CyberMaryland Conference 2016

October 20-21, 2016 • Baltimore Hilton Hotel • Baltimore, MD

Agenda

The 2016 Agenda will be posted soon. Below is the 2015 Agenda



  • Track A: Cyber Risk
    • Cybersecurity risks and threats – both internal and external - continue to occur and change at a rapid pace. New threats emerge daily. Analyzing the potential for loss and establishing methodologies for mitigating risk is one of the fastest evolving areas within the cybersecurity domain. New rules and regulations add to the burden of managing compliance and cyber threats simultaneously. This track brings together speakers in areas specializing in Cyber Insurance, Cyber Law, Threat Mapping, and related areas. Speakers and sessions will focus on what you need to know to minimize risk in your business or enterprise, best practices and emerging methods for analysing and addressing risk.
  • Track B: Cyber Workforce & Education
    • Developing a strong, viable and resilient cyber workforce is vital to the sustainability of public and private entities. With the growing number of cyber attacks springing up throughout the U.S. and abroad, major players are taken a serious interest in grooming the next generation of cyber warriors. This track will take a honest look at cyber education and workforce growth on the local, regional and national level.
  • Track C: Cyber Innovation
    • Effective cyber products and services are hot commodities on the IT spectrum. Innovators with data protection solutions that enable both small and large enterprises to secure and protect networks with limited interference are often sought after. Maryland is a hub of cyber innovation that equips both public and private industry with world-class technologies built for next generation cyber protection and awareness. This track will showcase innovative cyber technologies.
  • Track D: Cyber Investments & Emerging Opportunities
    • According to Gartner, Inc., worldwide spending on information security was projected to reach $71.1 billion in 2014. In 2015, the IT research firm sees that rate accelerating to 8.1%, for a total of $76.9 billion. This data alone highlights the importance of staying on the forefront of cyber investments, M&A and emerging areas including digital health and innovation. This track will focus on cybersecurity investments, the evolving needs of investors and new and emerging technological discoveries.
  • Day 1- Track E: Securing Cyber's Future: Human Cyber Forensics
    • In the ever-changing world of high-tech cybersecurity, protecting the future of infosec is a critical aspect of our global economy, national infrastructure sustainability and foreign relations efforts. Our IT universe is expanding, and the role each of us play in creating a safe environment for connectivity is essential for future growth. During these sessions learn from cyber experts about the emerging human cyber/cloud forensic methods, attitudes, applications, and technologies.
  • Day 2- Track E: Securing Cyber's Future
    • In the ever-changing world of high-tech cybersecurity, protecting the future of infosec is a critical aspect of our global economy, national infrastructure sustainability and foreign relations efforts. Our IT universe is expanding, and the role each of us play in creating a safe environment for connectivity is essential for future growth. During these sessions hear from a host of cyber experts on new and innovative approaches to cyber education, risk mitigation and policy.

Wednesday October 28, 2015
8:30 AM -
9:15 AM
Opening Session
  • Welcome, Overview of Conference Activities
  • David Powell, Chief Operating Officer, Federal Business Council & Co-Founder, The CyberMaryland Conference
  • Official Welcome from the State
  • Michael Gill, Secretary, Maryland Department of Commerce
  • Remarks
  • The Honorable C.A. "Dutch" Ruppersberger , U.S. House of Representatives (MD)
  • Keynote Speaker
  • Philip D. Quade, Special Assistant to the Director for Cyber and Chief of the Cyber Task Force, National Security Agency

    Abstract

    Anchored by the presence of the NSA, USCYBERCOM, and other network-centric organizations, the state of Maryland has quickly emerged as an epicenter for cyber innovation, often serving on the front line in advancing cyber's potential. In his talk, Mr. Quade will address the cyber landscape, and how government, industry, and academic interests in Maryland can team to address our nation's cyber dependencies. Specifically, Mr. Quade will focus on how the state of Maryland can nourish a "SIM Cyber" environment, one that is well-integrated, innovation-friendly, competitive, and connected across a strong web of Government, industry, and academic partners.

9:15 AM -
10:00 AM
Top Cyber Concerns in the C-Suite
  • Moderator
  • Tom Sadowski, President & CEO, Economic Alliance of Greater Baltimore (EAGB)
  • Speakers
  • Darren Lacey, Chief Information Security Officer/ Director of IT Compliance, Johns Hopkins University
  • Jim Calabrese, Chief Information Officer, Constellation
  • Chad Spitters, Chief Information Security Officer, Legg Mason Global Asset Management
  • Kathy Memenza, Information Protection and IT Security, Senior VP, Marriott International
  • Peder Jungck, VP / Chief Technology Officer Intelligence & Security, BAE Systems
10:00 AM -
10:15 AM
10:15 AM -
11:00 AM

TRACK A: CYBER RISK

Risk Management and Decision Support: How C-suites and Boardrooms Approach Cyber Security
Room 321
  • Abstract

    Cyber risk management is now on every company's agenda: the board can no longer afford to relegate it to the IT department, and the C-suite needs to make critical decisions aligned to their business priorities. Learn how corporate leaders can grasp and manage their cyber risk, with due attention to different understandings of risk, evolving standards of care, emerging technologies, governance, legal and regulatory compliance, and threat intelligence. Julian Waits, president and CEO of CyberPoint Risk Analytics, will moderate a panel of leading CISOs and CROs from companies at the forefront of cyber risk management. Solving the challenge of analyzing cyber risk, communicating it effectively and swiftly to executives and board members, is fundamental to growing the business ecosystem already planted in the greater Baltimore area. An informed discussion of this challenge should be broadly helpful to Maryland's business community. The panel should be of particular interest to the investment community, the financial service sector, law firms, and companies engaged in the production of significant intellectual property.

  • Moderator
  • Julian Waits, CEO, PivotPoint Risk Analytics
  • Speakers
  • Spencer Wilcox, Director, Information Security Managing Security Strategist, Exelon
  • Lon A. Berk, Partner, Hunton & Williams

TRACK B: CYBER WORKFORCE & EDUCATION

Increasing Diversity in the Cybersecurity Workforce Pipeline
Room 322
  • Abstract

    Cybersecurity has been identified as one of the most serious economic and national security challenges we face across the world. Sadly however, there is global under-representation of women and other minorities in the fast-growing discipline of cyber security. This under-participation by large segments of our society represents a loss of opportunity for individuals, a loss of talent in the workforce, and a loss of creativity in shaping the future of cybersecurity. Not only is it a basic equity issue, but it threatens our global economic viability as a nation.

  • Moderator
  • Ola Sage, Founder & CEO, e-Management
  • Speakers
  • Latoya Staten, Program Manager, Office of Cyber Development, Maryland Department of Business and Economic Development
  • Marcelle Lee, Fractal Security Group, Women's Society of Cyberjutsu
  • Veda Woods, Executive Director, International Consortium of Minority Cybersecurity Professionals
  • Rebecca (Becky) Bace, Hall of Fame Nominee, Retired NSA Cryptographer

TRACK C: CYBER INNOVATION

The Evolution of Security Innovation and What is Next
Room 323
  • Abstract

    The demand for innovation in cybersecurity has profoundly changed over the past decade. According to Gartner analysts, in 2015, the Worldwide Information Security market will accelerate to 8.0% and exceed $77 billion annually. Increased capability of the threat, expansion of attack surface via mobile computing devices and Internet-of-things, and the popularization of data breaches have driven an increase in demand for innovation from the server room to the corner office. This panel discussion will share varying perspectives on this increase in demand for security innovation and observations of the segments through the review of MACH37, a premier accelerator for cybersecurity entrepreneurs and startups.

  • Moderator
  • Rick Gordon, Managing Partner, Mach37
  • Speakers
  • Norm Laudermilch, COO, Invincea
  • Pascal Luck, Managing Director, Core Capital Partners
  • John Pescatore, Director, Emerging Security Trends, SANS Institute

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Exploring Maryland’s Core Competencies in the Generation of New Cybersecurity-related Intellectual Property
Room 324
  • Abstract

    In light of the cyber technologies developed at NSA, U.S. Cyber Command, JHU APL and the University of Maryland, there may be no other location outside of Silicon Valley capable of producing the new technologies and ideas that can become the basis of the next wave of cyber start-ups better than Maryland. During this session, top investors and bankers will encourage the audience to think like a founder at "ground zero" about new company creation - how to identify, incubate, evaluate, and build upon compelling IP as the foundation for a new viable entity.

