Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

2015 Cybersecurity Innovation Forum

The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing.

The technical program covers four tracks:

  • Trusted Computing
  • Security Automation
  • Cyber Information Sharing
  • Research

Tracks include lectures, panel sessions and several will include live demonstrations.

Goals:

  • Describe current and existing activities (guidance, solutions and technologies that can be used now)
  • Demonstrate solutions built on real world products that address specific current issues
  • Describe emerging activities (guidance, solutions, and technologies that are in progress or draft)
  • Describe new areas of research, concept ideas, and future activities
  • Bring together government requirements and industry solutions
  • Explore gaps or challenges that could be solved by trusted computing, security automation, information sharing disciplines, or an integrated approach of the three disciplines
Selected Presentations
September 11, 2015 Type
Sharing Actionable Threat Indicators Using SCAP
Jim Hanson
CYBER ENGINEERING SERVICES, INC.

Presentation
Sharing Actionable Threat Indicators Using SCAP
Stephen Quinn
NIST

Presentation
War Stories from the Cloud: Rise of the Machines
John Summers
Akamai

Keynote
Cybersecurity: Not Just a Sprint, a Marathon
Tony Scott


Keynote
Using Risk Management to Improve Privacy in Information Systems
Presentation
OVAL Repository Transition
Bill Munyan


Presentation
OVAL Governance & Roadmap
David Ries
Joval

Presentation
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense
Tony Sager

Presentation
NIST's Cryptographic Module Validation Program
Mr. Michael Cooper
NIST/CSD/ITL

Presentation
September 10, 2015 Type
File-Sharing Through NGAC/ABAC for Secure Collaboration
Mr. David Ferraiolo
NIST/CSD

Gopi Katwala

Serban Gavrila

Presentation
The NIST Randomness Beacon
Dr. Rene Peralta
NIST

Presentation
Entropy as a Service: Unlocking the full Potential of Cryptography
Dr. Apostol Vassilev

Mr. Harold Booth


Mr. Robert Staples

Presentation
Graphic File Carving Demonstration
Mr. Rick Ayers
NIST/SSD

Presentation
Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines
Presentation
The Cyber Threat Intelligence Sharing Exchange Ecosystem Program
Dr. Eric Burger

Presentation
SHARKSEER Zero Day Net Defense
Ronald Nielson


Presentation
Crowdsourcing Intelligence: Friend or Foe?!
Ryan Trost
ThreatQuotient

Presentation
Automated Indicator Sharing
W. Werntz

Presentation
Threat-Based "Cyber Operations Rapid Assessment" (CORA)
Dr. Lindsley Boiney
The MITRE Corporation

Presentation
USG Research Focus Keynote
Keynote
Mobile Identity Management for Public Safety
Yee-Yin Choong

Joshua Franklin

Kristen Greene

Presentation
Overview of ITL's Public Safety Cybersecurity Efforts
Dr. Nelson Hastings
NIST

Sheila Frankel
NIST

Presentation
LTE Security - How Good is it?
Mike Bartock
NIST

Jeff Cichonski
NIST

Joshua Franklin

Presentation
Mobile Application Security for Public Saftey
Michael Ogata
NIST

Presentation
Usable Security
Mary Theofanos
NIST

Presentation
Employee Password Usability Survey
Yee-Yin Choong

Presentation
Evolving Security Automation Standards
Jessica Fitzgerald-McKay

Presentation
Integrated Adaptive Cyber Defense: Integration Spiral Results
Wende Peters
Johns Hopkins University Applied Physics Laboratory

Presentation
Security Automation Program Update
Mr. David Waltermire
NIST

Presentation
Security Automation and Continuous Monitoring (SACM)
Lisa Lorenzin
Pulse Secure

Presentation
Intel Identity Protection Technology
Hormuzd Khosravi
Intel Corporation

Presentation
Global Platform Root of Trust
Oliver Van Nieuwenhuyze
STMicroelectronics

Presentation
Haven: Shielding Applications from an Untrusted Cloud
Galen Hunt
Microsoft Research

Marcus Peinado
Microsoft Research

Andrew Baumann
Microsoft Research

Presentation
What's The Right Security for IoT?
Presentation
Intel Identity Protection Technology (IPT)
Hormuzd Khosravi
Intel Corporation

