Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Local Bets on Global Threats | Suits and Spooks DC 2016
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Thursday, February 11
 

9:00am

Welcome Address
Speakers
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of... Read More →


Thursday February 11, 2016 9:00am - 9:15am
National Press Club 529 14th Street Northwest, Washington, DC 20045

9:15am

BAE Systems Panel: An Inside Look at a Prime Defense Contractor's Global Threat Landscape (NO PRESS)
BAE Systems is one of the world's largest defense contractors. This panel of senior security engineers will give attendees an unprecedented insider's look at the company's global threat landscape.

CLOSED TO PRESS. 

Speakers
avatar for Douglas Bruns

Douglas Bruns

Director, Global Security Operations, BAE Systems
Doug Bruns is Technical Director of the Global Security Operations Center (GSOC), BAE Systems Inc. Cybersecurity. In this role, he is responsible for intrusion detection and incident response across six continents supporting BAE Systems business in over one hundred countries. He leads a team of senior analysts tasked with combating advanced cyber threats and reports directly to the Global CISO of BAE Systems. Bruns holds a bachelor’s... Read More →
TO

Trevor Odell

Director, IT Security and Assurance, BAE Systems
JW

James Witherspoon

Principal Penetration Tester, BAE Systems
Jimmy Witherspoon is a Principal Penetration Tester for BAE Systems.  Jimmy's roles include research & simulation of advanced threats to corporate systems and infrastructure, development & verification of mitigation strategies, and user outreach & education.  Jimmy has been performing systems engineering and vulnerability assessments for nearly two decades. He holds a Bachelor's of Science in Physics from the University of... Read More →


Thursday February 11, 2016 9:15am - 10:00am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:00am

GPS Spoofing, Jamming, and Hacking - How Secure is our Global Positioning System?
Topic information to be added.

CLOSED TO PRESS 

Speakers
avatar for Mark Lockwood Psiaki

Mark Lockwood Psiaki

Professor, Cornell University
Professor, Sibley School of Mechanical and Aerospace Engineering (M&AE), College of Engineering.  | Ph.D. in Mechanical and Aerospace Engineering, PRINCETON UNIVERSITY 1987 M.A. in Mechanical and Aerospace Engineering, Princeton University 1984 B.A. in Physics, PRINCETON UNIVERSITY 1979


Thursday February 11, 2016 10:00am - 10:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:45am

AIAA Panel: How Does Cybersecurity in Space Differ from on the Ground? (NO PRESS)

Traditional hacking skills are only half of the equation for a threat actor trying to take over a space-based asset. Once a spacecraft or ground station is penetrated, a sophisticated attacker needs to know how to cause harm to an on-orbit system. This discussion would look at several threat surfaces and how security professionals are working to secure them.

•             Data-link security – Space systems are controlled by a data link from the ground. How secure is that link?

                Speaker – Howie Weiss, Security WG Chair, CCSDS

•             S/C Control security – the cyber-physical nature of onboard spacecraft systems require that an attacker understand spacecraft dynamics and system interactions in order to gain control, how are onboard systems protected?

                Speaker – Aerospace Crop. Cyber lead, Jandria Alexander

Moderated by Dave LaVallee - Senior Project Lead, Space Sector, Johns Hopkins University Applied Physics Laboratory

CLOSED TO PRESS. 


Moderators
DL

Dave LaVallee

Senior Project Lead, Space Sector | Johns Hopkins University Applied Physics Laboratory

Speakers
JA

Jandria Alexander

Aerospace Corporation Cyber Lead (invited)
HW

Howie Weiss

Technical Director, Parsons
Technical Director, PARSONS | Security Working Group Chair, CCSDS (invited)


Thursday February 11, 2016 10:45am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:15am

BREAK
Thursday February 11, 2016 11:15am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:30am

Milware After Stuxnet
The evolution of leading edge state authored malicious code since Stuxnet has tended towards highly capable, modular espionage platforms. Capturing these capabilities under the term milware, this talk walks through some of the key differences including operating system like architectures and increasing persistence. It then highlights short term security challenges for the infosec community and long run implications for government. Based on what we know about platforms like Duqu 2.0, Equation Group, Turla, and Flame - milware threatens to undermine assumptions about how security firms operate, the role for law enforcement, and how threat actor's capabilities change over time.