  • Moderator
  • Rick Kohr, Founder/CEO, Evergreen Advisors, LLC
  • Speakers
  • John Serafini, Vice President, Allied Minds
  • Brad Bloodworth, Managing Partner, Woodside O'Brien LLC
  • Steven Chen, CEO, PFP Cybersecurity

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

Hardening the HUMAN Element
Room 325
  • Abstract

    Cloud computing is seen as inherently less secure than traditional architectures, and is, therefore, receiving considerable attention to (and spending on) technological approaches to data security. However "most cyber security ... don't include concrete measures to address the human element" for cloud cyber defense. What is the significance of the human impact?

  • Introduction
  • Mr. Jason Christman, CISSP, PMP, Senior Member, McClure, Brown, & Associates®, LLC
  • Keynote Speaker
  • Mr. Albert Schultz, CEO, Krypteia, LLC
11:00 AM -
11:15 AM
11:15 AM -
12:00 PM

TRACK A: CYBER RISK

Governance of Cybersecurity: It's Not the Nose Game
Room 321
  • Abstract

    Every organization is struggling with governance of cybersecurity. Boards and CEOs are demanding answers and assurances. Companies are realizing cybersecurity is not just IT's job, but IT and others now face new challenges working across business operations, communications, counsel, and other departments to put in place best practices, programs, and new technologies to achieve data and network security. Who owns cybersecurity in your company? This panel will look at how companies both large and small, in various industries, have handled cybersecurity governance.

  • Moderator
  • Evan Sills, Associate, Good Harbor Security Risk Management
  • Speakers
  • Javier Ortiz, Policy Advisor, Dentons
  • Emilian Papadopoulos, President, Good Harbor Security Risk Management

TRACK B: CYBER WORKFORCE & EDUCATION

A Student’s Perspective of Cyber Security
Room 322
  • Abstract

    This panel is composed of students who will share their views on human-system cyber forensics and analytics. What are the standards and policy issues? What are the advantages and issues of cognitive-social cybernetic analytics? How does human factors support the cloud security risk management framework?

  • Moderator
  • Dr. Joe VanHoozer, Distinguished Subject Matter Expert, McClure, Brown & Associates LLC
  • Panelists
  • Meghan Riggle, Cyber Forensics & Information Security, Concentration in Competitive Intelligence, Robert Morris University
  • Matthew Settles, University of Baltimore, Cyber Security
  • Jacob Van Ness, Patrick Henry College, Strategic Intelligence in National Security
  • Nathan Mingus, Patrick Henry College, Government with a Strategic Intelligence Initiative
  • Paul Hurni, USMS Intern, Robert Morris University

TRACK C: CYBER INNOVATION

The Business of Botnets
Room 323
  • Abstract

    Cyber criminals use social media botnets to disseminate malicious links, collect intelligence on high profile targets and spread influence. As opposed to traditional botnets, each social bot represents an automated social account rather than an infected computer. This means building a legion of interconnected bots is much quicker and easier than ever before, all accessible from a single computer. With the rise of social media, a social botnet can be used to amplify the scope of an attack or automate the dissemination of malicious links. When people think of buying and selling online, we generally don't think beyond Craigslist, Amazon, and your favorite e-commerce clothing outlet. But of course, the internet is deeper and darker than we often realize, and all sorts of things are bought and sold in secret. Hear how Cyber criminal marketplaces and hacker hubs are buzzing with activity, and one of the most traded and highest selling goods are the credentials for a social botnet. Luckily for the bot herders, business is booming.

  • Group Discussion
  • James Foster, Founder/CEO, ZeroFox
  • Evan Blair, Founder, Co-Chief Business Officer, ZeroFox
  • Ian Amit, Vice President, ZeroFox

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

The State of M&A in the Cybersecurity Market
Room 324
  • Abstract

    Hear from AGC Partners Founding Partner and Investment Banker, Maria Kussmaul about trends in merger and acquisition metrics and emerging opportunities in IPOs, Buy/Sell-side M&A and private equity recapitalizations.

  • Introduction
  • Greg Dracon, Partner, .406 Ventures
  • Speaker
  • Maria Lewis Kussmaul, Co-Founder & Partner, AGC Partners

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

User Behavior Analytics in Cyber Domain
Room 325
  • Abstract

    Traditional security solutions, such as anti-virus software, give little insight to

    the cognitive-behavior attributes of cyber threats. This session will address the latter

    showing user behavior analytic methods as a basis for the discussion.

  • Moderator
  • Mr. Dmitry Cousin, Specialist, Computer Security Division, National Institute of Standards and Technology (NIST)
  • Neuro Cyber Analytics
  • Dr. Alenka Brown, President and Chief Scientist, McClure, Brown, & Associates®, LLC
  • Risk Cyber Operations: Utilizing Risk Proclivity Measures to Explain Cyber Behaviors and the Forensics Within
  • Ms. Jacquelyn Schneider, PhD Candidate in Political Science, George Washington University
  • Developing Qualitative Measures for a User Cohort to Determine Attitudes: Building a Case Study for Faculty's Attitudes and Behaviors around Cybersecurity
  • Larisa Breton, President, Full Circle Communication
12:00 PM -
12:45 PM
Lunch
12:45 PM -
1:30 PM
Lunch Keynote- Maryland Cyber Crime Trends and Tactics A Roadmap For the Board: How Can Information Sharing Benefit Brand Integrity and Why Your Data Was Compromised
  • Introduction
  • Patrick Wynn, Vice President, LifeJourney
  • Keynote Speaker
  • Stuart Tryon, Special Agent in Charge, United States Secret Service- Criminal Investigative Division
1:30 PM -
1:45 PM
1:45 PM -
2:30 PM

TRACK A: CYBER RISK

Corporate Espionage and Insider Threat – Monitoring Behavior, Valuing Data, Quantifying Risk and Assigning Accountability
Room 321
  • Abstract

    Insider threat has been synonymous of late with terms such as breach, data leakage and a host of cyber security implications often aimed at the consumer. While personnel files, social security numbers, credit cards, and PII are often the target of attacks, corporations are now watching much more! What happens when an employee decides to go to a competitor or launch his or her own endeavor? What data, clients or even personnel are they tempted to exfiltrate on the way out? There are many identifiers and triggers that often go undetected because insiders know how to go unnoticed (slow and low), just as malware finds its way through layers and layers of defenses. Corporations are challenged to protect their most critical data but often have a hard time placing value on data, identify what and where the most critical data actually resides and who in the organization is truly accountable for those assets. This panel will explore how to assign accountability, appropriately classify data and quantify risk based on monitoring network and user behavior.

  • Moderator
  • Paul Roberts, Editor-in-chief, Security Ledger
  • Speakers
  • Gautam Aggarwal, Chief Marketing Officer, Bay Dynamics
  • Casey Corcoran, Vice President of Strategy, FourV Systems
  • Gregg Smith, CEO, OptioLabs
  • Leo Scanlon, CISSP, Acting Director of IA Security, Department of Health and Human Services

TRACK B: CYBER WORKFORCE & EDUCATION

NSA/DHS National Centers of Academic Excellence in Cyber Defense (Promoting Education & Research)
Room 322
  • Abstract

    The National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence in Cyber-Defense (CAE-CD) program. This academic program seeks to improve the cybersecurity posture of our nation by cultivating the next generation of cybersecurity professionals through education and research. Schools entering the program must meet a criterion established by the CAE community that demonstrates appropriate rigor, breadth, and scope regarding education, research, and outreach activities related to cybersecurity. The program is dynamic and evolving and boasts a membership of over a 190 universities, colleges, and community colleges nationwide!

