Agenda

 

  Go
  • Tuesday, November 13, 2018
  •  

    General

    5:00 PM  -  8:00 PM
    Registration and Check-in  (Check-in)
    Ronald Reagan Bldg Atrium
  • Wednesday, November 14, 2018
  •  

    Break

    7:30 AM  -  8:45 AM
    Registration Check-in & Networking Coffee  (Networking Break 1)
    Atrium Hall Foyer
     

    General

    8:45 AM  -  9:00 AM
    Conference Opening Remarks  (Intro)
    Atrium Hall
     

    Keynote

    9:00 AM  -  9:30 AM
    Keynote Address  (Keynote 1)
    Atrium Hall
    9:30 AM  -  10:00 AM
    Keynote Address  (Keynote 2)
    Atrium Hall
    Keynote Speaker:
    10:00 AM  -  10:30 AM
    Keynote Address  (Keynote 3)
    Atrium Hall
    Keynote Speaker:
     

    Break

    10:30 AM  -  11:00 AM
    Networking Break  (Networking Break 2)
    Ronald Reagan Bldg Atrium
     

    Keynote

    11:00 AM  -  11:30 AM
    Keynote Address  (Keynote 4)
    Atrium Hall
    11:30 AM  -  12:00 PM
    Keynote Address  (Keynote 5)
    Atrium Hall
     

    Meals

    12:00 PM  -  1:15 PM
    Conference Lunch  (Lunch Day 1)
    Ronald Reagan Bldg Atrium
    Included conference buffet lunch
     

    Sessions

    1:15 PM  -  2:30 PM
    Cyber Policy Panel
     Optional 
    1:15 PM  -  2:30 PM
    Private Sector Education Initiatives
     Optional 
    1:15 PM  -  2:30 PM
    Technical Paper Track  (Paper Track 1)

    Paper Presentations on Technical Cyber Issues. The session consists of the following papers:

    • “Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS Attacks” by Marcelo Antonio Righi (Cyber Defense Command, QGEx / SMU - Brazilian Army, Brazil) and Raul Ceretta Nunes (Applied Computing Department, Federal University of Santa Maria, Brazil)
    • “The Calculus of Protecting Interstate Competition from Cyber Attack” by Vaughn H. Standley and Roxanne B. Everetts (National Defense University)
    • “Critical Infrastructure Protection at the Local Level” by Colin Brooks (National Defense University)
     Optional 
     

    Break

    2:30 PM  -  3:00 PM
    Networking Break  (Networking Break 3)
    Ronald Reagan Bldg Atrium
     

    Sessions

    3:00 PM  -  4:15 PM
    Analytics and Acquisition Paper Track  (Paper Track 2)

    Paper Presentations on Analytical Social Sciences and Acquisition Policy.  The following papers will be presented:

    • “A Framework for Applied Computational Political Science” by David Perlman (CoPsyCon.org)
    • “Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums” by Soumajyoti Sarkar (Arizona State University), Mohammad Almukaynizi (Arizona State University), Jana Shakarian (Cyber Reconnaissannce, Inc.), and Paulo Shakarian (Arizona State University )
    • “Cyber Acquisition Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace” by Thomas J Klemas (United States Air Force), Nazli Choucri (Massachusetts Institute of Technology), and Rebecca Lively (United States Air Force)
    Speakers:
     Optional 
    3:00 PM  -  4:15 PM
    Cyber Deterrence Panel
    The United States’ national security depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet enabled devices. Recent attacks against US and its allies’ critical infrastructures to include water management systems in New York state, electrical production facilities in Ukraine, the DNS system in the US North East, and many more have highlighted the persistent challenges faced by the US and its allies. There is an increasing need to develop a robust deterrence framework within which the US and its allies can dissuade would be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges including, credibility, attribution, escalation and conflict management to name but a few remain ever present and challenge the US in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. This panel examines the problem of cyber deterrence from a variety of different technical, policy and international relations perspectives.
    Moderators:
     Optional 
    3:00 PM  -  4:15 PM
    Replacing Complacency with Urgency: Are Defenders Moving Fast Enough?
    We would all like cybersecurity problems to disappear, but a solution is not imminent. In the meantime, nations are racing ahead with digital government, smart cities, and other initiatives that seek efficiency but also increase vulnerability, all while receiving failing grades on cybersecurity report cards. The private sector is not much better off. Some companies are aggressively preparing robust defenses, but these are rare. Others are covering only the basics suggested by the NIST Cybersecurity or CIS Top 20 frameworks, which are widely recognized as only 80% solutions. Many others either lack the motivation or resources to reach a defensible cybersecurity baseline. Business as usual is clearly not the right answer. In this target rich environment, attackers are having a field day, both in compromising systems for both short term gain and in long term effects. Today’s risky state of affairs raises the questions: Are defenders lacking a sense of urgency? What can and should be done to create viable defenses now, before more debilitating attacks occur in the future? What can we do to rally support within the government, the military, and in the private sector at a more rapid pace? This fast-paced panel brings together a diverse spectrum of experts to outline and challenge today’s status quo, analyze underlying root causes, and suggest viable solutions. Bring your hard questions on the best way ahead to ask during Q&A.
    Speakers:
    Moderators:
     Optional 
     

