Professional Documents
Culture Documents
Cyber Security
for Defense, Intelligence and Homeland Security
STRATEGIES, PLANS, OPPORTUNITIES AND CHALLENGES Military and Government Attendees Now FREE!
DISA, Army Cyber Command, ANG, NSA, Army G-6, Air Force AF2, USMC, JMETC, US-Cert, Cyber Consequences Unit, USCYBERCOM, Boeing, Northrop Grumman, Cisco, Oracle, Intel, IBM, Cubic, Symantec, CSC, SAIC, Deloitte, Harris, Norman, ICF, Fusion-io, CLA, and Teradata will be presenting:
Latest Government & DoD Policies, Strategies, and Imperatives Understanding Current & Emerging Threats to OSD and Service Systems and Networks Newest Developments in Interagency and International Cooperation and Information Sharing Cutting-Edge Multi Level Enterprise Cybersecurity Technologies National Vision for Critical Infrastructure Protection, Including Homeland Security Best Practices for Intelligence Sharing and Maximizing Cyber Protection Capabilities
Co-Sponsor
www.TechnologyTraining.com
Cyber Security
Joint Staff Cyber Needs and Initiatives Lieutenant General Mark S. Bowman, USA Director Command, Control, Communications and Computers (C4), Chief Information Officer, Joint Staff, (J6/CIO)
DHS Cyber Security Needs and Initiatives Mr. Emery Csulak, Deputy Chief Information Security Officer, Department of Homeland Security (DHS) (invited) Cyber Skills Gap, Where We Are, Where We Need to Be Brigadier General Frederick Henry, USA, Chief of Staff, Defense Information Systems Agency (DISA) Army Cyber Security Needs & Initiatives Colonel Patrick L. Kerr, US Army, Deputy G3 Operations, Army Cyber Command/2nd Army JMETC: Developing Cyber T&E Requirements and Infrastructure Mr. Chip Ferguson, Deputy Director, Interoperability and Cyber Test Capability, Test Resource Management
Center and the Program Manager for TRMCs Joint Mission Environment Test Capability (JMETC) Program
Enterprise Network, Designated Accrediting Authority, (DAA), HQMC, Command, Control, Communications, Computers (C4) Department
USMC Cyber Security, Prepping the Battlefield Mr. Ray Letteer, USMC, Senior Information Assurance Official, Chief, Cybersecurity Division (CY), Marine Corps Integrating Army Networks for Improved Cyber Security Mr. Gary Blohm, Director, Army Architecture Integration Center (AAIC), Headquarters, Department of the Army,
Chief Information Office/G6
Comprehensive National Cybersecurity Initiative Five (CNCI-5): Enhance Shared Situational Awareness Mr. Antonio T. Scurlock, Senior Cybersecurity Strategist, Department of Homeland Security/DoD Joint
Coordination Element (JCE), Office of the Director of Cybersecurity Coordination, (DCC), DHS
U.S-Cert: National Cyber Awareness Program Update Ms. Ann Barron-DiCamillo, Director, United States Computer Emergency Readiness Team (US-CERT), Army Reserve National Guard Cybersecurity Capability-Always Ready, Always There Colonel Mary Henry, USA, Chief Information Officer, Army National Guard, G-6 and Colonel James Taylor, USA, Army National Guard, G-2 USCYBERCOM Cyber Strategies and Imperatives Senior Representative, USA, U.S. Cyber Command, (Invited)
Cyber Defense within the National Cyber Incident Response Plan and Emergency Management Frameworks: A State Approach LIEUTENANT COLONEL Thomas Muehleisen, USA, Chief Information Officer/G-6, Washington Army
National Guard (tentative)
The Ultimate Stealth War: The Role of Logic Bombs and Triggers in Cyber Combat Mr. Scott Borg Director, and Chief Economist, U.S. Cyber Consequences Unit
Critical Infrastructure Automation Advanced Persistent Malware Techniques for Hiding Malware Triggering Strategies for Malware
Cyber Risk Trends Mr. Vergle Gipson, Assistant Deputy Director, Fusion, Analysis and Mitigations (FAM), National Security
Administration Central Security Services (NSA/CSS)
National Security Conceptions of Cyber Protection, Sovereignty, and National Power Mr. Samuel Visner, President, CSC Cyber Security Confluence of Data Security Challenges Mr. Patrick Gray, Principal Security Strategist, Borderless Networks, Cisco
The Cyber Threats Facing Us Today - The Who, Where and How It is Paramount that We Understand Their Methodologies Listen and Learn from One Who has Tracked these Entities for Over Two Decades
Cybersecurity Strategies to Address Threats and Protect Privacy Mr. Dan Chenok, Executive Director, Center for the Business of Government, IBM Global Business Solutions
This Session will Focus on Strategies and Policies that can Help Government Work to Detect and Deter Cyber Threats and Vulnerabilities, Share Information About Mitigations, and Do So in a Way that is Protective of Private Information About Individuals and Businesses
A Military Offensive Cyber Security Plan Needs & Challenges Mr. Alfred Buckles Vice President, Defense and Maritime Solutions Business Unit, SAIC, Account Manager, U.S. Strategic Command Need for an Offensive Component to a U.S. Cyber Strategy Colonel (ret) Cedric Leighton, USAF Founder & President, Cedric Leighton Associates
Cyber Security: Managing the Threat Mr. John Toomer, Director, Intelligence, Information and Cyber Systems Government, Operations,
The Boeing Company
USG Industry Roles in Managing the Cyber Threat Avoiding Onerous Legislation Cyber Security in Our Products Anti-Tamper, Mission Assurance, Secure Supply Chain
ICF International