  • Moderator
  • Lynne Clark, Chief, National Information Assurance Education and Training Program, NSA
  • Speakers
  • Dr. Blair Taylor, Clinical Associate Professor, Towson University
  • Professor William (Bill) Butler, Director, Critical Infrastructures and Cyber Protection Center, Capitol Technology University
  • Professor Michael Burt, National CyberWatch Center (NFS Grant)
  • Madrice Guy, Cybersecurity and Information Assurance Faculty, Harford Community College
  • Kasia Taylor, Associate Professor, Coordinator Networking, Security and Forensics Program, Anne Arundel Community College

TRACK C: CYBER INNOVATION

On the Frontline: Maryland-Grown Technologies and How They are Changing the World of Information Security
Room 323
  • Abstract

    As ground zero for cybersecurity business and leadership in the region, the State of Maryland has nurtured technologies that are making their way across the globe to help identify threats and protect security networks and business assets. During this panel, learn from executives and technologists about the strength and depth of their products and how future growth will spawn new business opportunities, cyber innovation and job creation.

  • Moderator
  • Deon Viergutz, VP of Cyber Solutions, Lockheed Martin Information Systems & Global Solutions
  • Speakers
  • Bruce Potter, CTO, KEYW Corporation
  • Guy Filippelli, President & CEO, Red Owl Analytics
  • Evan Blair, Founder, Co-Chief Business Officer, ZeroFox
  • Dr. Bill Anderson, CPO, Optio Lab

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Securing Institutional Investments in the Age of Rapid Cybersecurity Growth
Room 324
  • Abstract

    Learn from experienced investors what key elements the venture capital community is looking for to make a first or follow-on institutional investment in 2015. How has this changed in recent years and what is the impact on pre-money valuations and the metrics used.

  • Moderator
  • Rick Kohr, Founder/CEO, Evergreen Advisors, LLC
  • Speakers
  • Nick Superina, Partner, QuestMark Partners
  • Greg Dracon, Partner, .406 Ventures
  • Mark Hatfield, Founder and General Partner, Ten Eleven Ventures

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

Following the Human Threads in Cyber Domain
Room 325
  • Abstract

    This session addresses how cognitive-behavior analytics is used in real-time involving cyber and cloud applications.

  • Moderator
  • Mr. Jason Christman, CISSP, Senior Member, McClure, Brown, & Associates®, LLC
  • Mr. Greg Virgin, CEO, RedJack
2:30 PM -
2:45 PM
2:45 PM -
3:15 PM

TRACK A: CYBER RISK

Cybersecurity in the Age of Government Regulations
Room 321
  • Abstract

    Hear Harry Fox, CareFirst BlueCross BlueShield's Chief Information Officer discuss the broader implications of multiple cyber-attacks and the regulatory response. Following the recent spate of cyber-attacks, state and federal government bodies are looking to impose varying regulations. CareFirst, which currently complies with approximately 17 different security and regulatory frameworks, use a common compliance framework to map each one into a single set of controls. Cybersecurity regulation has the potential to tie down insurance providers to mandated security controls that could become antiquated quickly and deliver to threat actors a specific roadmap of what is being implemented.

  • Introduction
  • Larysa A. Salamacha, Managing Director of Business Development, Baltimore Development Corporation
  • Speaker
  • Harry D. Fox, Senior Vice President for Technical and Operations Support Services/ CIO, CareFirst BlueCross BlueShield

TRACK B: CYBER WORKFORCE & EDUCATION

Building the Next Generation of Cyber Defenders: Cross-Training Wounded Warriors to help Protect and Defend the Nation's Information Systems
Room 322
  • Abstract

    Today's cyber attacks are continuing to become more technically astute and effective. Gone are the days of simple denial of service attacks targeting websites and other Internet-facing IT systems. Today's attacks are targeting the intellectual property and economic foundations of organizations in every industry, vertical and country. The theft of such information is a common occurrence as critical information systems are infiltrated through Internet connections and vital economic capital, critical technologies, and other forms of national wealth are being plundered. Real-life events demonstrate that those organizations that employ highly technical cyber security professionals in areas such as incident response, network defense, and penetration testing or forensics analysis are in the best position to identify, quarantine and remediate today's cyber threats. The differentiator is not just a device or appliance. There is a critical need for people who are able to use judgment and analysis at a deep technical level that can make the difference.

    This presentation will discuss an advanced training and assessment program currently in development by the Federal IT Security Institute to arm our wounded warriors with technical skills that supplement their existing dedication, patience, and devotion to duty, thereby strengthening national cyber defenses.

  • Introduction
  • Dr. Jane LeClair, COO, National Cybersecurity Institute at Excelsior College
  • Speaker
  • Jim Wiggins, Executive Director, Federal IT Security Institute

TRACK C: CYBER INNOVATION

Assessing Host-Based Sensing and Analytics with the MITRE ATT&CK Model
Room 323
  • Abstract

    Host-based sensing and analytics is becoming more important as adversaries have adapted to threat information sharing and many standard defense practices. Perimeter and mitigation focused defenses are still being bypassed and many organizations are being informed of intrusions from external entities. To help address these problems, MITRE has developed a model and framework for describing the common behaviors adversaries may exhibit during an intrusion: Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK). ATT&CK picks up at a lower level of abstraction in the post-exploit phases from cyber attack lifecycle models that is more actionable and relevant to host-based sensing evaluation. The model consists of tactic categories describing post-compromise phases, the "why" an adversary makes a certain action, with individual technique lists for each phase describing the "how" an adversary performs a tactic.

  • Introduction
  • Ira E. Hoffman, Of Counsel, Butzel Long
  • Speaker
  • Troy Townsend, Lead Cyber Security Engineer, MITRE Corporation

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Why Building Trusted Computer Systems is our Only Hope
Room 324
  • Abstract

    "Hardening" systems, cyber risk management, and now, cyber threat intelligence are dismal failures! All these approaches fail to realize that the real problem in cyber security is that contemporary systems are inherently insecure. This presentation makes a case for increased investment in an area of cyber security that once demonstrated great potential for securing computer systems. The Trusted Computer Security Initiative (aka, the Orange Book) was borne in the State of Maryland (at NSA) and was a catalyst for an entire generation of mini (and even micro) computers that were simply not "hackable."

  • Introduction
  • Patrick Wynn, Vice President, LifeJourney
  • Speaker
  • Robert Bigman, Cybersecurity Consultant, 2BSecure

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

Continuous Monitoring of Human Behavior an Inheritable Cloud Security Model
Room 325
  • Abstract

    Cloud computing is seen as inherently less secure than traditional architectures, and is, therefore, receiving considerable attention to (and spending on) technological approaches to today's cloud security. However "most cyber security ... don't include concrete measures to even address the human element" for cloud cyber defense. This session shall address the latter and more.

  • Moderator
  • Dr. Merrick Watchorn, Cloud Security SME, SAIC
  • Mr. Charles D. Brooks, Vice President for Government Relations & Marketing, Sutherland Global Services
  • Dr. Hans Mumm, Author & Entrepreneur, High Rise Industries, LLC
  • Dr. Alexander Perry, Adjunct Professor, Capitol Technology University
  • Dr. Alenka Brown, President and Chief Scientist, McClure, Brown, & Associates®, LLC
  • Tina Williams, President & CEO, TCecure
3:15 PM -
3:20 PM
3:20 PM -
3:50 PM

TRACK A: CYBER RISK

Cyber Attacks and Critical Infrastructure: A Financial Sector View
Room 321
  • Abstract

    Concerns about potential cyber attacks on the nation's critical infrastructure are growing. From energy, electric utilities, and communications to chemicals, transportation, and health care, both the private and public sector face rapidly escalating, highly complex cyber threats from a variety of actors. Personal data and intellectual property are at risk; so too alarmingly is the ability of firms to operate normally. With little or no warning, data integrity may be violated and/or system availability, stability and reliability compromised, putting the well-being and lives of our citizens at risk.

