ATARC Federal Cybersecurity Integration Summit Agenda

ATARC Federal Cybersecurity Integration Summit | May 20, 2015

7:30 a.m.
Opening of Registration and ATARC Cyber Technology Showcase

8:00 a.m. – 8:15 a.m. 
Opening Remarks

Organization Chair
Tom Suder, President
Advanced Technology Academic Research Center (ATARC)

Government Chair
Pamela Wise-Martinez, Senior Strategic Enterprise Architect
Information Sharing Environment

8:15 a.m. – 9:00 a.m. 
ATARC Cyber Technology Showcase

9:00 a.m. – 9:20 a.m. 
Visionary Keynote
Donna Dodson, Director
National Cybersecurity Center of Excellence (NCCoE)
Chief Cybersecurity Advisor
National Institute of Standards and Technology

9:20 a.m. – 10:10 a.m.
Visionary Panel – Information Sharing Across the Cyber Domain

As cyber threats against the United States continue to dramatically escalate, the need to share cyber security information across all relevant public and private domains has become crucially important. This panel will examine how the proper exchange of cyber information is necessary to gather and analyze proper intelligence, defend against cyber attacks and quickly respond to major incidents.

Jason Miller, Executive Editor
Federal News Radio

Brad Nix, Deputy Director
U.S. Computer Emergency Readiness Team (US-CERT)
U.S. Department of Homeland Security

Tony Summerlin, Senior Strategic Advisor
Federal Communications Commission

Pamela Wise-Martinez, Senior Strategic Enterprise Architect
Information Sharing Environment

*Pending Agency Approval

10:10 a.m. – 10:55 a.m.
Visionary Panel – Security: The Cornerstone of Federal IT

For Federal agencies to successfully complete any type of technology project, several key security components must be seamlessly incorporated into the solution. This panel will examine the crucial security needs required for integrated solutions involving emerging technologies such as cloud, mobility and big data. The panel will also discuss how proper approaches, tactics and tools including identity management & continuous data monitoring can help ensure a safe and secure IT environment.

Dr. Rocky Young, Principal Cyber Security Engineer
Former Division Chief, Emerging Technology & Cyber Security
U.S. Department of Defense

Steve Elky, Deputy Director, Information Technology Services
Library of Congress

Summer Fowler, Technical Director, Cyber Security Solutions
CERT Division
Software Engineering Institute
Carnegie Mellon University

Renata Spinks, Information Technology Specialist, Strategy and Planning
U.S. Department of Treasury

10:55 a.m. – 11:00 a.m.
ATARC Update
Mike Hettinger, Executive Director
Advanced Technology Academic Research Center (ATARC)

11:00 a.m. – 11:45 a.m.
ATARC Visionary Panel – The Future of Cybersecurity

On the heels of the high-profile Sony hack, what types of cyber threats can we expect to see in the future? How can technologies such as mobile, cloud and Internet of Things be better protected from cyber perpetrators? This panel will examine future cyber defense tools and tactics that that will be necessary to protect against attacks featuring greater and greater sophistication.

Dan Mintz
Program Chair, Information Systems Management
University of Maryland University College
Senior Advisor
Advanced Technology Academic Research Center (ATARC)

Roxanne Everetts, Professor, Cyber Integration & Information Operations
National Defense University

Richard George, Senior Advisor for Cyber Security
Johns Hopkins University Applied Physics Lab

David Maimon, Assistant Professor, Criminology and Criminal Justice
Maryland Cybersecurity Center
University of Maryland

11:45 a.m. – 12:45 p.m.
ATARC Cyber Technology Showcase

12:45 p.m.  1:00 p.m.
ATARC Cybersecurity Innovation Awards

MITRE-ATARC Cybersecurity Collaboration Symposium

The MITRE-ATARC Cybersecurity Collaboration Symposium features discussion and white-boarding between government and industry subject matter experts in a small-group setting. The outcomes of these sessions will be compiled in a White Paper with recommendations to the government.

Cyber Challenge Areas

1. Cybersecurity Framework: Protection and Implementation
Protecting the cybersecurity of our nation’s critical infrastructure is a shared top priority of the Federal government and the private sector. This session will discuss risk management efforts, including the Cybersecurity Framework, examine cross-sector cybersecurity awareness and information-sharing, and analyze methods for increasing cyber resilience.

Government Lead
Thad Odderstol, Director, Industry Engagement & Resilience
U.S. Department of Homeland Security

David Weitzel, Section Lead for Identity Management, Privacy & Cybersecurity

2. Ensuring Validated Identity
The Federal government still has not met the requirements of HSPD-12 as a whole. As the workforce continues to embrace and increase their productivity with mobile devices, as well as cloud and big data solutions, how do we guarantee that only validated individuals are using those devices or platforms? This session will determine the best course of action for ensuring validated identity for industry, government and other communities.

Government Lead
Eugene Yu, Deputy Director, Identity, Credential and Access Management
U.S. Department of Homeland Security

Industry Lead
Jason Macy, Chief Technology Officer
Forum Systems

Dr. Rocky Young, Principal Cyber Security Engineer
Former Division Chief, Emerging Technology & Cyber Security
U.S. Department of Defense

3. It’s the Data, Stupid (View session overview, activities and output)
Cybersecurity is often focused on the tools and techniques of cyber defense. While appropriate, the purpose of these protections is to protect data that is the key assets of the enterprise. Such data may be intellectual property, such as inventions or trade secrets, or customer related data. This panel will create a prioritized list of desired capabilities to protect and defend key enterprise data assets.

Government Lead
Tom Finan, Senior Cybersecurity Strategist and Counsel
U.S. Department of Homeland Security
Industry Lead
Travis Rosiek, Chief Solutions Strategist

Don Faatz, Principal Information System Security Engineer


1:00 p.m. – 1:10 p.m.
Opening Remarks & Logistics
Pat Benito, Principal Agile Systems Engineer

1:10 p.m. – 1:30 p.m.
Dessert & Coffee Break in ATARC Cyber Technology Showcase

1:30 p.m. – 4:00 p.m.
Collaboration Sessions

4:00 p.m. – 4:30 p.m.
Break in ATARC Cyber Technology Showcase

4:30 p.m. – 5:00 p.m.
Session Out Briefs

5:00 p.m. – 7:00 p.m.
ATARC Reception hosted by Samsung


1.   Participants come prepared to:

  • Break out into teams
  • Contribute and participate from specific domain/experience
  • Write ideas on the table space whiteboard
  • Share ideas and build off each other’s contributions
  • Attend and complete session that you have signed-up
  • Support the moderator and team members
  • Create sets of best practices to support the event’s objectives and goals
  • No business development

2.   All discussed material must be publically releasable

  • No Classified discussions
  • No proprietary discussions

3.   None of the discussions or artifacts constitute Government direction, nor should be interpreted as official Government position