Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

2015 Cybersecurity Innovation Forum

The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing.

The technical program covers four tracks:

  • Trusted Computing
  • Security Automation
  • Cyber Information Sharing
  • Research

Tracks include lectures, panel sessions and several will include live demonstrations.

Goals:

  • Describe current and existing activities (guidance, solutions and technologies that can be used now)
  • Demonstrate solutions built on real world products that address specific current issues
  • Describe emerging activities (guidance, solutions, and technologies that are in progress or draft)
  • Describe new areas of research, concept ideas, and future activities
  • Bring together government requirements and industry solutions
  • Explore gaps or challenges that could be solved by trusted computing, security automation, information sharing disciplines, or an integrated approach of the three disciplines
Selected Presentations
September 11, 2015 Type
Sharing Actionable Threat Indicators Using SCAP
Jim Hanson - CYBER ENGINEERING SERVICES, INC.

Presentation
Sharing Actionable Threat Indicators Using SCAP
Stephen Quinn - NIST

Presentation
War Stories from the Cloud: Rise of the Machines
John Summers - Akamai

Keynote
Cybersecurity: Not Just a Sprint, a Marathon
Tony Scott

Keynote
Using Risk Management to Improve Privacy in Information Systems
Presentation
OVAL Repository Transition
Bill Munyan

Presentation
OVAL Governance & Roadmap
David Ries - Joval

Presentation
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense
Tony Sager

Presentation
NIST's Cryptographic Module Validation Program
Mr. Michael Cooper - NIST/CSD/ITL

Presentation
September 10, 2015 Type
File-Sharing Through NGAC/ABAC for Secure Collaboration
Mr. David Ferraiolo - NIST/CSD

Gopi Katwala

Serban Gavrila

Presentation
The NIST Randomness Beacon
Dr. Rene Peralta - NIST

Presentation
Entropy as a Service: Unlocking the full Potential of Cryptography
Dr. Apostol Vassilev

Mr. Harold Booth

Mr. Robert Staples

Presentation
Graphic File Carving Demonstration
Mr. Rick Ayers - NIST/SSD

Presentation
Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines
Presentation
The Cyber Threat Intelligence Sharing Exchange Ecosystem Program
Dr. Eric Burger

Presentation
SHARKSEER Zero Day Net Defense
Ronald Nielson

Presentation
Crowdsourcing Intelligence: Friend or Foe?!
Ryan Trost - ThreatQuotient

Presentation
Automated Indicator Sharing
W. Werntz

Presentation
Threat-Based "Cyber Operations Rapid Assessment" (CORA)
Dr. Lindsley Boiney - The MITRE Corporation

Presentation
USG Research Focus Keynote
Keynote
Mobile Identity Management for Public Safety
Yee-Yin Choong

Joshua Franklin

Kristen Greene

Presentation
Overview of ITL's Public Safety Cybersecurity Efforts
Dr. Nelson Hastings - NIST

Sheila Frankel - NIST

Presentation
LTE Security - How Good is it?
Mike Bartock - NIST

Jeff Cichonski - NIST

Joshua Franklin

Presentation
Mobile Application Security for Public Saftey
Michael Ogata - NIST

Presentation
Usable Security
Mary Theofanos - NIST

Presentation
Employee Password Usability Survey
Yee-Yin Choong

Presentation
Evolving Security Automation Standards
Jessica Fitzgerald-McKay

Presentation
Integrated Adaptive Cyber Defense: Integration Spiral Results
Wende Peters - Johns Hopkins University Applied Physics Laboratory

Presentation
Security Automation Program Update
Mr. David Waltermire - NIST

Presentation
Security Automation and Continuous Monitoring (SACM)
Lisa Lorenzin - Pulse Secure

Presentation
Intel Identity Protection Technology
Hormuzd Khosravi - Intel Corporation

Presentation
Global Platform Root of Trust
Oliver Van Nieuwenhuyze - STMicroelectronics

Presentation
Haven: Shielding Applications from an Untrusted Cloud
Galen Hunt - Microsoft Research

Marcus Peinado - Microsoft Research

Andrew Baumann - Microsoft Research

Presentation
What's The Right Security for IoT?
Presentation
Intel Identity Protection Technology (IPT)
Hormuzd Khosravi - Intel Corporation