  • Introduction
  • Larysa A. Salamacha, Managing Director of Business Development, Baltimore Development Corporation
  • Speaker
  • Susan Ramonat, Chief Risk Officer, SEI

TRACK B: CYBER WORKFORCE & EDUCATION

Live Fire Training for Developing The Cyber Workforce
Room 322
  • Abstract

    Is your team ready to respond to a large-scale cyber-attack? Can they anticipate your adversary's next move? Classroom training is not enough. Simulating real-world attacks delivers a more immersive and interactive experience than traditional security education.

    "Security Simulation" allows security professionals to take on the identity of attackers to learn how they think, how they approach targets and how they exploit current protective technologies. With immersion into a virtual, live-fire environment, Security Simulation inspires players to draw on key qualities such as persistence, attention to detail and advanced problem-solving as they emulate adversary' s thought processes while staging authentic advanced targeted attacks.

  • Introduction
  • Dr. Jane LeClair, COO, National Cybersecurity Institute at Excelsior College
  • Speaker
  • Kevin McPeak, CISSP, ITILv3, Technical Architect, Security, Public Sector Strategic Programs, Symantec Corporation

TRACK C: CYBER INNOVATION

Visit Industry Showcase
Room 323

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Extending Services into Mobile with Compelling Data Visualizations
Room 324
  • Abstract

    Cyber security products aim to identify and reveal threats quickly, and that goal can be achieved even quicker through a mobile presence. Allow your clients to identify, triage, and resolve threats faster through instant notifications and clear, visualized dashboards of content accessible on all devices. With a well-developed application and relevant APIs, information can be connected from existing systems to display compelling data visualizations and user-friendly, actionable digital dashboards. This session will focus on expanding secure business services into mobile for a comprehensive digital experience, and discussing recommended design and user experience practices for data visualization in the cyber space. After attending this session, participants will understand the benefits of extending business products and services into a mobile space that is highly valuable to their security-conscious clients, in order to visualize and address threats immediately.

  • Introduction
  • Patrick Wynn, Vice President, LifeJourney
  • Speaker
  • Todd Marks, CEO, Mindgrub

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

Continuous Monitoring of Human Behavior an Inheritable Cloud Security Model (Continued)
Room 325
3:50 PM -
4:00 PM
4:00 PM -
4:45 PM

TRACK A: CYBER RISK

The Global Cyber Network
Room 321
  • Abstract

    The threat of digital aggression is not bound by any geography, and neither is our response. Joining together with the world leaders in cyber defense allows for intelligence, best practices, and innovative ideas to flow freely around the world and mount a stronger defense from adversaries on all fronts. By connecting the institutions around the globe that contribute to cyber solutions, a collaborative worldwide ecosystem can be founded on transferring ideas and technologies between academia, government, and industry players. The global market for cyber security is worth over $100 billion, and the tools introduced to this market are imagined and built only in the countries that have committed to form coherent and inclusive ecosystems. During this session, U.S. cyber partners from around the globe will discuss cyber solutions and efforts to build effective cyber ecosystems.

  • Andy Williams, Cyber Envoy UKTI Defence and Security Organisation, British Embassy
  • Emma Lovett, Squadron Leader, Royal Australian Air Force
  • Haden Land, Vice President, Research & Technology, Lockheed Martin Information Systems & Global Solutions, Lockheed Martin Corp.

TRACK B: CYBER WORKFORCE & EDUCATION

Visit Industry Showcase
Room 322

TRACK C: CYBER INNOVATION

Mobile Devices in the workforce - a blessing - but is corporate data safe? Learn the workforce dangers as well as mitigations
Room 323
  • Abstract

    Corporate computing is migrating from desktops and laptops to mobile phones and tablets very quickly. IT Directors can no longer avoid this revolution, but rather embrace it and utilize it to make their workforces more productive, getting the right information at the right time, regardless of where they are located. But how can this be done securely? How can enterprises avoid a cyber attack or data theft? Join us for a panel of experts from corporations and mobile solutions experts to discuss means and methods to enable enterprise mobility.

  • Panelists
  • Peter Coddington, Founder, CMDSP
  • Mr. Vince Sritapan, Program Manager, Cyber Security Division for the Homeland Security Advanced Research Projects Projects Agency, DHS S&T
  • Stephen Ryan, Business Development, Proofpoint/TAP Mobile Defense
  • Alex Gladd, Lead Engineer, Lookout
  • Melanie Seekins, Enterprise Mobile Architect, Altria, LLC.- Philip Morris
  • Andrew Lehfeldt, Expert, MobileIron

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

What Keeps You Up At Night? The CISO’s Perspective.
Room 324
  • Abstract

    The CISO's role is changing. No longer a back office technology expert, the CISO has become a strategic business leader forever thrust in the limelight whenever a breech becomes public. Data security looks fundamentally different from how it looked in the past and it's becoming even more distributed through channels such as the cloud, social media, and on mobile devices of every shape, size and color. With the explosion of the Internet of Things, corporations have had to take a look at their priority list and move "data security" to the top. With the CISO's job being "establishing and maintaining the enterprise vision, strategy and program to ensure information assets and technologies are adequately protected", they've had their work cut out for them recently. What are we doing to combat data breeches? Should we trust the cloud? What innovations do we need for the future? Hear from a few of the top and emerging CISO's in the technology industry and why they always need that extra cup of coffee.

  • Moderator
  • Mike Papay, CISO, Northrop Grumman
  • Panelists
  • Dennis Gilbert, CISO, Exelon
  • James Parren Courtney, CISO, University of Maryland Medical System
  • Adam Vincent, CEO, ThreatConnect
  • Joanne Martin, Former CISO, IBM

TRACK E: SECURING CYBER'S FUTURE: HUMAN CYBER FORENSICS

Open Source Software in Today’s Cyber Market
Room 325
  • Abstract

    This session speaks OSS in today's market of cyber domain. The policies and legal issues that may arise in the evolution of Cloud Computing, Intellectual Property and User Application. What is known? What is being researched? What is the Open Source Software Institute's mission in addressing the future of OSS?

  • Moderator
  • Mr. Jason Christman, CISSP, PMP, Senior Member, McClure, Brown, & Associates®, LLC
  • Dr. Alenka Brown, President and Chief Scientist, McClure, Brown, & Associates®, LLC
  • John Farrell, President, Open Source Software Institute
  • Andy Murren, Security Engineer, Sila Solutions Group
  • Dr. Merrick Watchorn, Cloud Security SME, SAIC
Thursday October 29, 2015
8:00 AM -
8:45 AM
"NSA Day of Cyber Premiere"
  • Welcome
  • Rick Geritz, CEO, LifeJourney
  • Keynote Speaker- Creating the 21st Century Cyber Curriculum
  • Dr. Freeman A. Hrabowski, President, University of Maryland Baltimore County
  • The NSA Day of Cyber Remarks
  • Rob Joyce, Chief of TAO, NSA
  • Rodney Peterson, Director of NICE, NIST
  • Mark R. Nelson, Ph.D., MBA, CAE, Executive Director, Computer Science Teacher Association
  • Dr. Nicholas Eugene, Director of STEM Programs, Coppin State University
8:45 AM -
9:00 AM
9:00 AM -
9:30 AM

TRACK A: CYBER RISK

Cybersecurity Post OPM Breach
Room 309
  • Abstract

    Hear how breaches like OPM and Sony are affecting cybersecurity, regulation and careers. Also learn about the nuances of security spending, compliance auditing vs. hunting for intruders, and recent advances in security technologies.

  • Introduction
  • Steve Pennington, Managing Director, Business and Industry Sector Development, DBED
  • Speaker
  • Ron Gula, CEO, Tenable Network Security

TRACK B: CYBER WORKFORCE & EDUCATION

Department of Homeland Security Cyber Workforce Initiatives
Room 308
  • Abstract

    Cybersecurity workforce development is a prominent national security issue, and the lack of cybersecurity talent is a problem that permeates both the public and private sector. An expert from the Department of Homeland Security Cyberskills Management Support Initiative will share information about recent cyber initiatives that are aimed to build the next pipeline of skilled cyber talent. This session will discuss innovative strategies that work to strengthen and enhance the department's cybersecurity workforce.

