Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing.

The technical program covers four tracks:

  • Trusted Computing
  • Security Automation
  • Cyber Information Sharing
  • Research

Tracks include lectures, panel sessions and several will include live demonstrations.

Goals:

  • Describe current and existing activities (guidance, solutions and technologies that can be used now)
  • Demonstrate solutions built on real world products that address specific current issues
  • Describe emerging activities (guidance, solutions, and technologies that are in progress or draft)
  • Describe new areas of research, concept ideas, and future activities
  • Bring together government requirements and industry solutions
  • Explore gaps or challenges that could be solved by trusted computing, security automation, information sharing disciplines, or an integrated approach of the three disciplines
Selected Presentations
September 11, 2015 Type
Cybersecurity: Not Just a Sprint, a Marathon
Tony Scott
Keynote
NIST's Cryptographic Module Validation Program
Mr. Michael Cooper - NIST/CSD/ITL
Presentation
OVAL Governance & Roadmap
David Ries - Joval
Presentation
OVAL Repository Transition
Bill Munyan
Presentation
Sharing Actionable Threat Indicators Using SCAP
Jim Hanson - CYBER ENGINEERING SERVICES, INC.
Presentation
Sharing Actionable Threat Indicators Using SCAP
Jim Hanson - CYBER ENGINEERING SERVICES, INC.
Presentation
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense
Tony Sager
Presentation
Using Risk Management to Improve Privacy in Information Systems
Presentation
War Stories from the Cloud: Rise of the Machines
John Summers - Akamai
Keynote
September 10, 2015 Type
Automated Indicator Sharing
W. Werntz
Presentation
Crowdsourcing Intelligence: Friend or Foe?!
Ryan Trost - ThreatQuotient
Presentation
Employee Password Usability Survey
Yee-Yin Choong - NIST
Presentation
Entropy as a Service: Unlocking the full Potential of Cryptography
Dr. Apostol Vassilev - NIST
Mr. Harold Booth - NIST
Mr. Robert Staples - NIST
Presentation
Evolving Security Automation Standards
Jessica Fitzgerald-McKay
Presentation
File-Sharing Through NGAC/ABAC for Secure Collaboration
Mr. David Ferraiolo - NIST
Gopi Katwala
Serban Gavrila
Presentation
Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines
Presentation
Global Platform Root of Trust
Oliver Van Nieuwenhuyze - STMicroelectronics
Presentation
Graphic File Carving Demonstration
Mr. Rick Ayers - NIST/SSD
Presentation
Haven: Shielding Applications from an Untrusted Cloud
Galen Hunt - Microsoft Research
Marcus Peinado - Microsoft Research
Andrew Baumann - Microsoft Research
Presentation
Integrated Adaptive Cyber Defense: Integration Spiral Results
Wende Peters - Johns Hopkins University Applied Physics Laboratory
Presentation
Intel Identity Protection Technology
Hormuzd Khosravi - Intel Corporation
Presentation
Intel Identity Protection Technology (IPT)
Hormuzd Khosravi - Intel Corporation
Presentation
LTE Security - How Good is it?
Mike Bartock - NIST
Jeff Cichonski - NIST
Joshua Franklin
Presentation
Mobile Application Security for Public Saftey
Michael Ogata - NIST
Presentation
Mobile Identity Management for Public Safety
Yee-Yin Choong - NIST
Joshua Franklin
Kristen Greene - NIST
Presentation
Overview of ITL's Public Safety Cybersecurity Efforts
Dr. Nelson Hastings - NIST
Sheila Frankel - NIST
Presentation
Security Automation and Continuous Monitoring (SACM)
Lisa Lorenzin - Pulse Secure
Presentation
Security Automation Program Update
Mr. David Waltermire - NIST
Presentation
SHARKSEER Zero Day Net Defense
Ronald Nielson
Presentation
The Cyber Threat Intelligence Sharing Exchange Ecosystem Program
Dr. Eric Burger
Presentation
The NIST Randomness Beacon
