NSA Information Assurance Symposium (IAS) 2017



Tracks

Track 1: Integrating and Delivering IA Security Capabilities and Services

Our Nation is facing increasingly sophisticated and persistent cyber threats, by domestic and foreign actors that pose strategic, economic, and national security challenges. To stay ahead of our adversaries, integration and partnership is a must. The threat is greater than any single entity acting alone can manage and only by acting together can we successfully increase our collective ability to defend our Nation’s intellectual property and sensitive information. As the USG’s premier provider of cyber and information assurance capabilities for the Nation, NSA delivers long-term cyber capabilities and services based on emerging threats as well as fortifying our information and communication networks within the cyber domain. This track will help explore next generation capabilities and services (to include but not limited to Cryptographic, Architecture, and Identification, Authorization & Authentication), from concept to operations, to meet the national security and USG challenges of tomorrow.

Track 2: Integrated Cyber Defense

This track will showcase capabilities, services, policies and activities that enable and improve integrated cyber defense from partners across the intelligence community, DoD, US Government, and private sector. This includes signature sharing, interoperability, increased situational awareness, automated and timely threat intelligence sharing, big data analytic environments for discovery of new tradecraft, smarter and better informed sensors, and countermeasures that can be deployed widely. It will also focus on technology trends that improve the discovery, characterization and mitigation of Cyber threats.

Track 3: Sustaining a Cyber Workforce

As new threats in the cyberspace domain continue to increase the risk to our networks and way of life, the need to develop and sustain a ready cyber workforce is critical. Rapid and ever-changing cybersecurity challenges call for a technically diverse foundation of people, processes, and policies. This track will explore concepts and strategies for continuously shaping the cybersecurity workforce to meet future challenges and to protect our national equities.

Session Selection

If you have already registered and would like to change your session selection, please click here

Keynotes

To view the keynote speakers, please click here

Agenda

IAS 2017 will focus on technology trends and best practices, integrated cyber defense capabilities, integrating and delivering information assurance and cybersecurity capabilities and services, and how to develop and sustain a workforce of cybersecurity professionals to increase the Nation’s security at scale. Our goal is to present thoughtfully planned topics that highlight lessons learned from key initiatives, or provide opportunities for collaborative further exploration.

Click a block to view session details

Print Agenda
Monday, June 19, 2017
TimeAgenda Item
8:30 AM -
4:30 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1

BCC 325/326


Seven Laws of Cyber Power - A New Paradigm for Security
Track 1

BCC 330


Risk is Now Virtual: Managing Risk Associated with Third Party Services
Track 1

BCC 329


Streamlining Cryptologic Evaluation for the U.S. Government
Track 2

BCC 327


Breaching the Cyber-Kinetic Barrier (LookingGlass)
Track 2

BCC 328


Air Force Integrated Cyber Defense
Track 2

Holiday 5


Cybersecurity Operations Mission Integration
Track 3

Holiday 1 & 2


Finding and Developing the Cyber Ninjas the Nation Needs
Track 3

BCC 322/323


Risk Management Framework - Are we more secure now than we were before?
Track 3

BCC 331


Keep One Step Ahead
Big Bets & Game Changers

Swing Hall


Do or Do Not, There is No Try: Doing Machine Learning for Cyber Defense

11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1

BCC 327


"What Would You Do If You Knew..." Using Threat Information to Inform the IA Mission
Track 1

BCC 329


JFHQ-DoDIN Update/DCO Overview
Track 1

BCC 322/323


Commercial Solutions for Classified Panel: What Do Customers Say?
Track 2

BCC 325/326


Cybersecurity Innovation Showcase: Integration, Automation and Beyond
Track 2

BCC 328


Security Operations and The Red Blinky Light
Track 2

Holiday 4 & 5


Cybersecurity Operations Integration with an Ops Center focus
Track 2

Holiday 4


Creating an Adaptive Security Architecture Framework to Combat Advanced Threats
Track 3

Holiday 1 & 2


Moving to Cybersecurity as a Service, But Remember the Basics!
Track 3

BCC 321


Beyond the CIA Triad: The 9 Point Core Security Principles Star Versus The CIA Triad For Better Risk Evaluation and Mitigation Strategies
Track 3

BCC 331


Let's Talk to the Engineer in the Cyber Analyst
Big Bets & Game Changers

Swing Hall


Internet of Things – Understanding the Impact of Technology Evolution

12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1

BCC 327


Releasibility and Its Security Implications
Track 1

BCC 329


Compound Identity Measure and Multi-level Passwords for Operations - Picture Driven Authentication and Authorization
Track 1

BCC 330


DIB Collaborative Information Sharing Environment (DCISE) Overview
Track 2

BCC 325/326


Evaluating Security Automation and Orchestration - Maturity Models and Use Cases
Track 2