Presentation
September 9, 2015 Type
NSTIC: Sowing seed in the Identity Ecosystem
Phil Lam
NSTIC NATIONAL PROGRAM OFFICE, NIST

Presentation
National Cybersecurity Center of Excellence Attribute Based Access Control
William Fisher
National Cybersecurity Center of Excellence

Roger Wigenstam
NextLabs

Presentation
NIST Interagency Report (IR) 8055 Proof of Concept Implementation
Presentation
Cyber Threat Intelligence Sharing: Lessons Learned, Observations, Recommendations
Bob Gourley
Cognitio

Presentation
Legal Issues in Sharing Cyber Threat Intelligence: What are the Real Concerns?
Kim Peretti

Presentation
A Funny Thing Happened on the Way to OASIS: From Specifications to Standards
Richard Struse
US Department of Homeland Security

Presentation
Challenges and Opportunities in Cyber Information Sharing
John Wunder
The MITRE Corporation

Presentation
Case Studies in ISAC Information Sharing
Denise Anderson
National Council of ISACs

Presentation
It's Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and more
Keynote
Cyber Risk Leadership Keynote
Malcolm Harkins


Keynote
Cybersecurity Headline News - Changing the Story
Zulfikar Ramzan
RSA

Keynote
FIPS 140, Quo Vadis?
Dr. Apostol Vassilev

Presentation
A Secure Toolchain Competition
Mr. Lee Badger
NIST/CSD

Mr. Christopher Johnson

Shawn Webb
G2 Inc.

Carl Landwehr
GWU/LeMoyne College

Presentation
FIPS 202 and Keccak-Derived Functions
John Kelsey
NIST

Presentation
Network Security and Lightweight Cryptography
Dr. Kerry McKay
NIST

Presentation
A Quantum World and how NIST is Preparing for Future Crypto
Dr. Dustin Moody

Presentation
Better Circuits for Boolean Functions
Dr. Rene Peralta
NIST

Presentation
Derived PIV Credentials Proof of Concept Research
Hildegard Ferraiolo
NIST

Jeff Cichonski
NIST

Paul Fox
Microsoft

Ryan Holley
Intercede

Presentation
DevOps and Container Security
Raghu Yeluri
Intel

John Morello
Twistlock

Paul Cichonski
Lancop

Mike Bartock
NIST

Presentation
About the NCCOE
Presentation
Guidance and Usage Scenarios for Implementers and Users of Software Identification Tags
Brant Cheikes
The MITRE Corporation

Presentation
Security, Automation, and the Cloud
John Banghart

Presentation
Security Automation Challenges: Open Source
Steve Grubb
Red Hat

Presentation
Panel Discussion: Making SWID Tags Successful in the Marketplace
Brant Cheikes
The MITRE Corporation

Presentation
TCG TNC: Automating End-to-end Trust
Lisa Lorenzin
Pulse Secure

Presentation
Enabling Better Security Automation by Adding Context
Michael Stone

Presentation
System Firmware: The Emerging Malware Battlefront
Jim Mann
HP

Presentation
Disrupting the Revolution of Cyber-Threats with Revolutionary Security
Rick Engle
Microsoft Federal

Presentation
The Whole is Greater...
Sugumar Govindarajan
Intel Server BIOS

John Loucaides
Intel Product Security Incident Response Team

Presentation
Why TPM 2.0? Reasons for Upgrade: Use Cases for the Latest Release of the TPM Specification
Dave Challener
Johns Hopkins Applied Physics Laboratory

Presentation
Enterprises and Encryption: Why Remote Management Matters
Amy Nelson
Dell

Presentation

Event Details

Starts: September 09, 2015 - 08:30 AM EST
Ends: September 11, 2015 - 12:30 PM EST

Format: In-person Type: Forum

Agenda

Attendance Type: Open to public
Audience Type: Industry,Government,Academia


Location

Walter E. Washington Convention Center in Washington, D.C

Related Events

Previous:
<< 2014 Cybersecurity Innovation Forum

Created January 04, 2017, Updated January 27, 2017