NSA Information Assurance Symposium (IAS) 2017



Tracks

Track 1: Integrating and Delivering IA Security Capabilities and Services

Our Nation is facing increasingly sophisticated and persistent cyber threats, by domestic and foreign actors that pose strategic, economic, and national security challenges. To stay ahead of our adversaries, integration and partnership is a must. The threat is greater than any single entity acting alone can manage and only by acting together can we successfully increase our collective ability to defend our Nation’s intellectual property and sensitive information. As the USG’s premier provider of cyber and information assurance capabilities for the Nation, NSA delivers long-term cyber capabilities and services based on emerging threats as well as fortifying our information and communication networks within the cyber domain. This track will help explore next generation capabilities and services (to include but not limited to Cryptographic, Architecture, and Identification, Authorization & Authentication), from concept to operations, to meet the national security and USG challenges of tomorrow.

Track 2: Integrated Cyber Defense

This track will showcase capabilities, services, policies and activities that enable and improve integrated cyber defense from partners across the intelligence community, DoD, US Government, and private sector. This includes signature sharing, interoperability, increased situational awareness, automated and timely threat intelligence sharing, big data analytic environments for discovery of new tradecraft, smarter and better informed sensors, and countermeasures that can be deployed widely. It will also focus on technology trends that improve the discovery, characterization and mitigation of Cyber threats.

Track 3: Sustaining a Cyber Workforce

As new threats in the cyberspace domain continue to increase the risk to our networks and way of life, the need to develop and sustain a ready cyber workforce is critical. Rapid and ever-changing cybersecurity challenges call for a technically diverse foundation of people, processes, and policies. This track will explore concepts and strategies for continuously shaping the cybersecurity workforce to meet future challenges and to protect our national equities.

Session Selection

If you have already registered and would like to change your session selection, please click here

Keynotes

To view the keynote speakers, please click here

Agenda

IAS 2017 will focus on technology trends and best practices, integrated cyber defense capabilities, integrating and delivering information assurance and cybersecurity capabilities and services, and how to develop and sustain a workforce of cybersecurity professionals to increase the Nation’s security at scale. Our goal is to present thoughtfully planned topics that highlight lessons learned from key initiatives, or provide opportunities for collaborative further exploration.

Click a block to view session details

Print Agenda

Monday, June 19, 2017
TimeAgenda Item
8:30 AM -
4:30 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1
Seven Laws of Cyber Power - A New Paradigm for Security

BCC 325/326

Track 1
Risk is Now Virtual: Managing Risk Associated with Third Party Services

BCC 330

Track 1
Streamlining Cryptologic Evaluation for the U.S. Government

BCC 329

Track 2
Breaching the Cyber-Kinetic Barrier (LookingGlass)

BCC 327

Track 2
Air Force Integrated Cyber Defense

BCC 328

Track 2
Cybersecurity Operations Mission Integration

Holiday 5

Track 3
Finding and Developing the Cyber Ninjas the Nation Needs

Holiday 1 & 2

Track 3
Risk Management Framework - Are we more secure now than we were before?

BCC 322/323

Track 3
Keep One Step Ahead

BCC 331

Big Bets & Game Changers
Do or Do Not, There is No Try: Doing Machine Learning for Cyber Defense

Swing Hall


11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1
"What Would You Do If You Knew..." Using Threat Information to Inform the IA Mission

BCC 327

Track 1
JFHQ-DoDIN Update/DCO Overview

BCC 329

Track 1
Commercial Solutions for Classified Panel: What Do Customers Say?

BCC 322/323

Track 2
Cybersecurity Innovation Showcase: Integration, Automation and Beyond

BCC 325/326

Track 2
Security Operations and The Red Blinky Light

BCC 328

Track 2
Cybersecurity Operations Integration with an Ops Center focus

Holiday 4 & 5

Track 2
Creating an Adaptive Security Architecture Framework to Combat Advanced Threats

Holiday 4

Track 3
Moving to Cybersecurity as a Service, But Remember the Basics!

Holiday 1 & 2

Track 3
Beyond the CIA Triad: The 9 Point Core Security Principles Star Versus The CIA Triad For Better Risk Evaluation and Mitigation Strategies

BCC 321

Track 3
Let's Talk to the Engineer in the Cyber Analyst

BCC 331

Big Bets & Game Changers
Internet of Things – Understanding the Impact of Technology Evolution

Swing Hall


12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1
Releasibility and Its Security Implications

BCC 327

Track 1
Compound Identity Measure and Multi-level Passwords for Operations - Picture Driven Authentication and Authorization

BCC 329

Track 1
DIB Collaborative Information Sharing Environment (DCISE) Overview

BCC 330

Track 2
Evaluating Security Automation and Orchestration - Maturity Models and Use Cases

BCC 325/326

Track 2
Better Safeguarding DoD Information on DoD Contractor Networks

BCC 328

Track 2
Intelligence-driven, adversary planning process: Strategy-to-Task Opposition Pursuit (STOP)

Holiday 4 & 5

Track 3 (ends at 3:30)
The Ups, Downs, and Fatigue of Sustaining a Highly Trained Cyber Workforce

Holiday 1 & 2

Track 3
Cyber Competitions: Are they developing the skills the workforce needs?