    General

    4:15 PM  -  4:30 PM
    Movement to Main Hall  (Movement)
    Atrium Hall
    Move to Main Hall for closing speaker
     

    Keynote

    4:30 PM  -  5:00 PM
    Keynote Address  (Keynote 6)
    Atrium Hall
    Keynote Speaker:
     

    General

    5:00 PM  -  5:45 PM
    Poster Session  (Posters)
    Ballroom Foyer
    Undergraduate Poster Session
  • Thursday, November 15, 2018
  •  

    Break

    8:00 AM  -  8:45 AM
    Registration & Networking Coffee  (Networking Break 4)
    Ronald Reagan Bldg Atrium
     

    Keynote

    8:45 AM  -  9:15 AM
    Keynote Address
    Atrium Hall
    Keynote Speaker:
    9:15 AM  -  9:45 AM
    Keynote Address
    Atrium Hall
    Keynote Speaker:
     

    Break

    9:45 AM  -  10:15 AM
    Networking Break  (Networking Break 5)
    Ronald Reagan Bldg Atrium
     

    Sessions

    10:15 AM  -  11:30 AM
    Cyber Sovereignty Panel
    In this panel, we examine sovereignty during the competition phase of conflict from a (jus ad bellum) legal perspective. In light of compelling recent debates and the UK Attorney General’s May 2018 speech regarding Cyber and International Law in the 21st Century, is sovereignty a primary rule of international law or merely a guiding principle from which a state may derogate when absolutely necessary to conduct cyber activities? The answers to this and several more questions on this panel will help to meaningfully shape the future of cyber conflict.
    Panelists:
     Optional 
    10:15 AM  -  11:30 AM
    Readdressing The 21st Century Public Private Partnership Model
    The traditional Public Private Partnership (PPP) relationship needs to be adjusted to mitigate escalating global threats from an increase in disinformation campaigns, the radicalization of content and the directed-attacks against our nation's critical infrastructure. This panel will examine current and evolving threats that are driving the need for new PPP models, which not only enhance collaboration, but aggressively drive innovation and implementation to meet and solve our challenges. Panel will consider and debate critical questions like the following: What types of new frameworks should the government be recommending in its efforts to work with private industry? What forms of resilience programs are working well and what should be the role of social media companies in helping to achieve greater resilience? Not only will the panel address the aforementioned questions, but offer insights into investment considerations, leveraging the benefits of PPP's, in the delivery of solutions to global risks.
     Optional 
    10:15 AM  -  11:30 AM
    Strategy and Policy Paper Track I  (Paper Track 3)

    Papers will be presented on Cyber Strategy and Policy. The presented papers are:

    • “United By Necessity: Conditions for Institutional Cooperation against Cybercrime” by Jobel Kyle P Vecino (University of California, Berkeley)
    • “Feed the Bears, Starve the Trolls: Demystifying Russia’s Cybered Information Confrontation Strategy” by Nina A Kollars (US Naval War College)
    • “Beyond the UNGGE: Norms of Responsible Nation State Behavior in Cyberspace” by John A Davis (Palo Alto Networks)
     Optional 
     

    Meals

    11:30 AM  -  12:45 PM
    Conference Lunch  (Meals 2)
    Ronald Reagan Bldg Atrium
    Included conference buffet lunch
     

