Breakout I

10:30 a.m. – 11:10 a.m.

Track A-1: Leveraging Analytics for Defense

Network monitoring and surveillance capabilities create data. Lots of data. The better and faster we understand that data, the better and faster we can defend ourselves. How can agencies automate their analysis of these rich new data streams and produce actionable, real time intelligence about online threats?

Dr. Ray Letteer, Chief, Cybersecurity Division, USMC
Essye Miller, Director of Cybersecurity, U.S. Army
David Tillman, Cybersecurity Director, Dept. of Navy
Don Maclean, Chief Cybersecurity Technologist, DLT Solutions
Moderator: Eric Trexler, Director of Intelligence & Emerging Technologies, Intel Security
Track B-1: Next Generation Endpoint Defense

Signature-based anti-malware might be effective against automated, low skill attackers, but won't stop advanced intruders. Once inside a device, they can go anywhere the endpoint's legitimate owner is allowed — over and over again — looking for ways to get further in. How can agencies do dynamic threat detection and mitigation, and what tools do they need for realtime analysis and response?

CAPT David Dermanelian, Commander, C4IT Service Center, U.S. Coast Guard
Rob Powell, Senior Advisor, Cybersecurity, NASA
Andrew Jacob, Branch Chief, Strategy & Planning, Health IT Innovation and Advanced Technology Development Division, DHA
Aaron Faulkner, Chief Strategy Officer, CloudHASH Security
Moderator: Traviss Green, Director DOD Business Development, Intel Security
Track C-1: The Cloud: Is It Secure?

It feels wrong. How can outsourcing your data to the cloud possibly make it safer, more accessible and easier to handle then when you stored it yourself? And yet it does. How does cloud security work? What guarantees do agencies have their data will be secure?

Michael Hermus, CTO, DHS
Rod Turk, Director, Office of Cybersecurity & CISO, Dept. of Commerce
Steve Orrin, Chief Technologist, Intel Federal
Moderator: Ned Miller, Chief Technology Strategist, Public Sector, Intel Security