  • Introduction
  • Patrick Wynn, Vice President, LifeJourney
  • Speaker
  • Renee Forney, Executive Director, Department Homeland Security (DHS) CyberSkills Management Support Initiative

TRACK C: CYBER INNOVATION

Cyber Liability: A Legal and Technology Perspective
Room 303
  • Abstract

    Learn about multiple aspects of Cyber Liability from both legal and technology points of view to include a thorough discussion of the contractual issues which apply to the following specific matters: Written Information Security Plans (WISPs); State, Multistate and Federal Requirements; Supply Chain Integrity; Risk Allocation; and Due Diligence. The goal of the presentation is to provide actionable and understandable information for the attendees

  • Introduction
  • Ian Duncan, Intelligence and Military Reporter, The Baltimore Sun
  • Speakers
  • Matt Bergman, Chairman/ Co-Chair, Shulman Rogers' Commercial Finance Practice/Cybersecurity Practice
  • Dr. Curtis Levinson, Private Consultancy and United States Cyber Defense Advisor to NATO, NATO

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Visit Industry Showcase
Room 302

TRACK E: SECURING CYBER'S FUTURE

"Sophisticated Attacks": The New Normal For Security Programs and How to Prevent Them
Room 301
  • Abstract

    All recent, significant hacking incidents have been attributed to "sophisticated attacks." The reality is that such attacks are the new normal. Sophisticated attack claims reflect unsophisticated security programs. This presentation will analyze recent attacks and show how they could have been prevented, and recommend methods for strengthening security programs to stop those attacks in the future. We will also present the Irari Rules, which define actual "Sophisticated Attacks".

  • Introduction
  • Ursula Powidzki, Assistant Secretary, Business and Enterprise Development, Maryland Department of Business & Economic Development
  • Speakers
  • Ira Winkler, CISSP, President and CEO, Secure Mentem
  • Araceli Treu Gomes, Co-host, Irari Report
9:30 AM -
9:45 AM
9:45 AM -
10:30 AM

TRACK A: CYBER RISK

Threat Intelligence - What Works and What’s Hype
Room 309
  • Abstract

    Research indicates that the majority of successful cyber attacks are specifically targeted to their intended victim organizations who have been well researched by their attackers. Sun Tzu, from the Art of War, said "Know your enemy and know yourself and you can fight a hundred battles without disaster".

    Threat data is plentiful yet to win cyber security battles, the challenge is turning threat data into relevant, actionable threat intelligence. By understanding potential threats relevant to a targeted organization and integrating threat intelligence into IT operations, security teams can focus their resources on finding the most dangerous threats and tune their security systems to mitigate the impact.

    This panel will explore what threat data is most valuable, how to turn that data into threat intelligence, how to make threat intelligence integrated and actionable, and explore the latest threat intelligence research and best practices so organizations can confidently make informed risk decisions.

  • Moderator
  • Paul Roberts, Editor-in-chief, Security Ledger
  • Panelists
  • John J. Prisco, President & CEO, Triumfant
  • Chris Coleman, CEO, LookingGlass
  • John Pescatore, Director, Emerging Security Trends, SANS Institute
  • Jeff Six, Vice President, T. Rowe Price

TRACK B: CYBER WORKFORCE & EDUCATION

Cyber USA; How America is creating the Cyber Generation
Room 308
  • Abstract

    The United States is at a crisis point in preparing the next generation for the demands of our nation's cyber workforce. With our country's 400,000 open cybersecurity jobs and our low worldwide STEM education rankings, leaders at the state level are driving initiatives to engage and inspire today's youth to become tomorrow's Cyber Generation. With the current demand for cybersecurity professionals at 3.5 times higher than for other information technology workers, and with a cyber job growth estimate of 53% over the next three years; Cyber leaders from Maryland, California, Louisiana, and Minnesota will share their efforts and programs that they are deploying to tackle the challenges, amplify the messaging and accelerate the creation of our nation's Cyber Generation.

  • Moderator
  • Hon. Phillip J. Bond, President and CEO, Washington, DC /Silicon Valley/Texas - Bond & Associates - Strategic Government Affair
  • Panelists
  • Tom Sadowski, President & CEO, Economic Alliance of Greater Baltimore (EAGB)
  • Ryan Gillis, Vice President of Government Affairs and Policy, Palo Alto Networks

TRACK C: CYBER INNOVATION

Model of a Successful Industry Partnership - Northrop Grumman at bwtech@UMBC Cyber Incubator: CYNC Program
Room 303
  • Abstract

    The Northrop Grumman Cync Program is a unique partnership between Northrop Grumman and the bwtech@UMBC Cyber Incubator, with an eye towards commercializing technology to protect the nation from a growing range of cyber threats. The Northrop Grumman Cync Program builds on bwtech@UMBC's successful business-incubation framework by offering a scholarship program for companies with the most promising cybersecurity solutions. Selected participants are able to draw on UMBC's extensive research resources, bwtech's programming and entrepreneurial services, and Northrop Grumman's technical and business advisory support to further the development and market readiness of CYNC company technologies. Hear from four innovative product companies currently in CYNC and members of the CYNC Executive Committee.

  • Moderator
  • Ellen Hemmerly, Executive Director and President , UMBC Research Park Corporation and Special Assistant to the Vice President for Institutional Advancement at UMBC
  • Speakers
  • Mike Gormley, Vice President for Government Services, Ayasdi
  • Christopher Valentino, Director, Contract Research and Development Cyber Solutions Division, Northrop Grumman Information Systems
  • Tim Gooch, CEO and Executive Director, iWebGate
  • Gregg Smith, CEO, OptioLabs
  • Zuly Gonzalez, Co-founder and CEO, Light Point Security
  • Dr. Jennifer Reynolds, Director of Venture Creation, bwtech@UMBC

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework
Room 302
  • Abstract

    Few topics affect Maryland's business executives today more than cybersecurity. Our staff and our information are at risk, and yesterday's tools aren't keeping up with the challenges. Even baseball isn't necessarily secure anymore. Well prepared executives, however, can turn these risks to a competitive advantage.The National Institute of Standards and Technology (NIST) released the Framework for Improving Critical Infrastructure Cybersecurity (the Cybersecurity Framework) in Feb 2014 to help companies understand the goals and objectives for a holistic cybersecurity program. Since its release, the Cybersecurity Framework has been adopted by many companies within and outside the critical infrastructure to help determine the appropriate level of security for their organization. This session provides: an interactive group discussion for sharing experience and challenges in implementing cybersecurity protections; several group exercises to better understand the Cybersecurity Framework approach; discussion about an approach for defining threats to your organization; understanding about how those threats can use vulnerabilities to disrupt or harm your business; and, discussion about how your organization can use action plans to track cybersecurity improvement.

  • Introduction
  • Ursula Powidzki, Assistant Secretary, Business and Enterprise Development, Maryland Department of Business & Economic Development
  • Speakers
  • Tom Conkle, Cybersecurity Engineer, G2, Inc.
  • Greg Witte, Sr. Cybersecurity Engineer, G2, Inc.

TRACK E: SECURING CYBER'S FUTURE

Visit Industry Showcase
Room 301
10:30 AM -
10:45 AM
10:45 AM -
11:15 AM

TRACK A: CYBER RISK

Blind to the Breach - Helping Enterprises See the Light
Room 309
  • Abstract

    Facing the harsh realities of today's security environment, industry researchers have concluded that the average time to detect and remove cyber threats is a jaw dropping 240 days. What's worse, the average cost per incident leaves the gaping hole of $11.6 million in any given organization's wallet. Collectively, experts can agree that traditional solutions like anti-virus and network perimeter are necessary solutions but alone are not effective at detecting and stopping advanced threats; coupled with too many alerts and false positives to review and not enough skilled IT security workers to respond to the influx of threats - today's organization doesn't stand a chance.