Dr. René Peralta - NIST
Presentation
Threat-Based "Cyber Operations Rapid Assessment" (CORA)
Dr. Lindsley Boiney - The MITRE Corporation
Presentation
Usable Security
Mary Theofanos - NIST
Presentation
USG Research Focus Keynote
Keynote
What's The Right Security for IoT?
Presentation
September 9, 2015 Type
About the NCCOE
Presentation
A Funny Thing Happened on the Way to OASIS: From Specifications to Standards
Richard Struse - US Department of Homeland Security
Presentation
A Quantum World and how NIST is Preparing for Future Crypto
Dr. Dustin Moody - NIST
Presentation
A Secure Toolchain Competition
Mr. Lee Badger - NIST/CSD
Mr. Christopher Johnson
Shawn Webb - G2 Inc.
Carl Landwehr - GWU/LeMoyne College
Presentation
Better Circuits for Boolean Functions
Dr. René Peralta - NIST
Presentation
Case Studies in ISAC Information Sharing
Denise Anderson - National Council of ISACs
Presentation
Challenges and Opportunities in Cyber Information Sharing
John Wunder - The MITRE Corporation
Presentation
Cyber Risk Leadership Keynote
Malcolm Harkins
Keynote
Cybersecurity Headline News - Changing the Story
Zulfikar Ramzan - RSA
Keynote
Cyber Threat Intelligence Sharing: Lessons Learned, Observations, Recommendations
Bob Gourley - Cognitio
Presentation
Derived PIV Credentials Proof of Concept Research
Hildegard Ferraiolo - NIST
Jeff Cichonski - NIST
Paul Fox - Microsoft
Ryan Holley - Intercede
Presentation
DevOps and Container Security
Raghu Yeluri - Intel
John Morello - Twistlock
Paul Cichonski - Lancop
Mike Bartock - NIST
Presentation
Disrupting the Revolution of Cyber-Threats with Revolutionary Security
Rick Engle - Microsoft Federal
Presentation
Enabling Better Security Automation by Adding Context
Michael Stone
Presentation
Enterprises and Encryption: Why Remote Management Matters
Amy Nelson - Dell
Presentation
FIPS 140, Quo Vadis?
Dr. Apostol Vassilev - NIST
Presentation
FIPS 202 and Keccak-Derived Functions
John Kelsey - NIST
Presentation
Guidance and Usage Scenarios for Implementers and Users of Software Identification Tags
Brant Cheikes - The MITRE Corporation
Presentation
It's Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and more
Keynote
Legal Issues in Sharing Cyber Threat Intelligence: What are the Real Concerns?
Kim Peretti
Presentation
National Cybersecurity Center of Excellence Attribute Based Access Control
William Fisher - National Cybersecurity Center of Excellence
Roger Wigenstam - NextLabs
Presentation
Network Security and Lightweight Cryptography
Dr. Kerry McKay - NIST
Presentation
NIST Interagency Report (IR) 8055 Proof of Concept Implementation
Presentation
NSTIC: Sowing seed in the Identity Ecosystem
Phil Lam - NSTIC NATIONAL PROGRAM OFFICE, NIST
Presentation
Panel Discussion: Making SWID Tags Successful in the Marketplace
Brant Cheikes - The MITRE Corporation
Presentation
Security, Automation, and the Cloud
John Banghart
Presentation
Security Automation Challenges: Open Source
Steve Grubb - Red Hat
Presentation
System Firmware: The Emerging Malware Battlefront
Jim Mann - HP
Presentation
TCG TNC: Automating End-to-end Trust
Lisa Lorenzin - Pulse Secure
Presentation
The Whole is Greater...
Sugumar Govindarajan - Intel Server BIOS
John Loucaides - Intel Product Security Incident Response Team
Presentation
Why TPM 2.0? Reasons for Upgrade: Use Cases for the Latest Release of the TPM Specification
Dave Challener - Johns Hopkins Applied Physics Laboratory
Presentation

Event Details

Starts: September 09, 2015 - 08:30 AM EDT
Ends: September 11, 2015 - 12:30 PM EDT

Format: In-person Type: Forum

Agenda

Attendance Type: Open to public
Audience Type: Industry,Government,Academia


Location

Walter E. Washington Convention Center in Washington, D.C

Created January 04, 2017, Updated June 22, 2020