BCC 328


Better Safeguarding DoD Information on DoD Contractor Networks
Track 2

Holiday 4 & 5


Intelligence-driven, adversary planning process: Strategy-to-Task Opposition Pursuit (STOP)
Track 3 (ends at 3:30)

Holiday 1 & 2


The Ups, Downs, and Fatigue of Sustaining a Highly Trained Cyber Workforce
Track 3

BCC 332


Cyber Competitions: Are they developing the skills the workforce needs?
Track 3

BCC 322/323


A qualified cyber workforce...What does that look like for DoD?
Big Bets & Game Changers

Swing Hall


Allied Interoperability

2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1

BCC 327


Threat-Based Requirements and Engineering
Track 1

BCC 329


Trusted Execution Environment Capabilities
Track 1

BCC 330


Commercial High Bandwidth Optical Platform (CHOP)
Track 2

BCC 325/326


"Groundhog Day" to "Independence Day" - Scripting Your Cyber Defense Movie
Track 2

BCC 328


How the ISPs Fight the Bad Guys with Integrated Cybersecurity Technology and Architecture
Track 2

Holiday 5


Understanding the Cyber Threat: A Holistic Cyber Threat Framework for Product Development and Sharing
Track 3

Holiday 1 & 2


Educating Future Military Cyber Defenders
Track 3

BCC 332


Teaching Cyber-Literacy
Track 3

BCC 331


NATO Cyber Capability - Fact or Fiction
Big Bets & Game Changers

Swing Hall


Blockchain and Information Assurance

4:30 PM -
6:00 PM
Social

Exhibit Hall E


Networking Social - Hosted by Raytheon

Tuesday, June 20, 2017
TimeAgenda Item
8:30 AM -
4:30 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1

Holiday 6


Next Generation Secure Mobile Communications Solution
Track 1

BCC 329


Securing the Key Management Process: Physical EKMS to KMI
Track 1

BCC 322/323


Automating, Visualizing, and Scaling NIST Risk Management Framework
Track 2

BCC 325/326


FireEye Security Orchestration, Mandiant: Codifying Front Line Expertise into Automation
Track 2

Holiday 4 & 5


Shaping the Cybersecurity PIT/ICS/OT Landscape for DoD
Track 2

BCC 328


Automated Cyber Defense: Lessons Learned from the DARPA Cyber Grand Challenge
Track 2

BCC 324


Creating a Security Nerve Center for Incident Response in the New Threat Landscape
Track 3

Holiday 1 & 2


Transforming Cybersecurity Workforce through Collaborations
Track 3

BCC 332


Academic Outreach under NSA21
Track 3

BCC 331


Government-Industry Collaboration: What's the Value?
Big Bets & Game Changers

Swing Hall


7 Most Dangerous Attack Techniques

11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1

BCC 327


Sparking Space Cybersecurity
Track 1

BCC 329


Physical to Electronic Key Distribution
Track 1

Holiday 6


Supply Chain Risk Management (SCRM) in DoD – Past, Present, and Future
Track 1

BCC 324


Security for the digital transformation - Scalable methods for software and supply chain assurance
Track 2

BCC 325/326


SHARKSEER: A Year in Transition
Track 2

Holiday 5


Integrating Cyber Defenses Across Borders - The NATO Cyber Defense Pledge
Track 2

BCC 328


Flexible Alert Triage: Using a Flexible, Rapid Time to Mission Value API Integration Framework to Speed-Up Alert Triage with Less Custom Development
Track 3

BCC 331


Sustaining a Skilled Cyber Workforce Through Diversity of Education
Track 3

BCC 332


Guide to Sustaining a Cybersecurity Workforce
Track 3

Holiday 1 & 2


Certifications vs Degrees Panel
Big Bets & Game Changers

Swing Hall


Women in Cyber Workforce Panel

12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1

BCC 327


Evaluating Mobile Applications for use in the DoD
Track 1

BCC 329


The Future of Key Management in the 21st Century
Track 1

Holiday 6


Cyber Resilient Platforms and Systems
Track 1

BCC 322/323


Commercial Insight on Mobile Device Security – System-on-Chip Protection Profile and IoT Device Security
Track 2

BCC 325/326


SHARKSEER: Active Boundary Defense - Support to U.S. Cyber Defenders
Track 2

Holiday 5


The Comprehensive Hunt and Ultimate Cyber Kit (CHUCK) Project
Track 2

Holiday 3


Integrated Adaptive Cyber Defense (IACD) Overview & Architecture
Track 3

Holiday 1 & 2


Cybersecurity Range
Track 3

BCC 332


The Professionalization of CyberSecurity
Track 3

BCC 331


DoD Cyber Excepted Service (CES)
Big Bets & Game Changers

Swing Hall


The IC and Innovation in the Start-Up Community

2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1

BCC 327


Automating NIAP Requirements for Vetting Mobile Apps
Track 1

Holiday 6


Post-QUANTUM Cryptography Standardization Plan
Track 1

BCC 329


Laying the Cyber Foundation: The Science of Security & Privacy
Track 2

BCC 325/326


NIST Cybersecurity Framework and IACD Playbook
Track 2

Holiday 5


Russia-Georgia Cyberwar Seminar
Track 2

BCC 322/323


Honey, I Hacked The SCADA!: Industrial Controlled Systems
Track 2

BCC 324


Cyber Survivability Endorsement (CSE)
Track 3

Holiday 1 & 2


Building the Federal Cybersecurity Workforce through Role-Based Training Panel
Track 3