Speakers
TH

Trey Herr

Sr. Research Associate, George Washington University
Trey Herr is a Senior Research Associate with the Cyber Security Policy and Research Institute (CSPRI) at George Washington University and a non-resident fellow with New America’s Cybersecurity Initiative. His work focuses on the relationship between state power and information security including trends in state developed malicious software, the structure of criminal markets for malware, and the regulatory environment for “cyber... Read More →


Thursday February 11, 2016 11:30am - 12:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:00pm

Stakes and Consequences: Protecting Oneself From Global Threats to Mobile Communications

Stakes and Consequences: Protecting Oneself From Global Threats to Mobile Communications 

Presented by Elad Yoran, Executive Chairman, KoolSpan, and Adam Meyers, VP of Intelligence at CrowdStrike.

Global mobile communications systems are under attack. Technology and financial barriers to attack mobile communications are eroding quickly and the proliferation of attacks is increasing at an alarming rate.  Rogue cell towers, man in the middle and other attacks are used by diverse actors to engage in corporate and private espionage and cyber‐crime campaigns globally.  Business people, high net worth families, journalists, NGOs, international travelers and others must recognize wider risks to their private communications, and implement technology and behavioral defenses to resume trust in communications.  


Speakers
AM

Adam Meyers

VP of Intelligence, CrowdStrike
Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee and VP of Intelligence at CrowdStrike Inc., a global provider of security technology and services focused on identifying advanced threats and targeted attacks. A... Read More →
avatar for Elad Yoran

Elad Yoran

CEO, Security Growth Partners. Elad’s 20 years in the cyber security industry spans experience as an executive, consultant, investor, investment banker and a several-time successful entrepreneur.


Thursday February 11, 2016 12:00pm - 12:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:30pm

Chasing Unicorns: What Are The Trends in VC Funding for 2016 and How Will That Impact The Security Space?
Speakers
avatar for Mark Hatfield

Mark Hatfield

Founder, Ten Eleven Ventures
- Starting new security companies | - Amazing new security tech / ideas / approaches | - Executive roles within a company | - Advisory / Board roles at a company
JH

James Hunt

Partner, J Hunt Holdings
Active consultant and angel investor in the technology space, with emphasis on security
avatar for Elad Yoran

Elad Yoran

CEO, Security Growth Partners. Elad’s 20 years in the cyber security industry spans experience as an executive, consultant, investor, investment banker and a several-time successful entrepreneur.


Thursday February 11, 2016 12:30pm - 1:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:15pm

LUNCH BREAK
Thursday February 11, 2016 1:15pm - 2:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:15pm

The CISO Imperative – Taking Control of Cyberattacks on SAP

Business-critical applications running on SAP and Oracle are emerging as the next big target of attacks and the ultimate economic targets for cyberattacks. They are also the biggest blind spot for CISOs. In this session CISO’s will learn about the top attack vectors targeting SAP, how the attacks access sensitive information and the top 5 things to incorporate into an information security strategy. 


Speakers
avatar for Sage Wagner

Sage Wagner

Technical Sales Engineer, Onapsis


Thursday February 11, 2016 2:15pm - 2:45pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:45pm

For the Love of Money: Electronic Currencies, Cyber Criminals and You
Today, we use money in ways that our ancestors could never have dreamed. 
Evolution has seen us move ever closer to a cashless society. We’ve already seen the 
introduction of alternative currencies; specifically e-electronic currencies. Adoption 
of these alternative currencies has been slow, however, within certain communities, 
their adoption has been vigorous.

Take for example the realm of the cyber criminal.  Within the global cyber criminal ecosystem the adoption of electronic currencies has been common and long-standing. Cyber criminals offer information, intelligence, goods, and services in a variety of forums and sites hosted on the surface and dark web where they almost exclusively ask for payment using an electronic currency of one sort or another.

Speakers
avatar for Will Gragido

Will Gragido

Head of Threat Intelligence, Digital Shadows
Will has more than 21 years of experience in information technology and security. A former United States Marine, Will was first exposed to security and intelligence in the service. He has held technical and research roles at Internet Security Systems / IBM Internet Security Systems, Damballa, HP DVLabs, and RSA NetWitness. He holds a Bachelor of Arts from DePaul University and is pursuing graduate studies at Norwich University. Will has... Read More →


Thursday February 11, 2016 2:45pm - 3:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

