The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing.
The technical program covers four tracks:
Tracks include lectures, panel sessions and several will include live demonstrations.
Goals:
Selected Presentations | |
---|---|
September 11, 2015 | Type |
Cybersecurity: Not Just a Sprint, a Marathon Tony Scott |
Keynote |
NIST's Cryptographic Module Validation Program Mr. Michael Cooper - NIST/CSD/ITL |
Presentation |
OVAL Governance & Roadmap David Ries - Joval |
Presentation |
OVAL Repository Transition Bill Munyan |
Presentation |
Sharing Actionable Threat Indicators Using SCAP Jim Hanson - CYBER ENGINEERING SERVICES, INC. |
Presentation |
Sharing Actionable Threat Indicators Using SCAP Jim Hanson - CYBER ENGINEERING SERVICES, INC. |
Presentation |
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense Tony Sager |
Presentation |
Using Risk Management to Improve Privacy in Information Systems |
Presentation |
War Stories from the Cloud: Rise of the Machines John Summers - Akamai |
Keynote |
September 10, 2015 | Type |
Automated Indicator Sharing W. Werntz |
Presentation |
Crowdsourcing Intelligence: Friend or Foe?! Ryan Trost - ThreatQuotient |
Presentation |
Employee Password Usability Survey Yee-Yin Choong |
Presentation |
Entropy as a Service: Unlocking the full Potential of Cryptography Dr. Apostol Vassilev - NIST Mr. Harold Booth - NIST Mr. Robert Staples |
Presentation |
Evolving Security Automation Standards Jessica Fitzgerald-McKay |
Presentation |
File-Sharing Through NGAC/ABAC for Secure Collaboration Mr. David Ferraiolo - NIST/ITL/CSD Gopi Katwala Serban Gavrila |
Presentation |
Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines |
Presentation |
Global Platform Root of Trust Oliver Van Nieuwenhuyze - STMicroelectronics |
Presentation |
Graphic File Carving Demonstration Mr. Rick Ayers - NIST/SSD |
Presentation |
Haven: Shielding Applications from an Untrusted Cloud Galen Hunt - Microsoft Research Marcus Peinado - Microsoft Research Andrew Baumann - Microsoft Research |
Presentation |
Integrated Adaptive Cyber Defense: Integration Spiral Results Wende Peters - Johns Hopkins University Applied Physics Laboratory |
Presentation |
Intel Identity Protection Technology Hormuzd Khosravi - Intel Corporation |
Presentation |
Intel Identity Protection Technology (IPT) Hormuzd Khosravi - Intel Corporation |
Presentation |
LTE Security - How Good is it? Mike Bartock - NIST Jeff Cichonski - NIST Joshua Franklin |
Presentation |
Mobile Application Security for Public Saftey Michael Ogata - NIST |
Presentation |
Mobile Identity Management for Public Safety Yee-Yin Choong Joshua Franklin Kristen Greene |
Presentation |
Overview of ITL's Public Safety Cybersecurity Efforts Dr. Nelson Hastings - NIST Sheila Frankel - NIST |
Presentation |
Security Automation and Continuous Monitoring (SACM) Lisa Lorenzin - Pulse Secure |
Presentation |
Security Automation Program Update Mr. David Waltermire - NIST |
Presentation |
SHARKSEER Zero Day Net Defense Ronald Nielson |
Presentation |
The Cyber Threat Intelligence Sharing Exchange Ecosystem Program Dr. Eric Burger |
Presentation |
The NIST Randomness Beacon Dr. René Peralta - NIST |
Presentation |
Threat-Based "Cyber Operations Rapid Assessment" (CORA) Dr. Lindsley Boiney - The MITRE Corporation |
Presentation |
Usable Security Mary Theofanos - NIST |
Presentation |
USG Research Focus Keynote |
Keynote |
What's The Right Security for IoT? |
Presentation |
September 9, 2015 | Type |