BCC 332


How to identify and code civilian cyber workforce positions - a DoD Enterprise perspective
Track 3

BCC 331


How to Tackle the Shortage Problem on Qualified Cybersecurity Instructors?
Big Bets & Game Changers

Swing Hall


Mesh Networking

Wednesday, June 21, 2017
TimeAgenda Item
8:00 AM -
5:00 PM
All Day

BCC 339-340


WALKOFF Developer Challenge

8:30 AM -
2:00 PM
Exhibit Hall Open

8:30 AM -
10:00 AM
General Session

10:15 AM -
11:15 AM
Track 1

BCC 329


Cross Domain Requirements and Engineering Service Provider for the Cross Domain Solutions (CDS) Community
Track 1

Holiday 6


IA Innovations – Tackling IA Hard Problems
Track 1

BCC 327


Practical Considerations to Cloud Security
Track 2

BCC 328


Trust in Automated Indicator Sharing (AIS)
Track 2

BCC 322/323


Real-World Threat Hunting with Hadoop, Accumulo and Spark
Track 2

BCC 325/326


Government Response to Private-Sector Attribution of Cyber Attacks
Track 3

BCC 321


Building a Sustainable Cybersecurity Workforce
Track 3

BCC 332


The Forgotten Factors in Cybersecurity
Track 3

BCC 331


The Information Assurance Support Environment (IASE) of Today and Tomorrow
Big Bets & Game Changers

Swing Hall


NSCSAR - Community of Practice Initiatives

11:15 AM -
11:30 AM
Networking Break

11:30 AM -
12:30 PM
Track 1

Holiday 1 & 2


Raise the Bar Strategy for Improving CDS Security
Track 1

BCC 329


Software Assurance at DevOps Speed and Portfolio Scale
Track 1

BCC 327


DoD Future Enterprise Services and Information Sharing Will Ride On the Cloud
Track 2

BCC 323/322


Achieving Cyber Resiliency through SDN
Track 2

BCC 328


Cyber Protection Team Support at the Speed of Mission Execution
Track 2

BCC 325/326


Cyber Collateral Damage
Track 3

BCC 321


Taking Ownership of Your Cybersecurity
Track 3

BCC 332


Closing the Gap: Community Approach to Cybersecurity Education
Track 3

BCC 331


Service Academy Internship and Visiting Professor Programs
Big Bets & Game Changers

Swing Hall


Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS)

12:30 PM -
1:45 PM
Lunch/Networking Break

1:45 PM -
2:45 PM
Track 1

BCC 325/326


OpenC2: A Proposed C2 of Cyber Defense Technologies
Track 1

BCC 329


Roadmap to Tactical Radio Cryptogrpahic Modernization to Certification and Implementation
Track 1

BCC 327


Ethernet Data Encryption Cryptologic Interoperability Specification (EDE-CIS)
Track 2

BCC 330


IACD Panel with an Integrator Focus
Track 2

BCC 328


IA Guidance on the use of TLS Inspection Proxies
Track 2

BCC 321


Vulnerability Disclosure Program - Bug Bounty
Track 3

BCC 322/323


Understanding what is "the DODIN"
Track 3

BCC 332


Work Roles, A New Lens into NCWF
Track 3

BCC 331


CyberPatriot: Securing Network, Securing Futures
Big Bets & Game Changers

Swing Hall


How NSA Contributes to a National Approach to Cyber Security

2:45 PM -
3:30 PM
Networking Break

3:30 PM -
4:30 PM
Track 1

BCC 330


Adapting the Security Content Automation Protocol to Support a Defensible Network
Track 1

BCC 322/323


Advanced Commercial Solutions for Classified (CSfC) Technologies for Managing and Rapidly Deploying Expeditionary Communications
Track 1

BCC 327


Data Protection
Track 2

BCC 325/326


Operationalizing Threat Intelligence
Track 2

BCC 328


Evolving Cybersecurity Portfolio Management Landscape
Track 2

BCC 329


Cyber Analytics at Extreme Speeds with GPUs
Track 3

BCC 321


National Cryptologic School (NCS) College of Cyber - How can we help each other?
Track 3

BCC 332


Building the Cyber Workforce Pipeline: Preparing for Today, Tomorrow, and the Day After Tomorrow
Track 3

BCC 331


What Got You Here, Won’t Get You There

Back to Top