BCC 332

Track 3
A qualified cyber workforce...What does that look like for DoD?

BCC 322/323

Big Bets & Game Changers
Allied Interoperability

Swing Hall


2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1
Threat-Based Requirements and Engineering

BCC 327

Track 1
Trusted Execution Environment Capabilities

BCC 329

Track 1
Commercial High Bandwidth Optical Platform (CHOP)

BCC 330

Track 2
"Groundhog Day" to "Independence Day" - Scripting Your Cyber Defense Movie

BCC 325/326

Track 2
How the ISPs Fight the Bad Guys with Integrated Cybersecurity Technology and Architecture

BCC 328

Track 2
Understanding the Cyber Threat: A Holistic Cyber Threat Framework for Product Development and Sharing

Holiday 5

Track 3
Educating Future Military Cyber Defenders

Holiday 1 & 2

Track 3
Teaching Cyber-Literacy

BCC 332

Track 3
NATO Cyber Capability - Fact or Fiction

BCC 331

Big Bets & Game Changers
Blockchain and Information Assurance

Swing Hall


4:30 PM -
6:00 PM
Social
Networking Social - Hosted by Raytheon

Exhibit Hall E


Tuesday, June 20, 2017
TimeAgenda Item
8:30 AM -
4:30 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1
Next Generation Secure Mobile Communications Solution

Holiday 6

Track 1
Securing the Key Management Process: Physical EKMS to KMI

BCC 329

Track 1
Automating, Visualizing, and Scaling NIST Risk Management Framework

BCC 322/323

Track 2
FireEye Security Orchestration, Mandiant: Codifying Front Line Expertise into Automation

BCC 325/326

Track 2
Shaping the Cybersecurity PIT/ICS/OT Landscape for DoD

Holiday 4 & 5

Track 2
Automated Cyber Defense: Lessons Learned from the DARPA Cyber Grand Challenge

BCC 328

Track 2
Creating a Security Nerve Center for Incident Response in the New Threat Landscape

BCC 324

Track 3
Transforming Cybersecurity Workforce through Collaborations

Holiday 1 & 2

Track 3
Academic Outreach under NSA21

BCC 332

Track 3
Government-Industry Collaboration: What's the Value?

BCC 331

Big Bets & Game Changers
7 Most Dangerous Attack Techniques

Swing Hall


11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1
Sparking Space Cybersecurity

BCC 327

Track 1
Physical to Electronic Key Distribution

BCC 329

Track 1
Supply Chain Risk Management (SCRM) in DoD – Past, Present, and Future

Holiday 6

Track 1
Security for the digital transformation - Scalable methods for software and supply chain assurance

BCC 324

Track 2
SHARKSEER: A Year in Transition

BCC 325/326

Track 2
Integrating Cyber Defenses Across Borders - The NATO Cyber Defense Pledge

Holiday 5

Track 2
Flexible Alert Triage: Using a Flexible, Rapid Time to Mission Value API Integration Framework to Speed-Up Alert Triage with Less Custom Development

BCC 328

Track 3
Sustaining a Skilled Cyber Workforce Through Diversity of Education

BCC 331

Track 3
Guide to Sustaining a Cybersecurity Workforce

BCC 332

Track 3
Certifications vs Degrees Panel

Holiday 1 & 2

Big Bets & Game Changers
Women in Cyber Workforce Panel

Swing Hall


12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1
Evaluating Mobile Applications for use in the DoD

BCC 327

Track 1
The Future of Key Management in the 21st Century

BCC 329

Track 1
Cyber Resilient Platforms and Systems

Holiday 6

Track 1
Commercial Insight on Mobile Device Security – System-on-Chip Protection Profile and IoT Device Security

BCC 322/323

Track 2
SHARKSEER: Active Boundary Defense - Support to U.S. Cyber Defenders

BCC 325/326

Track 2
The Comprehensive Hunt and Ultimate Cyber Kit (CHUCK) Project

Holiday 5

Track 2
Integrated Adaptive Cyber Defense (IACD) Overview & Architecture

Holiday 3

Track 3
Cybersecurity Range

Holiday 1 & 2

Track 3
The Professionalization of CyberSecurity

BCC 332

Track 3
DoD Cyber Excepted Service (CES)