  • Introduction
  • Ira E. Hoffman, Of Counsel, Butzel Long
  • Speaker
  • Todd Weller, VP, Corporate Development, Hexis Cyber Solutions

TRACK B: CYBER WORKFORCE & EDUCATION

A Holistic Graduate Business Information Technology and Cybersecurity (BITCYBER) Program
Room 308
  • Abstract

    Information technology and cybersecurity drives the mission of modern organizations. Organizational leaders must have a holistic interdisciplinary approach in order to be successful. Existing graduate MBA programs do not cover what students need in technology and cybersecurity. Due to a misplaced focus on STEM, existing IT and cybersecurity programs do not cover what students need in business and analytics. Yet cybersecurity is a business discipline - a STEMB field where the B stands for Business. Students with any background should be able to lead organizations with a technology and cybersecurity powered strategy. Dr. Mansur Hasib shares the evolution of cybersecurity from the 1990s to the present and his vision for the new Master and Doctor of Science programs in Business Information Technology and Cybersecurity which he has developed

  • Introduction
  • Chris Ensey, Chief Operating Officer, Dunbar Cybersecurity
  • Speaker
  • Dr. Mansur Hasib, Cybersecurity and Healthcare Leader, UMBC

TRACK C: CYBER INNOVATION

Cyber Defense Toolbox
Room 303
  • Abstract

    The recent onslaught of cyber attacks have left many organizations re-evaluating what's in their toolbox to help combat cyber crimes. Having the right armour for pre- and post-cyber attack strategies is the key to survival. Learn how these five innovative products can help you defend your network in real-time. Hear a panel of product development experts and technologists provide insight on next generation tools designed to protect business and personal assets.

  • Moderator
  • Dr. Aviel (Avi) D. Rubin, Professor of Computer Science and Technical Director of the Information Security Institute, Johns Hopkins University
  • Speakers
  • Robert Lord, Co-Founder, Protenus
  • Andre McGregor, Director, Cyber Security, Tanium / FBI Cyber Special Agent (former)
  • John Pirc, Chief Strategy Officer, Bricata, LLC
  • Anuja Sonalker, Ph.D, VP Engineering & Operations, North America, TowerSec Automotive Cyber Security
  • Dr. Daniel J. Rogers, CEO, Terbium Labs

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Disclosure at the Speed of Mobile: What Needs to Change with Today’s Risk Management
Room 302
  • Abstract

    Mobile is different. When compared to traditional PCs, mobile devices have a unique attack surface - including a differing operating system, user configuration, application set, and network setup. This attack surface has expanded exponentially - along with the global adoption of mobile devices themselves - yet industry policies and processes have not kept pace. During this presentation hear a discussion on how users and enterprises are bearing the true mobile risk and why disclosure policies in the industry must change to better protect private and sensitive data.

  • Introduction
  • Larry Collins, Director Foreign Trade, Zone #74, Baltimore Development Corporation
  • Speaker
  • Andrew Hoog, CEO, Co-Founder, NowSecure

TRACK E: SECURING CYBER'S FUTURE

Cybersecurity Before the 1s and 0s
Room 301
  • Abstract

    Corporate, Government, and personal reliance on the global information technology endpoints, networks (public and private), and services (on premise, mobile and cloud) has created a target-rich environment for misuse and personal gain, which has resulted in an unprecedented rise in the number and sophistication of cyber-attacks and cyber-crimes.

    To address this trend, it is no longer enough to simply lock down the enterprise. Today, Chief Information Security Officers are forced to defend not only the perimeter and against insider threats, but now also must ensure that their extended enterprise, including their global supply chain, is protected from cyber-attacks. Perimeter defense strategies are struggling to hold off the increasing sophistication, frequency, and scale of cyber-attacks and the rapid adoption of new, disruptive IT technologies such as social, mobile and cloud. Because the threats and technologies are changing so rapidly, it is becoming increasingly critical that the end-to-end supply chain be defended against insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software, as well as poor manufacturing and development practices.

    Supply Chain Risk Management (SCRM) helps reduce supply chain vulnerability via a coordinated approach, involving all supply chain stakeholders, which identifies and analyzes the risk of failure points within the supply chain. That being said, SCRM is not a holistic cyber defense strategy, but must be a holistic part of an entire IT infrastructure life-cycle approach that includes design, purchase, integration, deployment, operations and maintenance, and disposal.

    Hear about the benefits of SCRM and the additional effective defense strategies that augment SCRM in order to ensure the integrity of the combined set of hardware, software, networks, facilities, etc. that comprise today's extended-enterprise IT infrastructure environment.

  • Introduction
  • Larysa A. Salamacha, Managing Director of Business Development, Baltimore Development Corporation
  • Speaker
  • Mike Myers, President, CyberCore Technologies
11:15 AM -
11:20 AM
11:20 AM -
11:50 AM

TRACK A: CYBER RISK

Removing Blind Spots in Your Network Visibility to Stop Data Theft
Room 309
  • Abstract

    The only way to alter to the skyrocketing breach trajectory is to change the way you view cyber threats, literally. Most organizations spend the most resources watching the attack vector to stop adversaries from getting in. Since advanced evasion techniques make it impossible to prevent all attacks, you must have visibility into network behavior in real time and over time. Adversaries are patient and persistent; they can't have free reign.

  • Introduction
  • Ira E. Hoffman, Of Counsel, Butzel Long
  • Speaker
  • Stephen Newman, CTO, Damballa

TRACK B: CYBER WORKFORCE & EDUCATION

Building the Nation's Cybersecurity Workforce
Room 308
  • Abstract

    The cybersecurity workforce is essential to defending our national's critical infrastructure: The National Cybersecurity Workforce Framework (Workforce Framework) is the foundation for increasing the size and capability of the US cybersecurity workforce. It was developed to categorize and provide a common language for defining cybersecurity work. The Workforce Framework groups cybersecurity work into Categories, which are further organized into Specialty Areas, knowledge, skills, and abilities (KSAs), and tasks.The Workforce Framework provides the necessary structure for employers, educators, trainers, and policy makers to develop the cybersecurity workforce, by helping to align degrees, jobs, training, and certifications. Come learn about the Workforce Framework and how you can use it to strengthen the cybersecurity workforce!

  • Introduction
  • Chris Ensey, Chief Operating Officer, Dunbar Cybersecurity
  • Speaker
  • Benjamin Scribner, Program Director, National Cybersecurity Professionalization & Workforce Development Program, U.S. Department of Homeland Security

TRACK C: CYBER INNOVATION

Cyber Defense Toolbox (Continued)
Room 303

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Growing Up In Cyber, Growing Up In Cyber Maryland
Room 302
  • Abstract

    Communications Security, Computer Security, Information Security, Information Assurance, Information Operations, Cyber Security: through a 35-year career at the National Security Agency, and now with the non-profit Center for Internet Security, Tony has been a participant, observer, and shaper of the world we now call Cyber Security. Since he's never had another job (or some might say, never had a real job), through the lens of his career he will share his observations about the evolution of Cyber Security from a de facto government monopoly focused on national security and technology, to an issue that touches every one of us, in every aspect of our lives. Beyond the bumper stickers and rah-rah of Public-Private-Partnership, he'll also describe the new models of cooperation between government and industry that we need for success.

  • Introduction
  • Larry Collins, Director Foreign Trade, Zone #74, Baltimore Development Corporation
  • Speaker
  • Tony Sager, Senior VP and Chief Evangelist, The Center for Internet Security

TRACK E: SECURING CYBER'S FUTURE

Vehicle System Forensics
Room 301
  • Abstract

    The automotive industry is one of the leading industries in the world, topping 2.6 trillion dollars in annual sales. Over the past several years, automotive manufactures have been adding advanced technology to seamlessly and safely integrate access to our digital lives from within our vehicles. The industry is evolving; our vehicles are no longer simply used to take us from place to place. Today's vehicles are increasingly providing an experience that entertains and informs us, while allowing us to remain connected to our digital world.

    Vehicle Infotainment and telematics systems store a vast amount of data. Traditionally, this includes navigation history such as recent destinations and favorite locations as well as telematics data, which include call logs, contact lists and SMS messages. However, the amount of data these systems contain has increased to also include emails, pictures, videos and social media feeds. Many systems record events such as when and where a vehicle's lights are turned on, which doors are opened and closed at specific locations, and even where the vehicle is when Bluetooth devices connect.

