Agenda

 

  Go
  • Tuesday, November 13, 2018
  •  

    General

    5:00 PM  -  8:00 PM
    Registration and Check-in  (Check-in)
    Ronald Reagan Bldg Atrium
  • Wednesday, November 14, 2018
  •  

    Break

    7:30 AM  -  8:45 AM
    Registration Check-in & Networking Coffee  (Networking Break 1)
    Atrium Hall Foyer
     

    General

    8:45 AM  -  9:00 AM
    Conference Opening Remarks  (Intro)
    Atrium Hall
    Keynote Speaker:
     

    Keynote

    9:00 AM  -  9:30 AM
    Keynote Address  (Keynote 1)
    Atrium Hall
    Keynote Speaker:
    9:30 AM  -  10:00 AM
    Keynote Address  (Keynote 2)
    Atrium Hall
    Keynote Speaker:
    10:00 AM  -  10:30 AM
    Keynote Address  (Keynote 3)
    Atrium Hall
    Keynote Speaker:
     

    Break

    10:30 AM  -  11:00 AM
    Networking Break  (Networking Break 2)
    Ronald Reagan Bldg Atrium
     

    Keynote

    11:00 AM  -  11:30 AM
    Keynote Address  (Keynote 4)
    Atrium Hall
    Keynote Speaker:
    11:30 AM  -  12:00 PM
    Keynote Address  (Keynote 5)
    Atrium Hall
    Keynote Speaker:
    12:00 PM  -  12:30 PM
    Keynote Address  (Keynote 6)
    Atrium Hall
    Keynote Speaker:
     

    Meals

    12:30 PM  -  1:45 PM
    Conference Lunch  (Lunch Day 1)
    Ronald Reagan Bldg Atrium
    Included conference buffet lunch
     

    Sessions

    1:45 PM  -  3:00 PM
    Cyber Education as a National Security Issue
    Ballroom B
    It is vital that the Public and Private Sectors join together to support the development of cyber education initiatives. This panel will examine the following issues: How can we develop the next generation of cyber security leaders and more broadly, a diverse workforce with skills necessary to effectively and safely participate in a rapidly changing digital world? How can the public and private sectors work together to develop a range of learning platforms to serve the mainstream student population, develop new leaders in cyber security, and foster comprehension among all young people of the risks posed by the cyber domain?
     Optional 
    1:45 PM  -  3:00 PM
    Cyberspace Operations In a Coalition: Strength in Numbers?
    Atrium Hall
    In cyberspace, nobody fights alone. Governments, agencies, industry -- even individuals -- all find themselves reliant upon others to ensure their interests are defended against a rogue’s gallery of threat actors and across a full spectrum of operations. All of us, even the military (which prides itself on its inherent ability to build to mil-spec), need commercial connectivity somewhere in the architecture. From a national defense perspective, the military force with the most and biggest guns, the hardiest fleets, and the most maneuverable aircraft, has been for decades considered the one best able to deter aggression from its adversaries. No more. The more technologically advanced Goliath is, the more opportunities there are for the Davids of the world. Even more paradoxical, the more friends you have, the more vulnerabilities you share. This panel, comprised of professionals who are tackling the daunting task of defending alliances and partners, will explore the unique challenges and developing strategies of "team ball" in cyberspace. The game, you will learn, is toughest in the opening rounds, well before the first kinetic shots are fired.
    Moderators:
     Optional 
    1:45 PM  -  3:00 PM
    Technical Paper Track  (Paper Track 1)
    Ballroom A

    Paper Presentations on Technical Cyber Issues. The session consists of the following papers:

    • “Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS Attacks” by Marcelo Antonio Righi (Cyber Defense Command, QGEx / SMU - Brazilian Army, Brazil) and Raul Ceretta Nunes (Applied Computing Department, Federal University of Santa Maria, Brazil)
    • “The Calculus of Protecting Interstate Competition from Cyber Attack” by Vaughn H. Standley and Roxanne B. Everetts (National Defense University)
    • “Critical Infrastructure Protection at the Local Level” by Colin Brooks (National Defense University)
     Optional  Closed 
     

    Break

    3:00 PM  -  3:30 PM
    Networking Break  (Networking Break 3)
    Ronald Reagan Bldg Atrium
     

    General

    3:00 PM  -  3:30 PM
    Poster Session  (Posters)
    Atrium Hall Foyer
    Undergraduate Poster Session
     

    Sessions

    3:30 PM  -  4:45 PM
    Analytics and Acquisition Paper Track  (Paper Track 2)
    Ballroom A

    Paper Presentations on Analytical Social Sciences and Acquisition Policy.  The following papers will be presented:

    • “A Framework for Applied Computational Political Science” by David Perlman (CoPsyCon.org)
    • “Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums” by Soumajyoti Sarkar (Arizona State University), Mohammad Almukaynizi (Arizona State University), Jana Shakarian (Cyber Reconnaissannce, Inc.), and Paulo Shakarian (Arizona State University )
    • “Cyber Acquisition Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace” by Thomas J Klemas (United States Air Force), Nazli Choucri (Massachusetts Institute of Technology), and Rebecca Lively (United States Air Force)
     Optional  Closed 
    3:30 PM  -  4:45 PM
    Cyber Deterrence Panel
    Atrium Hall
    The United States’ national security depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet enabled devices. Recent attacks against US and its allies’ critical infrastructures to include water management systems in New York state, electrical production facilities in Ukraine, the DNS system in the US North East, and many more have highlighted the persistent challenges faced by the US and its allies. There is an increasing need to develop a robust deterrence framework within which the US and its allies can dissuade would be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges including, credibility, attribution, escalation and conflict management to name but a few remain ever present and challenge the US in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. This panel examines the problem of cyber deterrence from a variety of different technical, policy and international relations perspectives.
    Moderators:
     Optional 
    3:30 PM  -  4:45 PM
    Replacing Complacency with Urgency: Are Defenders Moving Fast Enough?
    Ballroom B
    We would all like cybersecurity problems to disappear, but a solution is not imminent. In the meantime, nations are racing ahead with digital government, smart cities, and other initiatives that seek efficiency but also increase vulnerability, all while receiving failing grades on cybersecurity report cards. The private sector is not much better off. Some companies are aggressively preparing robust defenses, but these are rare. Others are covering only the basics suggested by the NIST Cybersecurity or CIS Top 20 frameworks, which are widely recognized as only 80% solutions. Many others either lack the motivation or resources to reach a defensible cybersecurity baseline. Business as usual is clearly not the right answer. In this target rich environment, attackers are having a field day, both in compromising systems for both short term gain and in long term effects. Today’s risky state of affairs raises the questions: Are defenders lacking a sense of urgency? What can and should be done to create viable defenses now, before more debilitating attacks occur in the future? What can we do to rally support within the government, the military, and in the private sector at a more rapid pace? This fast-paced panel brings together a diverse spectrum of experts to outline and challenge today’s status quo, analyze underlying root causes, and suggest viable solutions. Bring your hard questions on the best way ahead to ask during Q&A.
    Moderators:
    Panelists:
     Optional 
  • Thursday, November 15, 2018
  •  

    Break

    8:00 AM  -  8:45 AM
    Registration & Networking Coffee  (Networking Break 4)
    Ronald Reagan Bldg Atrium
     

    Keynote

    8:45 AM  -  9:15 AM
    Keynote Address
    Atrium Hall
    Keynote Speaker:
    9:15 AM  -  9:45 AM
    Keynote Address
    Atrium Hall
    Keynote Speaker:
     

    Break

    9:45 AM  -  10:15 AM
    Networking Break  (Networking Break 5)
    Ronald Reagan Bldg Atrium
     

    Sessions

    10:15 AM  -  11:30 AM
    Cyber Sovereignty Panel
    Ballroom B
    In this panel, we examine sovereignty during the competition phase of conflict from a (jus ad bellum) legal perspective. In light of compelling recent debates and the UK Attorney General’s May 2018 speech regarding Cyber and International Law in the 21st Century, is sovereignty a primary rule of international law or merely a guiding principle from which a state may derogate when absolutely necessary to conduct cyber activities? The answers to this and several more questions on this panel will help to meaningfully shape the future of cyber conflict.
    Moderators:
     Optional 
    10:15 AM  -  11:30 AM
    Jack Voltaic 2.0 - Enhancing Critical Infrastructure Protection and Incident Response
    Atrium Hall
    Led by the Army Cyber Institute at West Point, in partnership with AECOM as the private sector lead and the City of Houston, Jack Voltaic 2.0 was an innovative, bottom-up, public-private exercise designed to develop a municipal-level response framework and integrate local, state, and federal assets. By simulating a complex physical and cyberattack which impacts multiple critical infrastructure sectors, Jack Voltaic 2.0 assessed the city’s response capability, communication between public and private partners, integration of National Guard cyber capabilities, and the Army’s coordination with regional and state authorities. Panel will discuss lessons learned from the Jack Voltaic 2.0 exercise.
    Moderators:
     Optional 
    10:15 AM  -  11:30 AM
    Strategy and Policy Paper Track I  (Paper Track 3)
    Ballroom A

    Papers will be presented on Cyber Strategy and Policy. The presented papers are:

    • “United By Necessity: Conditions for Institutional Cooperation against Cybercrime” by Jobel Kyle P Vecino (University of California, Berkeley)
    • “Feed the Bears, Starve the Trolls: Demystifying Russia’s Cybered Information Confrontation Strategy” by Nina A Kollars (US Naval War College)
    • “Beyond the UNGGE: Norms of Responsible Nation State Behavior in Cyberspace” by John A Davis (Palo Alto Networks)
     Optional  Closed 
     

    Meals

    11:30 AM  -  12:45 PM
    Conference Lunch  (Meals 2)
    Ronald Reagan Bldg Atrium
    Included conference buffet lunch
     