BCC 331

Big Bets & Game Changers
The IC and Innovation in the Start-Up Community

Swing Hall


2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1
Automating NIAP Requirements for Vetting Mobile Apps

BCC 327

Track 1
Post-QUANTUM Cryptography Standardization Plan

Holiday 6

Track 1
Laying the Cyber Foundation: The Science of Security & Privacy

BCC 329

Track 2
NIST Cybersecurity Framework and IACD Playbook

BCC 325/326

Track 2
Russia-Georgia Cyberwar Seminar

Holiday 5

Track 2
Honey, I Hacked The SCADA!: Industrial Controlled Systems

BCC 322/323

Track 2
Cyber Survivability Endorsement (CSE)

BCC 324

Track 3
Building the Federal Cybersecurity Workforce through Role-Based Training Panel

Holiday 1 & 2

Track 3
How to identify and code civilian cyber workforce positions - a DoD Enterprise perspective

BCC 332

Track 3
How to Tackle the Shortage Problem on Qualified Cybersecurity Instructors?

BCC 331

Big Bets & Game Changers
Mesh Networking

Swing Hall


Wednesday, June 21, 2017
TimeAgenda Item
8:00 AM -
5:00 PM
All Day
WALKOFF Developer Challenge

BCC 339-340


8:30 AM -
2:00 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1
Cross Domain Requirements and Engineering Service Provider for the Cross Domain Solutions (CDS) Community

BCC 329

Track 1
IA Innovations – Tackling IA Hard Problems

Holiday 6

Track 1
Practical Considerations to Cloud Security

BCC 327

Track 2
Trust in Automated Indicator Sharing (AIS)

BCC 328

Track 2
Real-World Threat Hunting with Hadoop, Accumulo and Spark

BCC 322/323

Track 2
Government Response to Private-Sector Attribution of Cyber Attacks

BCC 325/326

Track 3
Building a Sustainable Cybersecurity Workforce

BCC 321

Track 3
The Forgotten Factors in Cybersecurity

BCC 332

Track 3
The Information Assurance Support Environment (IASE) of Today and Tomorrow

BCC 331

Big Bets & Game Changers
NSCSAR - Community of Practice Initiatives

Swing Hall


11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1
Raise the Bar Strategy for Improving CDS Security

Holiday 1 & 2

Track 1
Software Assurance at DevOps Speed and Portfolio Scale

BCC 329

Track 1
DoD Future Enterprise Services and Information Sharing Will Ride On the Cloud

BCC 327

Track 2
Achieving Cyber Resiliency through SDN

BCC 323/322

Track 2
Cyber Protection Team Support at the Speed of Mission Execution

BCC 328

Track 2
Cyber Collateral Damage

BCC 325/326

Track 3
Taking Ownership of Your Cybersecurity

BCC 321

Track 3
Closing the Gap: Community Approach to Cybersecurity Education

BCC 332

Track 3
Service Academy Internship and Visiting Professor Programs

BCC 331

Big Bets & Game Changers
Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS)

Swing Hall


12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1
OpenC2: A Proposed C2 of Cyber Defense Technologies

BCC 325/326

Track 1
Roadmap to Tactical Radio Cryptogrpahic Modernization to Certification and Implementation

BCC 329

Track 1
Ethernet Data Encryption Cryptologic Interoperability Specification (EDE-CIS)

BCC 327

Track 2
IACD Panel with an Integrator Focus

BCC 330

Track 2
IA Guidance on the use of TLS Inspection Proxies

BCC 328

Track 2
Vulnerability Disclosure Program - Bug Bounty

BCC 321

Track 3
Understanding what is "the DODIN"

BCC 322/323

Track 3
Work Roles, A New Lens into NCWF

BCC 332

Track 3
CyberPatriot: Securing Network, Securing Futures

BCC 331

Big Bets & Game Changers
How NSA Contributes to a National Approach to Cyber Security

Swing Hall


2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1
Adapting the Security Content Automation Protocol to Support a Defensible Network

BCC 330

Track 1
Advanced Commercial Solutions for Classified (CSfC) Technologies for Managing and Rapidly Deploying Expeditionary Communications

BCC 322/323

Track 1
Data Protection

BCC 327

Track 2
Operationalizing Threat Intelligence

BCC 325/326

Track 2
Evolving Cybersecurity Portfolio Management Landscape

BCC 328

Track 2
Cyber Analytics at Extreme Speeds with GPUs

BCC 329

Track 3
National Cryptologic School (NCS) College of Cyber - How can we help each other?

BCC 321

Track 3
Building the Cyber Workforce Pipeline: Preparing for Today, Tomorrow, and the Day After Tomorrow

BCC 332

Track 3
What Got You Here, Won’t Get You There

BCC 331


Back to Top