    When vehicles with these systems are connected with criminal activity, this data can contain vital evidence. However, retrieving this data can be challenging. In a many vehicles multiple systems can be responsible for recording data, each requiring a difference method of acquisition and analysis. This presentation will address the data stored in several different infotainment and telematics systems and touch on methods used to acquire and analyze it.

  • Introduction
  • Larysa A. Salamacha, Managing Director of Business Development, Baltimore Development Corporation
  • Speaker
  • Carly McGee, Digital Forensic Analyst and Marketing Coordinator, Berla Corporation
11:50 AM -
12:00 PM
12:00 PM -
1:15 PM
Lunch Mid-day Presentation
  • Presentation TBD
1:15 PM -
1:30 PM
1:30 PM -
2:15 PM

TRACK A: CYBER RISK

Reduce Your Risk of Compromise Through Integrated & Automated Active Cyber Defense (media not permitted)
Room 309
  • Abstract

    Many organizations adopt "Defense in Depth," yet a SANS Institute Report, Defense in Depth: An Impractical Strategy for a Cyber World, points out that this strategy "Is insufficient to defend against multi-phased attacks that occur against People, Process, and Technology." Furthermore, the report states that this strategy "combined with the business practices and standards like ISO, COBIT or ITIL have resulted in creating silos that are no longer actually connected but rather handled like the baton in a relay race.[as well as creating] an opportunity for attackers to fly under the radar and establish persistence in a network.[resulting] in missed detections giving the advantage to the attacker."

    With today's advanced cyber threats attacking the enterprise at multiple points with multi-staged processes to evade cyber defense point solutions, we need a better strategy. Join us to learn how the DoD, in collaboration with KEYW Corporation, Fire Eye, Hexis Cyber Solutions, Palo Alto Networks, and Splunk developed an active cyber defense framework that coordinates the identification, verification, and removal of threats across perimeter, network, and endpoint cyber defense products to solve this problem and reduce risk of compromise.

  • Moderators
  • Patrick Arvidson, Director for Defending DOD Networks and Mission Assurance OSD, Office of the Principal Cyber Advisor
  • Russell Glenn, Director Cybersecurity, KEYW Corporation
  • Panelists
  • Chris Fedde, President, Hexis Cyber Solutions
  • John Stoner, Federal Security Strategist, Splunk
  • Ryan Gillis, Vice President of Government Affairs and Policy, Palo Alto Networks
  • Travis Rosiek, Federal CTO, FireEye

TRACK B: CYBER WORKFORCE & EDUCATION

No Degree Required: Building the Cyber Workforce with Practical Education & Experience
Room 308
  • Abstract

    Gone are the days where a four-year degree in Engineering, Computer Science, and/or Mathematics must define the minimum qualification for an entry level cyber security professional. Year Up Baltimore, in partnership with Symantec, initiated a Cyber Security Workforce Training Program with Baltimore City Community College (BCCC) specifically designed to train young adults with the cyber skills, experience, and support required to succeed on a corporate IT team. Selected students are immersed in a single semester of structured academic instruction following BCCC's Cyber Security curriculum including the basic cyber security knowledge, skills, and abilities required to fill an entry level position. The panel for this discussion includes the Executive Director from Year Up Baltimore, the Manager of the Symantec Global Security Office, Baltimore City Community College a_" Cybersecurity Program Coordinator, and a recent graduate of the Year Up Cybersecurity Professional Training Corps

  • Moderator
  • Robert C. Smith, Chief Cybersecurity Engineer, Leidos, Inc.
  • Speakers
  • Cullen Covington, Level 1 Security Analyst, Symantec
  • Bryant Binnix, Symantec
  • Raphael Rosenblatt, Interim Executive Director, Year Up Baltimore

TRACK C: CYBER INNOVATION

Accessing Innovative Technology to Gain Market Advantage: How Businesses Can Leverage NSA Technology
Room 303
  • Abstract

    Promising new tech startups, growing mid-sized tech businesses, established, large tech firms - they all have one thing in common.the need to distinguish their product from similar offerings on the market to gain MARKET ADVANTAGE. With over 200 innovative technologies available for license, the NSA Technology Transfer Program may have exactly what you need to gain that competitive edge. Discover how companies have found profitability through leveraging NSA technology. Learn how the NSA Technology Transfer Program can help you access the agency's cutting edge technology and put it to work for you.

  • Linda L. Burger, Director, NSA's Technology Transfer Program (TTP)
  • Joe Witt, Senior Director of Engineering, Hortonworks
  • Mike Geppi, CEO, Integrata Security

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Cyber Shark Tank
Room 302
  • Submit a Proposal
  • Abstract

    Witness live CyberMaryland's first Cyber Shark Tank event. Hear five investor "sharks" critique the concepts, products and business models of select early-stage cyber start-up companies. Participants will have 15 minutes to impress investors. Top companies will walk away with cash prizes and invaluable insight on how to scale their venture, secure funding and maintain a viable growth model.

  • Cyber Shark Tank Judges
  • Elizabeth Richards, Senior Lead for Cyber at the Laboratory for Analytic Sciences (LAS), NSA
  • John Serafini, Vice President, Allied Minds
  • Rick Kohr, Founder/CEO, Evergreen Advisors, LLC
  • Nick Superina, Partner, QuestMark Partners
  • Jason Tagler, Partner, Camden Partners

TRACK E: SECURING CYBER'S FUTURE

Not Just Tech: Why Greater Emphasis on the Law and Policy of Cybersecurity is Critical.
Room 301
  • Abstract

    Public and private sector organizations must have the capacity to address legal and policy issues in cybersecurity as there are many complex and difficult questions that go beyond purely technical capabilities. For example: What are the obstacles to sharing cyber threat information between government and the private sector? How much should an organization invest in cybersecurity? To what extent can an organization monitor the internet traffic of employees to keep its networks safe? What legal requirements and response procedures do businesses have after they've suffered a cyber attack? Should a victim "hack-back" against an attacker to protect themselves from further damage?

    This panel session will (1) highlight why a greater emphasis on law and policy issues in cybersecurity is critical (2) help conference participants identify major legal and policy issues in cybersecurity (3) outline how organizations can incorporate legal and policy awareness at all levels.

  • Dan Caprio, Co-Founder and Chairman, The Providence Group
  • Michael Greenberger, Law School Professor, University of Maryland Francis King Carey School of Law, Founder and Director, University of Maryland Center for Health & Homeland Security
  • Jonathan Litchman, Co-Founder and CEO, The Providence Group
  • Markus Rauschecker, Senior Law & Policy Analyst, University of Maryland Center for Health and Homeland Security
  • Mark Cather, Chief Information Security Officer, UMBC
2:15 PM -
2:30 PM
2:30 PM -
3:15 PM

TRACK A: CYBER RISK

Shedding Light on the Dark Side of the Insider Threat
Room 309
  • Abstract

    While IT security professionals focus on securing servers and databases, they often ignore the potential threat that looms within their organization. After all, signs aren't always obvious when sensitive data is being threatened by an insider. In fact, of all forms of cyberattack, insider attacks are less likely to be detected and are capable of causing the most damage. According to a study funded by the U.S. Department of Homeland Security, insider threats are capable of going undetected for an average of 32 months.