    Sessions

    12:45 PM  -  2:00 PM
    Botnet Takedowns: What Happens and How Do We Improve the Process?
    Ballroom B
    This panel will explore how the government and the private sector engage in the process of taking down botnets and how we can improve this public-private partnership. While a majority of these operations have led to successful public safety outcomes, the lack of a more formalized, efficient process that can address a full range of botnet activity and the potential downstream harms that can occur during the takedown process presents concerns for all parties involved. Moreover, interests of corporate parties and the government may not always be aligned in these malware interventions. These differences could, at times, give rise to conflict over the best and most efficient method or path to addressing both the criminal conduct of “bot herders” and the public safety and information security harms that can metastasize when botnets are not disrupted. This panel will draw on the expertise of high-level practitioners in the public and private sector who are at the helm of these botnet takedown efforts, along with academics who are studying how to improve the botnet takedown process for the good of all.
    Moderators:
     Optional 
    12:45 PM  -  2:00 PM
    Information Warfare Paper Track  (Paper Track 4)
    Ballroom A

    Papers on Information Warfare in the Cyber domain will be presented. The presented papers are:

    • “A Model for Evaluating Fake News” by Char Sample (ICF Inc. LLC), Connie Justice (Purdue School of Engineering & Technology, IUPUI), and Emily Darraj (Cyber Security Department, Capitol Technology University)
    • “Strategic Cyber: Responding to Russian Online Information Warfare ” by Matthew J. Flynn (Marine Corps Univ.)
    • “Fake news, (dis)information and principle of non-intervention. Scope, limits and possible responses to cyber election interference in times of competition” by Annachiara Rotondo (University of Campania Luigi Vanvitelli) and Pierluigi Salvati (University of Naples Federico II)
     Optional  Closed 
    12:45 PM  -  2:00 PM
    Strategic Stability in Cyberspace
    Atrium Hall
    From an international perspective, this panel will explore the issues that amplify and dampen our underlying stability in cyberspace. These include such topics as escalation, resilience, signaling, norms, deterrence, strategies, and policies.
    Moderators:
     Optional 
     

    Break

    2:00 PM  -  2:30 PM
    Networking Break  (Networking Break 6)
    Ronald Reagan Bldg Atrium
     

    Sessions

    2:30 PM  -  3:45 PM
    Artificial Intelligence in Cyber Security: Tackling the Challenge of Adversarial Learning
    Atrium Hall
    Machine learning capabilities have recently been shown to offer astounding ability to automatically analyze and classify large amounts of data in complex scenarios, in many cases matching or surpassing human capabilities. However, it has also been widely shown that these same algorithms are vulnerable to attacks, known as adversarial learning attacks, which can cause the algorithms to misbehave or reveal information about their inner workings. In general, attacks take three forms: a) data poisoning attacks inject incorrectly or maliciously labeled data points into the training set so that the algorithm learns the wrong mapping, 2) evasion attacks perturb correctly classified input samples just enough to cause errors in classification, and 3) inference attacks which repeatedly test the trained algorithm with edge-case inputs in order to reveal the previously hidden decision boundaries. Protection against adversarial learning attacks include techniques which cleanse training sets of outliers in order to thwart data poisoning attempts, and methods which sacrifice up-front algorithm performance in order to be robust to evasion attacks. As machine learning based artificial intelligence (AI) capabilities become incorporated into facets of everyday life, including protecting cyber assets, the need to understand adversarial learning and address it becomes clear. Poisoning attacks that inject incorrectly labeled malicious traffic or data can be leveraged by the adversary to enable their attacks to go undetected, while data evasion attacks can be used to cause false classification of benign traffic as malicious thereby eliciting a defense response. If AI is to succeed in helping cyber security, it must be secure and robust to attacks itself. Understanding and addressing challenges associated with adversarial learning requires collaboration between several different research and development communities, including the artificial intelligence, cyber security, game theory, machine learning, as well as the formal reasoning communities. This panel examines the challenge that adversarial learning presents with regards to applying AI to problems in cyber security.
    Moderators:
     Optional 
    2:30 PM  -  3:45 PM
    Information Operations during Strategic Competition
    Ballroom B
    Moderators:
     Optional 
    2:30 PM  -  3:45 PM
    Strategy and Policy Paper Track II  (Paper Track 5)
    Ballroom A

    Papers will be presented on Cyber Strategy and Policy. Presented papers are:

    • “Defense Support to the Private Sector: New Concepts for DoD’s National Cyber Defense Mission” by Jason Healey (Columbia University) and Erik B. Korn (Army Cyber Institute)
    • “Borders in Cyberspace: Do Good Fences Make Good Neighbors?” by Michael Warner (United States Cyber Command)
    • “Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation” by Michael P. Fischerkeller (Institute for Defense Analyses) and Richard Harknett (University of Cincinnati)
     Optional  Closed 
     

    General

    3:45 PM  -  4:00 PM
    Movement to Main Hall  (General 2)
    Atrium Hall
    Move to main hall for closing keynote
     

    Keynote

    4:00 PM  -  5:00 PM
    Keynote Panel: Cyber Conflict during an Era of Strategic Competition  (Keynote 9)
    Atrium Hall
    Keynote Speaker:
    Moderators:
Top