About the NCCOE |
Presentation |
A Funny Thing Happened on the Way to OASIS: From Specifications to Standards Richard Struse - US Department of Homeland Security |
Presentation |
A Quantum World and how NIST is Preparing for Future Crypto Dr. Dustin Moody - NIST |
Presentation |
A Secure Toolchain Competition Mr. Lee Badger - NIST/CSD Mr. Christopher Johnson Shawn Webb - G2 Inc. Carl Landwehr - GWU/LeMoyne College |
Presentation |
Better Circuits for Boolean Functions Dr. René Peralta - NIST |
Presentation |
Case Studies in ISAC Information Sharing Denise Anderson - National Council of ISACs |
Presentation |
Challenges and Opportunities in Cyber Information Sharing John Wunder - The MITRE Corporation |
Presentation |
Cyber Risk Leadership Keynote Malcolm Harkins |
Keynote |
Cybersecurity Headline News - Changing the Story Zulfikar Ramzan - RSA |
Keynote |
Cyber Threat Intelligence Sharing: Lessons Learned, Observations, Recommendations Bob Gourley - Cognitio |
Presentation |
Derived PIV Credentials Proof of Concept Research Hildegard Ferraiolo - NIST Jeff Cichonski - NIST Paul Fox - Microsoft Ryan Holley - Intercede |
Presentation |
DevOps and Container Security Raghu Yeluri - Intel John Morello - Twistlock Paul Cichonski - Lancop Mike Bartock - NIST |
Presentation |
Disrupting the Revolution of Cyber-Threats with Revolutionary Security Rick Engle - Microsoft Federal |
Presentation |
Enabling Better Security Automation by Adding Context Michael Stone |
Presentation |
Enterprises and Encryption: Why Remote Management Matters Amy Nelson - Dell |
Presentation |
FIPS 140, Quo Vadis? Dr. Apostol Vassilev - NIST |
Presentation |
FIPS 202 and Keccak-Derived Functions John Kelsey - NIST |
Presentation |
Guidance and Usage Scenarios for Implementers and Users of Software Identification Tags Brant Cheikes - The MITRE Corporation |
Presentation |
It's Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and more |
Keynote |
Legal Issues in Sharing Cyber Threat Intelligence: What are the Real Concerns? Kim Peretti |
Presentation |
National Cybersecurity Center of Excellence Attribute Based Access Control William Fisher - National Cybersecurity Center of Excellence Roger Wigenstam - NextLabs |
Presentation |
Network Security and Lightweight Cryptography Dr. Kerry McKay - NIST |
Presentation |
NIST Interagency Report (IR) 8055 Proof of Concept Implementation |
Presentation |
NSTIC: Sowing seed in the Identity Ecosystem Phil Lam - NSTIC NATIONAL PROGRAM OFFICE, NIST |
Presentation |
Panel Discussion: Making SWID Tags Successful in the Marketplace Brant Cheikes - The MITRE Corporation |
Presentation |
Security, Automation, and the Cloud John Banghart |
Presentation |
Security Automation Challenges: Open Source Steve Grubb - Red Hat |
Presentation |
System Firmware: The Emerging Malware Battlefront Jim Mann - HP |
Presentation |
TCG TNC: Automating End-to-end Trust Lisa Lorenzin - Pulse Secure |
Presentation |
The Whole is Greater... Sugumar Govindarajan - Intel Server BIOS John Loucaides - Intel Product Security Incident Response Team |
Presentation |
Why TPM 2.0? Reasons for Upgrade: Use Cases for the Latest Release of the TPM Specification Dave Challener - Johns Hopkins Applied Physics Laboratory |
Presentation |
Starts: September 09, 2015 - 08:30 AM EDT
Ends: September 11, 2015 - 12:30 PM EDT
Format: In-person Type: Forum
Attendance Type: Open to public
Audience Type: Industry,Government,Academia
Walter E. Washington Convention Center in Washington, D.C