3:15pm

Insider Threat: Risk Scoring, Machine Learning, and other Strategies
This panel will explore the challenges with "insider" risk detection, measurement and management in secure environments, such as:
  • Insiders are implicitly trusted by traditional security controls
  • Human motivations are unpredictable – businesses can’t assume that their employees are malicious or that they will always comply with internal regulations
  • Innovative technologies can understand subtle changes in people’s behavior without having to tag users or behaviors in advance
 

Speakers
avatar for Curtis Bragdon

Curtis Bragdon

Sales executive, Darktrace
Curtis Bragdon joined Darktrace in 2015 as a Cyber Security Executive. With over 10 years of experience in security, Mr. Bragdon specializes in the technical aspects of security and reliability of safety-critical systems. Mr. Bragdon holds an MBA from Babson and a BA in Computer Science from Brown University
avatar for Casey Corcoran

Casey Corcoran

VP, Strategy, FourV
Casey is a business and technology leader with over 20 years of experience in IT, and a proven track record in strategic business innovation and development. Casey heads the product and market development strategy at FourV.   Most recently, Casey was the Chief Technology Officer of JoS. A. Bank Clothiers, supporting 650 stores, six websites, three distribution centers, and the corporate headquarters. Prior to this, Casey was the business... Read More →
AM

Adrian Mahieu

CEO, Cortex Insight
TBD
avatar for Wallace Sann

Wallace Sann

Public Sector CTO | RVP of Systems Engineering, ForeScout Technologies
Wallace Sann joined ForeScout Technologies in 2006 and currently serves as ForeScout’s Public Sector CTO and Regional VP of Systems Engineering.  In this role he provides technical leadership for ForeScout’s Federal programs and Product & Certification roadmap, while also overseeing the Federal Systems Engineering team.   He participates in numerous industry panels and speaking engagements on continuous... Read More →


Thursday February 11, 2016 3:15pm - 4:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

3:45pm

BREAK
Thursday February 11, 2016 3:45pm - 4:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

4:00pm

Disrupt & Destroy: A look at current Ransomware trends and capabilities

Thursday February 11, 2016 4:00pm - 4:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

4:30pm

Reduce the Attack Surface Inside Your Data Center and Cloud

Enterprises need to safeguard high-value applications handling intellectual property, financial data, big-data apps, and other regulated information while also addressing compliance mandates. Traditional security mechanisms using network constructs like VLANs, subnets, and zones with IP-based rules are cumbersome, error-prone, and even impractical in many cases.

During this session we'll discuss how enterprises are using adaptive security to continuously protect high value applications no matter where they reside–data center, public or private cloud.


Speakers
avatar for John Westerman

John Westerman

Engineer, Illumio
John has 30 years in the Networking and Security industry experience designing, building and optimizing enterprise and government networks. John has lived and worked in the DC area for 16 years.



Thursday February 11, 2016 4:30pm - 5:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045
 
Friday, February 12
 

9:00am

Survey of Vulnerabilities in Critical Infrastructure
Speakers
avatar for Remy Baumgarten

Remy Baumgarten

Lead Security Engineer, ANRC
avatar for Tom Kellerman

Tom Kellerman

VP, Cyber Security, Trend Micro
As Vice President of Cyber Security at Trend Micro, Mr. Kellermann is focused on acting as a trusted cybersecurity advisor and strategist within the federal, state and local government markets. He utilizes his experience as a security evangelist and government affairs expert to forge strategic partnerships both domestically and internationally, and increase Trend Micro's profile in emerging technologies and policy issues. Tom Kellermann served... Read More →
avatar for Scott Montgomery

Scott Montgomery

Vice President, Chief Technical Strategist, Intel Security
Scott A. Montgomery is vice president and chief technical strategist for the Intel Security Group at Intel Corporation. He manages the worldwide team of chief technology officers who lead the group's various business units and is responsible for advancing technical innovation in Intel's security solutions.
avatar for Nathan Swaim

Nathan Swaim

President, ANRC
avatar for Sage Wagner

Sage Wagner

Technical Sales Engineer, Onapsis


Friday February 12, 2016 9:00am - 9:55am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:00am

Legal and Operational Analysis of the Ukraine Power Grid Attack
A panel of experts from the fields of industrial control systems, international law, and information security will discuss the legal and operational implications of the recent malware attack against several Ukrainian energy distribution companies.