Presentation
September 9, 2015 Type
NSTIC: Sowing seed in the Identity Ecosystem
Phil Lam - NSTIC NATIONAL PROGRAM OFFICE, NIST

Presentation
National Cybersecurity Center of Excellence Attribute Based Access Control
William Fisher - National Cybersecurity Center of Excellence

Roger Wigenstam - NextLabs

Presentation
NIST Interagency Report (IR) 8055 Proof of Concept Implementation
Presentation
Cyber Threat Intelligence Sharing: Lessons Learned, Observations, Recommendations
Bob Gourley - Cognitio

Presentation
Legal Issues in Sharing Cyber Threat Intelligence: What are the Real Concerns?
Kim Peretti

Presentation
A Funny Thing Happened on the Way to OASIS: From Specifications to Standards
Richard Struse - US Department of Homeland Security

Presentation
Challenges and Opportunities in Cyber Information Sharing
John Wunder - The MITRE Corporation

Presentation
Case Studies in ISAC Information Sharing
Denise Anderson - National Council of ISACs

Presentation
It's Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and more
Keynote
Cyber Risk Leadership Keynote
Malcolm Harkins

Keynote
Cybersecurity Headline News - Changing the Story
Zulfikar Ramzan - RSA

Keynote
FIPS 140, Quo Vadis?
Dr. Apostol Vassilev

Presentation
A Secure Toolchain Competition
Mr. Lee Badger - NIST/CSD

Mr. Christopher Johnson

Shawn Webb - G2 Inc.

Carl Landwehr - GWU/LeMoyne College

Presentation
FIPS 202 and Keccak-Derived Functions
John Kelsey - NIST

Presentation
Network Security and Lightweight Cryptography
Dr. Kerry McKay - NIST

Presentation
A Quantum World and how NIST is Preparing for Future Crypto
Dr. Dustin Moody

Presentation
Better Circuits for Boolean Functions
Dr. Rene Peralta - NIST

Presentation
Derived PIV Credentials Proof of Concept Research
Hildegard Ferraiolo - NIST

Jeff Cichonski - NIST

Paul Fox - Microsoft

Ryan Holley - Intercede

Presentation
DevOps and Container Security
Raghu Yeluri - Intel

John Morello - Twistlock

Paul Cichonski - Lancop

Mike Bartock - NIST

Presentation
About the NCCOE
Presentation
Guidance and Usage Scenarios for Implementers and Users of Software Identification Tags
Brant Cheikes - The MITRE Corporation

Presentation
Security, Automation, and the Cloud
John Banghart

Presentation
Security Automation Challenges: Open Source
Steve Grubb - Red Hat

Presentation
Panel Discussion: Making SWID Tags Successful in the Marketplace
Brant Cheikes - The MITRE Corporation

Presentation
TCG TNC: Automating End-to-end Trust
Lisa Lorenzin - Pulse Secure

Presentation
Enabling Better Security Automation by Adding Context
Michael Stone

Presentation
System Firmware: The Emerging Malware Battlefront
Jim Mann - HP

Presentation
Disrupting the Revolution of Cyber-Threats with Revolutionary Security
Rick Engle - Microsoft Federal

Presentation
The Whole is Greater...
Sugumar Govindarajan - Intel Server BIOS

John Loucaides - Intel Product Security Incident Response Team

Presentation
Why TPM 2.0? Reasons for Upgrade: Use Cases for the Latest Release of the TPM Specification
Dave Challener - Johns Hopkins Applied Physics Laboratory

Presentation
Enterprises and Encryption: Why Remote Management Matters
Amy Nelson - Dell

Presentation

Event Details

Starts: September 09, 2015 - 08:30 AM EST
Ends: September 11, 2015 - 12:30 PM EST

Format: In-person Type: Forum

Agenda

Attendance Type: Open to public
Audience Type: Industry,Government,Academia


Location

Walter E. Washington Convention Center in Washington, D.C

Related Events

Previous:
<< 2014 Cybersecurity Innovation Forum

Created January 04, 2017, Updated January 27, 2017