  • Moderator
  • Larry Letow, President/CEO, Convergence Technology Consulting
  • Panelists
  • Jim Mazotas, CEO, OnGuard Technologies
  • Tom Glaser, Vice President for Information Technology, Howard Community College
  • Jeff Six, Vice President, T. Rowe Price

TRACK B: CYBER WORKFORCE & EDUCATION

Hiring Success Stories from the Frontlines: A Candid Conversation Between Cybersecurity Recruiters and Jobseekers
Room 308
  • Abstract

    A Candid Conversation Between Cybersecurity Recruiters and Jobseekers: Recruiting the right candidates makes all the difference between a successful program and one that cannot fulfill its contract or commercial obligations. But with the current cybersecurity talent shortage, what can a company do to be successful? While there are many programs that will be developing a cybersecurity workforce, what can be done now to engage the talented tech professionals that each company needs now to be successful? Recruiting and workforce development have typically been back office operations but now successful companies are bringing recruiting into other part of the management. And how are highly sought after tech candidates perceiving this pursuit of their skills? Cybsersecurity candidates have been quite vocal on social media and in blogs on how their mistreatment by companies and their recruiters. We will delve into the challenges experienced by both recruiters and cybersecurity professionals on the front line of this cybersecurity talent war and share some of the success stories from local Finally, we will hear how the Cyber Pathways Initiative will be assisting educators and employers in Maryland.

  • Moderator
  • Kathleen Smith, Chief Marketing Officer, ClearedJobs.Net
  • Speakers
  • Leslie Taylor, Senior Talent Manager, ICF International
  • Kirsten Renner, Talent Management, Parsons
  • Neal Anders, Lead Software Engineer, Research & Development at Tenable
  • Frank Skinner, Director for Cyber Pathways Across Maryland Initiative, Montgomery College

TRACK C: CYBER INNOVATION

Effective Approaches to Continuous Monitoring
Room 303
  • Abstract

    Hear the region's top cyber experts discuss effective approaches to continuous monitoring systems designed to enhance an organization's ability to test for inconsistencies, policy violations and other breakdowns in internal controls.

  • Moderator
  • Christopher Ensey, Chief Operating Officer, Dunbar Cybersecurity
  • Speakers
  • Sandra Toner, Technical Specialist, ICF International
  • Steven Chen, CEO, PFP Cybersecurity
  • George Romas, Chief Engineer, Cybersecurity Practice, Hewlett Packard
  • Dave King, Technical Director, General Dynamics Mission Systems
  • Kevin Greene, Software Assurance Program Manager, Department of Homeland Security Science & Technology Directorate

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Cyber Shark Tank (cont.)
Room 302

TRACK E: SECURING CYBER'S FUTURE

Identity and Access Management: Challenges, Tradeoffs and Payoffs for Businesses
Room 301
  • Abstract

    Difficult to implement correctly, Identity and Access Management (IdAM) is an integral security capability for many businesses, helping to manage access for end users, applications, and devices. In recent projects, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) architected, designed, and implemented IdAM using standards and best practices for a variety of industry environments.

    Through this panel discussion, gain new perspectives on IdAM infrastructures from NCCoE engineers and their industry partners in recent projects. With a special focus on an example solution for the electric utility industry - hot off the NCCoE presses in September 2015 -- attendees will gain an understanding of how to implement IdAM effectively. Panelists will engage the audience in a discussion about IdAM implementation in different types of enterprises, how to make the necessary architectural and implementation trade-offs, and what challenges remain.

  • Moderator
  • Steve Battista, MITRE
  • Panelists
  • William (Bill) Fisher, Senior Engineer, National Cybersecurity Center of Excellence at NIST
  • Jasvir Gill, Founder and CEO, AlertEnterprise
  • Lila Kee, Chief Product Officer & Marketing Officer, GlobalSign
3:15 PM -
3:30 PM
3:30 PM -
4:15 PM

TRACK A: CYBER RISK

Building Your Light House: Cyber Risk Intelligence In Your Risk Management Program
Room 309
  • Abstract

    Is your organization well-positioned for cyber threats? How often do you hit barriers when trying to discuss cyber strategy with leadership? To effectively communicate with executives, you have to boil it down to what makes the most sense to them; it's s not about the bits and bytes. Learn how cyber risk intelligence gives you needed situational awareness and can help you effectively communicate cybersecurity issues with other lines of business and executive leadership. With cyber risk intelligence you can gain a view of relevant threats to your business from all angles and understand what threat actors are active in your space, what targets those actors are looking to exploit, what effects or harm those actors are causing with their efforts and what practices are used.

  • Adam Meyer, Chief Security Strategist, SurfWatch Lab

TRACK B: CYBER WORKFORCE & EDUCATION

Cyber Insecurity: Why Our Education System Fails at Cyber Training
Room 308
  • Abstract

    According to a survey released by the National Cyber Security Alliance and Symantec, while almost 70% of small to medium-sized businesses believe that Internet security is essential to business success, 77% of them have no formal written Internet policy for their employees. How can there be such a large discrepancy between what business owners believe and the cybersecurity steps they take?

    Cybersecurity instructors with their in-depth knowledge of protecting networks and preventing cyber attacks are the vanguard for training the public in cyber operations. More and more, these professionals recognize that students across the country are graduating secondary education with little understanding of cybersecurity principles. The reason is clear: these highly specialized skills simply aren't a focus of formal education; where most students only learn the basics in Information Technology and simple coding skills.

    Why aren't cybersecurity basics introduced and reinforced with students at an earlier age? Can education systems, with a renewed focus on cybersecurity basics, help the U.S. overcome the growing deficit of qualified cybersecurity professionals? What resources are available to public schools for integrating cybersecurity fundamentals in their computer-related classes?

    Cyber Insecurity: Why Our Education System Fails at Cyber Training is a TED-style discussion of the seriousness of this problem, by one of TeleCommunication Systems Inc.'s most highly sought after speakers on digital mobile forensics. Combining professional insights with studies and survey results, this 45-minute presentation provides the concrete steps that elementary, middle, and high school computer training programs should take to introduce (and reinforce) cybersecurity fundamentals throughout a student's formative years. The talk also points to publicly available resources for schools that want to be at the forefront of cybersecurity training.

  • Introduction
  • Robert Zitz, Senior Vice President & Chief Systems Architect, Leidos
  • Speaker
  • Courtney Lancaster, Forensic Subject Matter Expert, TeleCommunication Systems, Inc. (TCS) - Cyber Intelligence Group

TRACK C: CYBER INNOVATION

Effectively Balancing your Threat Detection Strategy Against Known and Unknown Threats
Room 303
  • Abstract

    Threat intelligence is a critical component of any threat detection strategy. The upside of threat intelligence monitoring is a cheap and reliable way of generating investigative leads for analysts. On the downside, most threat intelligence is provided without context and is reliant on someone else finding and publishing the indicators of compromise for them to be effective in your environment.

    Join threat detection and incident response specialist Wade Woolwine to learn about the new techniques in user and attacker behavioral analysis that have empowered analysts to generate additional investigative leads aimed at identifying unknown malware. In this presentation, Woolwine, who heads Rapid's incident response services and previously worked for Mandiant/FireEye's Managed Defense business unit, will discuss how to effectively leverage the strengths of threat intelligence, balanced with behavioral analysis and tactical monitoring for critical assets. Audience members will also gain strategies for building a well-rounded threat detection program to identify known and unknown threats.

  • Introduction
  • Patrick Wynn, Vice President, LifeJourney
  • Speaker
  • Wade Woolwine, Manager of Strategic Services, Rapid7

TRACK D: CYBER INVESTMENTS & EMERGING OPPORTUNITIES

Cyber Investor Connection
Room 302
  • Abstract

    Meet face-to-face with the nation's most successful cyber investors and bankers during the Investor Meetup event. To participate, companies must complete a pre-event registration process. To learn more visit, ________.

TRACK E: SECURING CYBER'S FUTURE

Secure Development is an Afterthought – Time to Give a Seat at the Security Table
Room 301
  • Abstract

    You can't attend a security event without hearing the security vendors tout threat intelligence, advanced malware detection, patch management, continuous monitoring, intrusion prevention, and so on and so on. These are all mainstream cyber security solutions that are top of mind, but don't address the underlying security issue - where many of these vulnerabilities originate.

    Unfortunately, the majority of mainstream security solutions focus on inbound threats and are aimed at known vulnerabilities. The common denominator? They are all after the fact. During this session, we will discuss how addressing potential weaknesses and security flaws before internal applications are fully in production, you can greatly limit risk exposure right out of the gate.

  • Paul Roberts, Editor-in-chief, Security Ledger
  • John Dickson, Principal, Denim Group