Moderators
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of... Read More →

Speakers
avatar for Gary Brown

Gary Brown

Professor of Cyber Security, Marine Corps University
Gary Brown is Professor of Cyber Security at Marine Corps University, Quantico, Virginia.  Previously he served as Head of Communications and Congressional Affairs for the Washington Delegation, International Committee of the Red Cross (ICRC); he was with the ICRC from 2012-2015.  Prior to joining the ICRC, he served 24 years as a judge advocate with the United States Air Force.
CC

Cameron Camp

Security Researcher, ESET North America
IoT, SCADA, Finserv hacking
avatar for Tom Kellerman

Tom Kellerman

VP, Cyber Security, Trend Micro
As Vice President of Cyber Security at Trend Micro, Mr. Kellermann is focused on acting as a trusted cybersecurity advisor and strategist within the federal, state and local government markets. He utilizes his experience as a security evangelist and government affairs expert to forge strategic partnerships both domestically and internationally, and increase Trend Micro's profile in emerging technologies and policy issues. Tom Kellermann served... Read More →
avatar for Michael Toecker

Michael Toecker

Michael Toecker is a Professional Engineer (Missouri) specializing in the cyber security of control system systems, particularly those used in power generation. Mr. Toecker has spent 9 years working in electric power and control system security, first at a Big 5 power engineering firm, then at the power generation arm of a major utility. Mr Toecker had most recently worked for the control system security firm Digital Bond, before starting Context... Read More →


Friday February 12, 2016 10:00am - 10:45am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:45am

AIAA Panel: Commercial Aerospace Threat Space (NO PRESS)
This session will review the design philosophy and the cyber security framework developed for aviation.  The panel will explore along with the audience the opportunities to address key issues facing aviation.
  • Establish cyber standards for aviation the ecosystems
  • Ensure a cyber security culture
  • Understand the threat
  • Understand the risk  
  • Communicate the threats
  • Assure situational awareness  
  • Provide incident management
  • Strengthen the defensive system
  • Define design and operational principles
  • Conduct necessary research and development
  • Establish and coordinate aviation cyber security strategies, policies, and plans
 The panel will invite ideas from the audience of methodologies and approaches that may be useful in fulfilling the cybersecurity framework.  

CLOSED TO PRESS. 

Speakers
avatar for Paul Kurtz

Paul Kurtz

CEO, TruSTAR Technology
Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years by building the US government and international business verticals. Prior to CyberPoint, Paul was the managing partner of Good Harbor Consulting where he oversaw the... Read More →
avatar for Emilian Papadopoulos

Emilian Papadopoulos

President, Good Harbor Security Risk Management
Emilian Papadopoulos is president of Good Harbor Security Risk Management, a cyber risk management advisory firm. Mr. Papadopoulos advises Boards, CEOs, investment professionals, and government leaders on managing cyber risk. He has helped clients across sectors including energy, insurance, law, technology, defense, and manufacturing. Mr. Papadopoulos' experience in strategic planning and international security risk management spans North... Read More →



Friday February 12, 2016 10:45am - 11:15am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:15am

BREAK
Friday February 12, 2016 11:15am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:30am

When a Backdoor Isn’t a Backdoor: Is This Time Different?
Governments are seeking a process for access to encrypted data - particularly on mobile devices and in the cloud - as strong encryption becomes commonplace.  Governments fear “going dark” – with encryption hindering criminal and national security investigations.  Privacy advocates have opposed backdoors as fundamentally insecure and even unnecessary in light of the vast metadata increasingly available.  The U.S. tried to mandate backdoors before, and failed in dramatic fashion.  We provide an update on the current state of affairs, covering the various proposals for working around encryption and counterarguments.  We conclude with proposals to address the lingering question of whether governments can walk away from the question this time and whether there is a solution that enables limited government access to secure communications. 

Speakers
avatar for Jim Denaro

Jim Denaro

Partner, CipherLaw
Jim is a registered patent attorney in the Washington, D.C. area and advises clients on offensive and defensive applications of intellectual property. Jim has particular expertise in information security and cybersecurity technologies, and is a frequent speaker and writer on the subject. Jim has experience in a broad range of information security technologies including intrusion detection and prevention, botnet investigation, malware discovery... Read More →
avatar for Ken Mendelson

Ken Mendelson

Managing Director, Stroz Friedberg
As Managing Director at Stroz Friedberg, LLC, Ken Mendelson manages a docket of digital forensic, electronic discovery, data breach, investigative and security risk assessment assignments.  Mr. Mendelson has supervised several multi-terabyte electronic evidence identification, preservation and production engagements on behalf of Fortune 500 corporations in the context of civil, criminal and regulatory investigations and... Read More →
avatar for Randy Sabett

