08:00 – 08:55 | Registration and Continental Breakfast | ||
08:55 – 09:00 | Welcome: Dr. Aurali Dade Associate Vice President for Research Development, Integrity and Assurance George Mason University Dr. Mark Pullen Director, Center of Excellence in Command, Control, Communications, Computing, Intelligence and Cyber George Mason University |
||
09:00 – 10:00 | Keynote Address | ||
Roberta “Bobbie” Stempfley Director, Carnegie Mellon University Software Engineering Institute’s – CERT Division
|
bio presentation video | ||
10:00 – 10:30 | Coffee Break in exhibit area | ||
10:30 – 12:00 |
Advances in Data Security Insider Threat Risk Mitigation/Data Integrity This prestigious group will discuss the current state of Data Security in a panel style presentation. Key topics that will be discussed include protecting against insider threat, data loss or corruption risk mitigation, and maintaining data integrity with a particular focus on the DoD secure operating environment. |
Chair: Carey Bandler Director, Strategic Accounts -Nuix USGModerator: Henry Sienkiewicz Chief Innovation and Revenue OfficerSecure Channels bio |
1 – Panelist: bio presentation video (Bray and Berkoff) |
Col Donald Bray Cybersecurity Director (Acting) Army CIO/G6 |
2 – Panelist: bio slides presentation video |
Daryl Haegley GICSP, OCP OASD (EI&E) ODASD IE (DCIO-IE) |
3 – Panelist: bio slides |
Russ Berkoff Senior Vice PresidentCybersecurity, Intelligence, and Investigation ServicesNuix |
12:00 – 13:00 | Lunch (on your own) | |||
13:00 – 14:00 | Keynote Address |
Dr. Sean Manion (MD) Chief Executive, Science Distributed
Abstract:
|
bio slides |
14:00 – 15:00 |
Session 2 Exploiting Artificial Intelligence and Machine Learning Abstract: “All your machine learning models are belong to us…” Machine learning models can be tricked using tiny data alterations, sometimes as small as a single pixel for image recognition. What happens when malicious data is used to produce a different outcome than expected? Is it possible to detect malicious data? Machine learning models can be reliably reversed engineered without direct access to the model. What happens when malicious actors can fully replicate your machine learning models? This presentation and discussion will address those and other questions around how we can protect our AI and ML systems from the enemy. |
Chairs: Allan Mink Managing Partner, Systems Spirit Scott Winn ACI Group |
1 – Panelist bio slides presentation video (both panelists) |
Don Miner Founding Partner, Miner & Kasch |
2 – Panelist bio slides
|
Karl MacMillan CTO, Big Bad Wolf Security |
15:00 – 15:30 | Break in exhibit area | |
15:30 – 16:00 |
Session 3 Collaborative Community Resilience Abstract:GMU’s new Community Resilience Lab coordinates a number of efforts to help build individual and community resilience to natural and man-made emergencies while increasing economic and other opportunities in under-served communities. Beyond just bouncing back, resilient communities can absorb shocks and yet provide improved services afterward– “Be prepared to bounce forward better.” The goal is to reduce pressures for migration and marginalization.The Lab is being incubated within the C4I & Cyber Center and draws on many of the Center’s resilience-building approaches.
|
Chair: Linton Wells, II Principal Cyber Security Engineer George Mason University bio slides presentation video |
16:00 – 17:00 |
Session 4 Internet of Things in National Security Abstract:
Dr. Saunders will lead a discussion regarding the implication of IoT for national security. Real world case studies will be discussed with a specific focus on securing IoT systems in a large scale distributed environment.
|
Chair: John Saunders Principal Cyber Security Engineer MITRE Corporation |
1- Title: “En Route to Smart Cities” bio slides & videos (~600 MB) presentation video (both panelists) |
Dr. Shubham Jain Assistant ProfessorOld Dominion University |
2- Title: “Cybersecurity of the IoT” bio slides |
Dr. Angelos Stavrou ProfessorGeorge Mason University |
17:00 | Reception | |
Wednesday, May 23, 2018
08:00 – 09:00 | Registration and Continental Breakfast | |
09:00 – 10:00 |
Gen Michael Hayden, USAF (retired) Principal, The Chertoff Group Understanding Information Warfare
|
biopresentation video | |
10:00 – 10:30 | Coffee Break in exhibit area | |
10:30 – 12:00 |
Understanding Information Warfare Abtract:This distinguished panel will follow up on Lt Gen Hayden’s opening remarks with a deep dive discussion on the current information warfare threat and mitigation tactics. The session will focus on both defensive as well as offensive capabilities in this space.
|
Chairs: John Dvorak CIO, Salient CRGT John Russack USG |
1 – Panelist: bio presentation video (all three panelists) |
Adm William O. Studeman USN (Ret.) |
2 -Panelist: bio |
Riley RepkoStrategic Advisor to Secretary of the Air Force and USAF COS |
3 – Panelist: bio |
Leslie J. (Jake) Schaffner OSD Staff |
13:00 – 14:00 | Keynote Address |
Lewis Shepherd Executive Technology Consultant Innovations in IT Acquisition
|
bio slides presentation video |
14:00 – 15:00
Session 6 Impact of Disruptive Technologies on the Future Integrated Mobility Abtract:We will discuss advancements in AI expert systems, SDP, Spectrum agility, big data, IoT and Cloud in C4I for Integrated Mobility. The future of mobility will have a far more consolidated, cognitive, integrated and transformational impact on defense, security and next generation of first responders whereby new incarnations of ‘armed force’ start doing different things in novel ways. COTS implementation to the tactical edge will enhance decision-support system during wartime/emergency wherein the time is a significant factor to communicate with warfighters, responders, autonomous vehicles, weapons, machinery, emergency equipment, etc. that need support with intelligence and quick response in the zone. The current trajectory of technology, ubiquitous connectivity, sensors, location-based services, social networks, machine learning, big data and IoT will have an even more profound impact on Mobility Integration. These present risks but also opportunities especially benefitting the Defense and Government to become SMARTER!
|
Chair: Anitha Raj President, ARAR Technology bio slides Moderator: Tom Suder President ATARC bio |
1 – Title: Intelligent Mobile Agents Present software solution on mobile devices that can work with cloud servers to push intelligence to the edge to provide actionable intelligence to the first responder/warfighter
|
Dr. Edward Chow Manager, Civil Program OfficeNASA Jet Propulsion Laboratory |
2 – Title: Advancement in Integrated Mobility Finding new ways to integrate mobility, IoT, security, with SDP solutions and tools, permit us to reconsider what the Art of the Possible really can deliver during disasters.
|
Jeffrey Schweitzer Asymmetric Solutions ArchitectProduct and New Business Innovation Verizon |
15:00 End of Symposium