Chief Technology Officer, Hytrust, Inc
  •  
  • Guests
  • Dr. Douglas Maughan, Director of the Cybersecurity Division, DHS
  •  
  • Lee Badger, Manager of the Security Components and Mechanisms Group, NIST
  •  
  • Grant Wagner, Technical Director of Trusted Systems Research, NSA
  •  
  • Tim Polk, Assistant Director for Cybersecurity, Office of Science and Technology Policy, The White House
10:30 AM -
11:00 AM
Break / Expo
11:00 AM -
11:50 AM

Trusted Computing

Haven: Shielding applications from an untrusted cloud
  • Marcus Peinado, Architect, Microsoft Research

Security Automation

A USG Perspective on Security Automation Challenges
  • Jessica Fitzgerald-McKay, NSA

Information Sharing

SHARKSEER Overview
  • Ron Nielson, NSA

Research

Overview of ITL's Public Safety Cybersecurity Efforts
  • Nelson Hastings, NIST
  •  
  • Sheila Frankel, NIST
11:50 AM -
12:00 PM
12:00 PM -
1:00 PM
Lunch on your own / Expo
1:00 PM -
1:50 PM

Trusted Computing

Roots of Trust
  • Olivier Van Nieuwenhuyse, STMicroelectronics

Security Automation

Integrated Adaptive Cyber Defense (IACD)
  • Dr. Peter Fonash, DHS
  •  
  • TBD, NSA (Invited)

Information Sharing

The Cyber Threat Intelligence Sharing Exchange Ecosystem Program
  • Eric Burger, Georgetown University

Research

Mobile Identity Management for Public Safety
  • Josh Franklin, NIST
1:50 PM -
2:00 PM
2:00 PM -
2:50 PM

Trusted Computing

Device Identity and Health Panel
  • Jessica Fitzgerald-McKay, NSA
  •  
  • Lisa Lorenzin, Pulse Secure
  •  
  • Greg Kazmierczak, Wave Systems

Security Automation

IACD Implementation
  • Wende Peters, JHU APL

Information Sharing

Crowdsourcing Intelligence - Friend or Foe?!
  • Ryan Trost, ThreatQuotient

Research

Security Capabilities of LTE and Their Implementation
  • Mike Bartock, NIST
  •  
  • Jeff Chihonski, NIST
  •  
  • Josh Franklin, NIST
2:50 PM -
3:00 PM
3:00 PM -
3:30 PM
Break / Expo
3:30 PM -
4:20 PM

Trusted Computing

What’s the Right Security for IoT
  • Steve Hanna, Infineon

Security Automation

NIST Security Automation Program Update
  • David Waltermire, Security Automation Architect, NIST

Information Sharing

Automated Indicator Sharing
  • Preston Werntz, DHS

Research

Public Safety Mobile Application Security
  • Michael Ogata, NIST
Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines
Demonstration
  • Robert Rounsavall, Trapezoid Inc.
  •  
  • Michael Dyer, Trapezoid Inc.
4:20 PM -
4:30 PM
4:30 PM -
5:30 PM

Trusted Computing

Intel Identity Protection Technology
  • Hormuzd Khosravi, Intel

Security Automation

IETF SACM Working Group – Progress on Security Automation Standards
  • Adam Montville, CIS

Information Sharing

Cyber Information Sharing - Threat-Based Cyber Operations Rapid Assessment
  • MITRE

Research

Usable Security at NIST
  • Mary Theofanos, NIST
  •  
  • Yee-Yin Choong, NIST


Friday September 11, 2015
8:00 AM -
8:30 AM
Registration
8:30 AM -
9:20 AM

Trusted Computing

Hardware Security and Trust
  • Yier Jin, University of Florida

Security Automation

OVAL Transition Update
  • Adam Montville, CIS

Information Sharing

Sharing Malware Indicators Using SCAP
  • Stephen Quinn, NIST
  •  
  • TBD, CyberESI
  •  
  • TBD, G2

Research

Perspectives on Augmenting Federal FISMA Practices with Cybersecurity Framework
  • Host
  • Kevin Stine, Manager, Security Outreach and Integration Group, NIST
  •  
  • Guests
  • Matt Barrett, NIST
  •  
  • Ron Ross, Fellow, NIST
  •  
  • Adam Sedgewick, NIST
9:20 AM -
9:30 AM
9:30 AM -
10:20 AM

Trusted Computing

Cryptographic Module Validation Program
  • Apostol Vassilev, NIST

Security Automation

TBD

Information Sharing

DARPA ICAS - Developing a Rich, Open-source Cybersecurity Ontology to Assist Cyber Defenders in Hunting for Adversaries on Enterprise Networks
  • Chris Greamo, Invincea Labs

Research

NIST Privacy Risk Management Framework
  • Sean Brooks, NIST

Demonstration

SCAP for Vulnerabilities, Configurations, and Malware Artifacts Management
  • NIST, CyberESI, and G2
10:20 AM -
10:35 AM
Break
10:35 AM -
11:25 AM
Keynote
  • To Be Announced
11:25 AM -
11:30 AM
11:30 AM -
12:30 PM
General Session: Trusted Computing, Security Automation, Information Sharing, and Research – What have we learned? Next steps…
  • Moderator
  • Bill Newhouse, Program Manager, National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology
  •  
  • Panelists
  • Andrew Regenscheid, NIST
  •  
  • David Waltermire, Security Automation Architect, NIST
  •  
  • Matt Barrett, NIST
  •  
  • Lee Badger, Manager of the Security Components and Mechanisms Group, NIST
12:30 PM -
12:45 PM
Closing Remarks
  • Bill Newhouse, Program Manager, National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology