Loading…
Local Bets on Global Threats | Suits and Spooks DC 2016
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Thursday, February 11
 

9:00am

Welcome Address
Speakers
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of cyber security and cyber warfare in the i... Read More →


Thursday February 11, 2016 9:00am - 9:15am
National Press Club 529 14th Street Northwest, Washington, DC 20045

9:15am

BAE Systems Panel: An Inside Look at a Prime Defense Contractor's Global Threat Landscape (NO PRESS)
BAE Systems is one of the world's largest defense contractors. This panel of senior security engineers will give attendees an unprecedented insider's look at the company's global threat landscape.

CLOSED TO PRESS. 

Speakers
avatar for Douglas Bruns

Douglas Bruns

Director, Global Security Operations, BAE Systems
Doug Bruns is Technical Director of the Global Security Operations Center (GSOC), BAE Systems Inc. Cybersecurity. In this role, he is responsible for intrusion detection and incident response across six continents supporting BAE Systems business in over one hundred countries. He leads... Read More →
TO

Trevor Odell

Director, IT Security and Assurance, BAE Systems
JW

James Witherspoon

Principal Penetration Tester, BAE Systems
Jimmy Witherspoon is a Principal Penetration Tester for BAE Systems.  Jimmy's roles include research & simulation of advanced threats to corporate systems and infrastructure, development & verification of mitigation strategies, and user outreach & education.  Jimmy has been performing... Read More →


Thursday February 11, 2016 9:15am - 10:00am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:00am

GPS Spoofing, Jamming, and Hacking - How Secure is our Global Positioning System?
Topic information to be added.

CLOSED TO PRESS 

Speakers
avatar for Mark Lockwood Psiaki

Mark Lockwood Psiaki

Professor, Cornell University
Professor, Sibley School of Mechanical and Aerospace Engineering (M&AE), College of Engineering.  | Ph.D. in Mechanical and Aerospace Engineering, PRINCETON UNIVERSITY 1987 M.A. in Mechanical and Aerospace Engineering, Princeton University 1984 B.A. in Physics, PRINCETON UNIVERSITY... Read More →


Thursday February 11, 2016 10:00am - 10:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:45am

AIAA Panel: How Does Cybersecurity in Space Differ from on the Ground? (NO PRESS)

Traditional hacking skills are only half of the equation for a threat actor trying to take over a space-based asset. Once a spacecraft or ground station is penetrated, a sophisticated attacker needs to know how to cause harm to an on-orbit system. This discussion would look at several threat surfaces and how security professionals are working to secure them.

•             Data-link security – Space systems are controlled by a data link from the ground. How secure is that link?

                Speaker – Howie Weiss, Security WG Chair, CCSDS

•             S/C Control security – the cyber-physical nature of onboard spacecraft systems require that an attacker understand spacecraft dynamics and system interactions in order to gain control, how are onboard systems protected?

                Speaker – Aerospace Crop. Cyber lead, Jandria Alexander

Moderated by Dave LaVallee - Senior Project Lead, Space Sector, Johns Hopkins University Applied Physics Laboratory

CLOSED TO PRESS. 


Moderators
DL

Dave LaVallee

Senior Project Lead, Space Sector | Johns Hopkins University Applied Physics Laboratory

Speakers
JA

Jandria Alexander

Aerospace Corporation Cyber Lead (invited)
HW

Howie Weiss

Technical Director, Parsons
Technical Director, PARSONS | Security Working Group Chair, CCSDS (invited)


Thursday February 11, 2016 10:45am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:15am

BREAK
Thursday February 11, 2016 11:15am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:30am

Milware After Stuxnet
The evolution of leading edge state authored malicious code since Stuxnet has tended towards highly capable, modular espionage platforms. Capturing these capabilities under the term milware, this talk walks through some of the key differences including operating system like architectures and increasing persistence. It then highlights short term security challenges for the infosec community and long run implications for government. Based on what we know about platforms like Duqu 2.0, Equation Group, Turla, and Flame - milware threatens to undermine assumptions about how security firms operate, the role for law enforcement, and how threat actor's capabilities change over time.

Speakers
TH

Trey Herr

Sr. Research Associate, George Washington University
Trey Herr is a Senior Research Associate with the Cyber Security Policy and Research Institute (CSPRI) at George Washington University and a non-resident fellow with New America’s Cybersecurity Initiative. His work focuses on the relationship between state power and information... Read More →


Thursday February 11, 2016 11:30am - 12:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:00pm

Stakes and Consequences: Protecting Oneself From Global Threats to Mobile Communications

Stakes and Consequences: Protecting Oneself From Global Threats to Mobile Communications 

Presented by Elad Yoran, Executive Chairman, KoolSpan, and Adam Meyers, VP of Intelligence at CrowdStrike.

Global mobile communications systems are under attack. Technology and financial barriers to attack mobile communications are eroding quickly and the proliferation of attacks is increasing at an alarming rate.  Rogue cell towers, man in the middle and other attacks are used by diverse actors to engage in corporate and private espionage and cyber‐crime campaigns globally.  Business people, high net worth families, journalists, NGOs, international travelers and others must recognize wider risks to their private communications, and implement technology and behavioral defenses to resume trust in communications.  


Speakers
AM

Adam Meyers

VP of Intelligence, CrowdStrike
Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee... Read More →
avatar for Elad Yoran

Elad Yoran

CEO, Security Growth Partners. Elad’s 20 years in the cyber security industry spans experience as an executive, consultant, investor, investment banker and a several-time successful entrepreneur.


Thursday February 11, 2016 12:00pm - 12:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:30pm

Chasing Unicorns: What Are The Trends in VC Funding for 2016 and How Will That Impact The Security Space?
Speakers
avatar for Mark Hatfield

Mark Hatfield

Founder, Ten Eleven Ventures
- Starting new security companies | - Amazing new security tech / ideas / approaches | - Executive roles within a company | - Advisory / Board roles at a company
JH

James Hunt

Partner, J Hunt Holdings
Active consultant and angel investor in the technology space, with emphasis on security
avatar for Elad Yoran

Elad Yoran

CEO, Security Growth Partners. Elad’s 20 years in the cyber security industry spans experience as an executive, consultant, investor, investment banker and a several-time successful entrepreneur.


Thursday February 11, 2016 12:30pm - 1:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:15pm

LUNCH BREAK
Thursday February 11, 2016 1:15pm - 2:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:15pm

The CISO Imperative – Taking Control of Cyberattacks on SAP

Business-critical applications running on SAP and Oracle are emerging as the next big target of attacks and the ultimate economic targets for cyberattacks. They are also the biggest blind spot for CISOs. In this session CISO’s will learn about the top attack vectors targeting SAP, how the attacks access sensitive information and the top 5 things to incorporate into an information security strategy. 


Speakers
avatar for Sage Wagner

Sage Wagner

Technical Sales Engineer, Onapsis


Thursday February 11, 2016 2:15pm - 2:45pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:45pm

For the Love of Money: Electronic Currencies, Cyber Criminals and You
Today, we use money in ways that our ancestors could never have dreamed. 
Evolution has seen us move ever closer to a cashless society. We’ve already seen the 
introduction of alternative currencies; specifically e-electronic currencies. Adoption 
of these alternative currencies has been slow, however, within certain communities, 
their adoption has been vigorous.

Take for example the realm of the cyber criminal.  Within the global cyber criminal ecosystem the adoption of electronic currencies has been common and long-standing. Cyber criminals offer information, intelligence, goods, and services in a variety of forums and sites hosted on the surface and dark web where they almost exclusively ask for payment using an electronic currency of one sort or another.

Speakers
avatar for Will Gragido

Will Gragido

Head of Threat Intelligence, Digital Shadows
Will has more than 21 years of experience in information technology and security. A former United States Marine, Will was first exposed to security and intelligence in the service. He has held technical and research roles at Internet Security Systems / IBM Internet Security Systems... Read More →


Thursday February 11, 2016 2:45pm - 3:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

3:15pm

Insider Threat: Risk Scoring, Machine Learning, and other Strategies
This panel will explore the challenges with "insider" risk detection, measurement and management in secure environments, such as:
  • Insiders are implicitly trusted by traditional security controls
  • Human motivations are unpredictable – businesses can’t assume that their employees are malicious or that they will always comply with internal regulations
  • Innovative technologies can understand subtle changes in people’s behavior without having to tag users or behaviors in advance
 

Speakers
avatar for Curtis Bragdon

Curtis Bragdon

Sales executive, Darktrace
Curtis Bragdon joined Darktrace in 2015 as a Cyber Security Executive. With over 10 years of experience in security, Mr. Bragdon specializes in the technical aspects of security and reliability of safety-critical systems. Mr. Bragdon holds an MBA from Babson and a BA in Computer... Read More →
avatar for Casey Corcoran

Casey Corcoran

VP, Strategy, FourV
Casey is a business and technology leader with over 20 years of experience in IT, and a proven track record in strategic business innovation and development. Casey heads the product and market development strategy at FourV.   Most recently, Casey was the Chief Technology Officer... Read More →
avatar for Adrian Mahieu

Adrian Mahieu

CEO, Cortex Insight
Most people want to know about Cortex Insight - the startup that has grown to something interesting indeed - with Finance, Aerospace, Defence, Media, MSSPs and more and how we formed. It's quite interesting. Goes well with good Coffee. Grab me between talks once I've got the next... Read More →
avatar for Wallace Sann

Wallace Sann

Public Sector CTO | RVP of Systems Engineering, ForeScout Technologies
Wallace Sann joined ForeScout Technologies in 2006 and currently serves as ForeScout’s Public Sector CTO and Regional VP of Systems Engineering.  In this role he provides technical leadership for ForeScout’s Federal programs and Product & Certification roadmap, while also overseeing... Read More →


Thursday February 11, 2016 3:15pm - 4:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

3:45pm

BREAK
Thursday February 11, 2016 3:45pm - 4:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

4:00pm

Disrupt & Destroy: A look at current Ransomware trends and capabilities

Thursday February 11, 2016 4:00pm - 4:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

4:30pm

Reduce the Attack Surface Inside Your Data Center and Cloud

Enterprises need to safeguard high-value applications handling intellectual property, financial data, big-data apps, and other regulated information while also addressing compliance mandates. Traditional security mechanisms using network constructs like VLANs, subnets, and zones with IP-based rules are cumbersome, error-prone, and even impractical in many cases.

During this session we'll discuss how enterprises are using adaptive security to continuously protect high value applications no matter where they reside–data center, public or private cloud.


Speakers
avatar for John Westerman

John Westerman

Engineer, Illumio
John has 30 years in the Networking and Security industry experience designing, building and optimizing enterprise and government networks. John has lived and worked in the DC area for 16 years.



Thursday February 11, 2016 4:30pm - 5:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045
 
Friday, February 12
 

9:00am

Survey of Vulnerabilities in Critical Infrastructure
Speakers
avatar for Remy Baumgarten

Remy Baumgarten

Lead Security Engineer, ANRC
avatar for Tom Kellerman

Tom Kellerman

VP, Cyber Security, Trend Micro
As Vice President of Cyber Security at Trend Micro, Mr. Kellermann is focused on acting as a trusted cybersecurity advisor and strategist within the federal, state and local government markets. He utilizes his experience as a security evangelist and government affairs expert to forge... Read More →
avatar for Scott Montgomery

Scott Montgomery

Vice President, Chief Technical Strategist, Intel Security
Scott A. Montgomery is vice president and chief technical strategist for the Intel Security Group at Intel Corporation. He manages the worldwide team of chief technology officers who lead the group's various business units and is responsible for advancing technical innovation in Intel's... Read More →
avatar for Nathan Swaim

Nathan Swaim

President, ANRC
avatar for Sage Wagner

Sage Wagner

Technical Sales Engineer, Onapsis


Friday February 12, 2016 9:00am - 9:55am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:00am

Legal and Operational Analysis of the Ukraine Power Grid Attack
A panel of experts from the fields of industrial control systems, international law, and information security will discuss the legal and operational implications of the recent malware attack against several Ukrainian energy distribution companies.

Moderators
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of cyber security and cyber warfare in the i... Read More →

Speakers
avatar for Gary Brown

Gary Brown

Professor of Cyber Security, Marine Corps University
Gary Brown is Professor of Cyber Security at Marine Corps University, Quantico, Virginia.  Previously he served as Head of Communications and Congressional Affairs for the Washington Delegation, International Committee of the Red Cross (ICRC); he was with the ICRC from 2012-2015... Read More →
CC

Cameron Camp

Security Researcher, ESET North America
IoT, SCADA, Finserv hacking
avatar for Tom Kellerman

Tom Kellerman

VP, Cyber Security, Trend Micro
As Vice President of Cyber Security at Trend Micro, Mr. Kellermann is focused on acting as a trusted cybersecurity advisor and strategist within the federal, state and local government markets. He utilizes his experience as a security evangelist and government affairs expert to forge... Read More →
avatar for Michael Toecker