Randy Sabett

Special Counsel, Cooley LLP
At Cooley, my practice involves providing advice and counseling on cybersecurity matters and related technology issues, including privacy, IT licensing, and intellectual property. I work with companies in developing strategies to protect their information and exploit their IP. I also counsel clients on a variety of issues in technology areas such as cryptography, authentication, active defense, information security, compliance (GRC... Read More →


Friday February 12, 2016 11:30am - 12:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:15pm

How Can U.S. Multinational Companies Do Business Overseas And Still Protect Their Assets?
U.S. multinationals have no choice but to do business and build supply chains overseas. Unfortunately some of their most important markets are also present the most risk in terms of protecting their intellectual property from competitors, criminal organizations and foreign governments. This panel of experts will discuss and debate how U.S. companies can make a profit while not losing their IP.

Speakers
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of... Read More →
avatar for Paul Kurtz

Paul Kurtz

CEO, TruSTAR Technology
Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years by building the US government and international business verticals. Prior to CyberPoint, Paul was the managing partner of Good Harbor Consulting where he oversaw the... Read More →
avatar for Jody Westby

Jody Westby

Adjunct Professor, College of Computer Science, Georgia Institute of Technology
Jody Westby is the CEO of Global Cyber Risk and provide consulting services in the areas of privacy, security, cybercrime, and IT governance. She also serves as Adjunct Professor at Georgia Institute of Technology's School of Computer Science and Distinguished Fellow for Carnegie Mellon CyLab. Jody chairs the American Bar Association’s Privacy & Computer Crime Committee. She has served as co-chair of the World Federation of Scientists... Read More →


Friday February 12, 2016 12:15pm - 12:45pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:45pm

BREAK
Friday February 12, 2016 12:45pm - 1:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:00pm

Applying International Law To Norms in Cyber Warfare
Speakers
avatar for Gary Brown

Gary Brown

Professor of Cyber Security, Marine Corps University
Gary Brown is Professor of Cyber Security at Marine Corps University, Quantico, Virginia.  Previously he served as Head of Communications and Congressional Affairs for the Washington Delegation, International Committee of the Red Cross (ICRC); he was with the ICRC from 2012-2015.  Prior to joining the ICRC, he served 24 years as a judge advocate with the United States Air Force.
avatar for Catherine Lotrionte

Catherine Lotrionte

Director, Institute for Law, Science and Global Security, Georgetown University
Professor Catherine Lotrionte is the Director of the Institute for Law, Science and Global Security and Visiting Assistant Professor of Government and Foreign Service at Georgetown University. Professor Lotrionte teaches courses on national security law, U.S. intelligence law, and international law. In addition to teaching, Professor Lotrionte coordinates research projects and events for the Institute for Law, Science and Global Security at... Read More →


Friday February 12, 2016 1:00pm - 1:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:30pm

PANEL: The Evolution of The Daesh (ISIL): Combating Urban Terrorism in 2016 and Beyond
This panel discussion will explore the evolution of terrorism by the Daesh, also known as ISIS, ISIL or IS, against targets around the world including Paris. The panel participants are world-renowned authorities in intelligence, counterinsurgency, and counter-terrorism, and topics for discussion will include adversary strategy, tactics, and countermeasures as well as how Western governments should respond to protect their populations.

Speakers
avatar for Mark Kelton

Mark Kelton

Mark Kelton served as a senior Central Intelligence Agency executive with 34 years of experience in intelligence operations. His career culminated as Deputy Director of the National Clandestine Service for Counterintelligence (DDNCS/CI), one of the most senior ranking positions in the Clandestine Service and as such, directed CIA’s counterintelligence and counterespionage programs and protecting the nation’s closely guarded secrets. He... Read More →
DK

David Kilcullen

Dr David Kilcullen is the founding CEO and president of Caerus Associates, a firm that specializes in designing for humanitarian impact in conflict-affected and complex environments. Dr. Killcullen has substantial experience in designing, implementing and evaluating rural and peri-urban energy systems in conflict-affected areas including Afghanistan, Iraq, Indonesia, Bougainville, and Papua New Guinea. | | Before founding Caerus, Dr... Read More →


Friday February 12, 2016 1:30pm - 2:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:15pm

NETWORKING
Friday February 12, 2016 2:15pm - 2:45pm
TBA