The Next Level: Cloud Computing and Information Assurance Mr. Kevin McDonald, Technology Fellow, Senior Infrastructure & Cybersecurity and Cloud Strategist, Multinational Cybersecurity Information Sharing Dr. Donald Robinson, Ph.D., Principal Cybersecurity Technologist, Northrop Grumman Protecting the Services: A Unified Cyber Defense Capability Mr. Les McMonagle, Principal Consultant & Managing Partner, Teradata Information Security Center of
Excellence (COE)
Enhancing Speed-to-Intelligence Mr. Christian Schrauder, Chief Technology Officer, U.S. Federal, Fusion-io
FLASH is Essential to Modern Datacenter Performance and Economy FLASH Plays a Key Role in Real Time Monitoring for Cyber Security
IV. Strategies, Tools and Techniques for the Future Cyber Enterprise
Special Presentation:
All Things Cyber: Whats Next for the Cyber Enterprise? Lt. Gen. (ret) Peter Cuviello, USA Director, Networked Enabled Operational Support, Deloitte Consulting Services LLP, and Former U.S. Army CIO/G6 Building Trusted Clouds Mr. Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation
This Session Will Overview Challenges for Trust and Security in the Cloud Describe Methods for Establishing and Assessing Trust and Compliance Overview Some of the Ecosystem and Industry Initiatives for Deploying Trusted Private and Public Cloud Infrastructures
Digital Forensic Analysis: Investigating a Point-of-Sale Server Attack Mr. Brian Hussey, Director of Digital Forensics, Crucial Security Inc., Harris Corporation Using a Cross Domain Guard to Enable One Way Print and One Way Email to Support the Growing Demand for High Stream Video Mr. Dave Radtke, Director, XD Products, Cubic Corporation and Mr. Gene Mezeivtch, Vice President of Sales, Cubic Corporation Hunting for APTs: How Machines Will Win the Cyberwar Mr. Darin Andersen, General Manager, Norman AS Cyber Security Threats and Solutions Ms. Gigi Schumm, Vice President and General Manager, Public Sector, Symantec Corporation Reducing IT Total Cost of Ownership Through COTS Cyber Solutions Mr. Peter Bostrom, Director, Public Sector, Oracle Corporation
COTS Cyber Solutions for Offense and Defense Hold Potential for Achieving a Higher Level Return on Investment, a Lower Total Cost of Ownership, a Faster Speed to Capability This Session will Describe a COTS-Based Vision for the Full Spectrum Cyber Capability
Please contact Marcus Min @ 310-320-8128 to find out how your organization can participate.
Would you like to be an exhibitor at this symposium? Host a breakfast, lunch or beverage reception during the symposium?
Cyber Security
for Defense, Intelligence and Homeland Security Govt/DoD Individual/Contractor
Mailing Information
________________
CSFI Member Teams 3/more
WASHINGTON, DC
Registration Methods Information/Registration: (310) 320-8110 Register by FAX: (310) 320-8101 Register online: TechnologyTraining.com Sponsor/Exhibit Inquires: (310) 320-8128
Enclosed is a check payable to Technology Training Corporation to cover registration(s) of the following individual(s):
Name: _______________________________________________________ Position: _____________________________________________________ Management approval by: _______________________________________ Company/Organization: _________________________________________ Street: ________________________________ Mail Code:_____________ City: ________________________ State:_______ ZIP: _______________ Phone (area code): (________) _________________ Ext: _____________ Fax (area code): (_______) ______________________________________ E-Mail: ______________________________________________________ Home Address: Street: ________________________________________________________
CS-C
SOCO Advisory 11-02: Accordingly, the reasonable per day attendance fee for purposes of JER 3-211.a(7) is now $675.
Special Exhibitor and Sponsorships at Tiered Pricing from $3,000 (Includes General Session), Contact Marcus Min @ (310) 320-8128.
Special Hardship Scholarship Program: A number of seats have been set aside for every seminar and symposium for any motivated attendee who is unable to attend due to severe financial limitations of his/her company or if they are under very tight military limitations. Students will be eligible for a very substantial discount. payment policy: Payments, both domestic and international, must be received on or before the first day of the symposium. No attendee will be admitted into the symposium without payment by either check, credit card (VISA, Mastercard, AMEX, Discover and Diners Club accepted) or U.S. Government purchase order. CANCELLATIONS: Substitutions may be made at any time. A cancellation service charge of $150 will be rendered for all cancellations received fifteen days or more prior to the start of the symposium date. Registrants whose cancellation requests are not received fifteen days prior to the individual symposium, as well as no shows, are liable for the entire registration fee. You must obtain a cancellation number from our registrar. Tuition, symposium documentation, and refreshments, are included in the fee
City: ________________________ State:_______ ZIP: ________________ Mail or Fax the credit card information below directly to TTC.
________________
Card Number ____________________________________________________________
Signature Expiration Date Auth. Code
Through the Graduate School USA, 1.2 Continuing Education Units (CEUs) will be available for participants who attend the entire conference. Within 4-6 weeks after the event, attendees will receive their certificate of attendance via email. www.graduateschool.edu
Co-Sponsored By:
Mission Statement: To provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners. 2013 TTC Printed in USA