    Sessions

    12:45 PM  -  2:00 PM
    Botnet Takedowns: What Happens and How Do We Improve the Process?
    This panel will explore how the government and the private sector engage in the process of taking down botnets and how we can improve this public-private partnership. While a majority of these operations have led to successful public safety outcomes, the lack of a more formalized, efficient process that can address a full range of botnet activity and the potential downstream harms that can occur during the takedown process presents concerns for all parties involved. Moreover, interests of corporate parties and the government may not always be aligned in these malware interventions. These differences could, at times, give rise to conflict over the best and most efficient method or path to addressing both the criminal conduct of “bot herders” and the public safety and information security harms that can metastasize when botnets are not disrupted. This panel will draw on the expertise of high-level practitioners in the public and private sector who are at the helm of these botnet takedown efforts, along with academics who are studying how to improve the botnet takedown process for the good of all.
    Moderators:
     Optional 
    12:45 PM  -  2:00 PM
    Cyberspace Operations In a Coalition: Strength in Numbers?
    In cyberspace, nobody fights alone. Governments, agencies, industry -- even individuals -- all find themselves reliant upon others to ensure their interests are defended against a rogue’s gallery of threat actors and across a full spectrum of operations. All of us, even the military (which prides itself on its inherent ability to build to mil-spec), need commercial connectivity somewhere in the architecture. From a national defense perspective, the military force with the most and biggest guns, the hardiest fleets, and the most maneuverable aircraft, has been for decades considered the one best able to deter aggression from its adversaries. No more. The more technologically advanced Goliath is, the more opportunities there are for the Davids of the world. Even more paradoxical, the more friends you have, the more vulnerabilities you share. This panel, comprised of professionals who are tackling the daunting task of defending alliances and partners, will explore the unique challenges and developing strategies of "team ball" in cyberspace. The game, you will learn, is toughest in the opening rounds, well before the first kinetic shots are fired.
     Optional 
    12:45 PM  -  2:00 PM
    Information Warfare Paper Track  (Paper Track 4)

    Papers on Information Warfare in the Cyber domain will be presented. The presented papers are:

    • “A Model for Evaluating Fake News” by Char Sample (ICF Inc. LLC), Connie Justice (Purdue School of Engineering & Technology, IUPUI), and Emily Darraj (Cyber Security Department, Capitol Technology University)
    • “Strategic Cyber: Responding to Russian Online Information Warfare ” by Matthew J. Flynn (Marine Corps Univ.)
    • “Fake news, (dis)information and principle of non-intervention. Scope, limits and possible responses to cyber election interference in times of competition” by Annachiara Rotondo (University of Campania Luigi Vanvitelli) and Pierluigi Salvati (University of Naples Federico II)
     Optional 
     

    Break

    2:00 PM  -  2:30 PM
    Networking Break  (Networking Break 6)
    Ronald Reagan Bldg Atrium
     

    Sessions

    2:30 PM  -  3:45 PM
    Machine Learning in Cyberspace Panel
     Optional 
    2:30 PM  -  3:45 PM
    Role of Information Operations In Cyberspace Operations
     Optional 
    2:30 PM  -  3:45 PM
    Strategy and Policy Paper Track II  (Paper Track 5)

    Papers will be presented on Cyber Strategy and Policy. Presented papers are:

    • “Defense Support to the Private Sector: New Concepts for DoD’s National Cyber Defense Mission” by Jason Healey (Columbia University) and Erik B. Korn (Army Cyber Institute)
    • “Borders in Cyberspace: Do Good Fences Make Good Neighbors?” by Michael Warner (United States Cyber Command)
    • “Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation” by Michael P. Fischerkeller (Institute for Defense Analyses) and Richard Harknett (University of Cincinnati)
     Optional 
     

    General

    3:45 PM  -  4:00 PM
    Movement to Main Hall  (General 2)
    Atrium Hall
    Move to main hall for closing keynote
     

    Keynote

    4:00 PM  -  4:30 PM
    Keynote Address  (Keynote 9)
    Atrium Hall
    4:30 PM  -  5:00 PM
    Keynote Address  (Keynote 10)
    Atrium Hall
Top