Michael Toecker

Michael Toecker is a Professional Engineer (Missouri) specializing in the cyber security of control system systems, particularly those used in power generation. Mr. Toecker has spent 9 years working in electric power and control system security, first at a Big 5 power engineering... Read More →


Friday February 12, 2016 10:00am - 10:45am
National Press Club 529 14th Street Northwest, Washington, DC 20045

10:45am

AIAA Panel: Commercial Aerospace Threat Space (NO PRESS)
This session will review the design philosophy and the cyber security framework developed for aviation.  The panel will explore along with the audience the opportunities to address key issues facing aviation.
  • Establish cyber standards for aviation the ecosystems
  • Ensure a cyber security culture
  • Understand the threat
  • Understand the risk  
  • Communicate the threats
  • Assure situational awareness  
  • Provide incident management
  • Strengthen the defensive system
  • Define design and operational principles
  • Conduct necessary research and development
  • Establish and coordinate aviation cyber security strategies, policies, and plans
 The panel will invite ideas from the audience of methodologies and approaches that may be useful in fulfilling the cybersecurity framework.  

CLOSED TO PRESS. 

Speakers
avatar for Paul Kurtz

Paul Kurtz

CEO, TruSTAR Technology
Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years... Read More →
avatar for Emilian Papadopoulos

Emilian Papadopoulos

President, Good Harbor Security Risk Management
Emilian Papadopoulos is president of Good Harbor Security Risk Management, a cyber risk management advisory firm. Mr. Papadopoulos advises Boards, CEOs, investment professionals, and government leaders on managing cyber risk. He has helped clients across sectors including energy... Read More →



Friday February 12, 2016 10:45am - 11:15am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:15am

BREAK
Friday February 12, 2016 11:15am - 11:30am
National Press Club 529 14th Street Northwest, Washington, DC 20045

11:30am

When a Backdoor Isn’t a Backdoor: Is This Time Different?
Governments are seeking a process for access to encrypted data - particularly on mobile devices and in the cloud - as strong encryption becomes commonplace.  Governments fear “going dark” – with encryption hindering criminal and national security investigations.  Privacy advocates have opposed backdoors as fundamentally insecure and even unnecessary in light of the vast metadata increasingly available.  The U.S. tried to mandate backdoors before, and failed in dramatic fashion.  We provide an update on the current state of affairs, covering the various proposals for working around encryption and counterarguments.  We conclude with proposals to address the lingering question of whether governments can walk away from the question this time and whether there is a solution that enables limited government access to secure communications. 

Speakers
avatar for Jim Denaro

Jim Denaro

Partner, CipherLaw
Jim is a registered patent attorney in the Washington, D.C. area and advises clients on offensive and defensive applications of intellectual property. Jim has particular expertise in information security and cybersecurity technologies, and is a frequent speaker and writer on the subject... Read More →
avatar for Ken Mendelson

Ken Mendelson

Managing Director, Stroz Friedberg
As Managing Director at Stroz Friedberg, LLC, Ken Mendelson manages a docket of digital forensic, electronic discovery, data breach, investigative and security risk assessment assignments.  Mr. Mendelson has supervised several multi-terabyte electronic evidence identification, preservation... Read More →
avatar for Randy Sabett

Randy Sabett

Special Counsel, Cooley LLP
At Cooley, my practice involves providing advice and counseling on cybersecurity matters and related technology issues, including privacy, IT licensing, and intellectual property. I work with companies in developing strategies to protect their information and exploit their IP. I also... Read More →


Friday February 12, 2016 11:30am - 12:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:15pm

How Can U.S. Multinational Companies Do Business Overseas And Still Protect Their Assets?
U.S. multinationals have no choice but to do business and build supply chains overseas. Unfortunately some of their most important markets are also present the most risk in terms of protecting their intellectual property from competitors, criminal organizations and foreign governments. This panel of experts will discuss and debate how U.S. companies can make a profit while not losing their IP.

Speakers
avatar for Jeffrey Carr

Jeffrey Carr

Principal Consultant, The 20K League
Jeffrey Carr is a cybersecurity consultant, the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O’Reilly Media, 2009, 2011), and the founder of the Suits and Spookssecurity event series. He has consulted for Fortune 500 companies and U.S. and foreign government agencies and has spoken at hundreds of conferences around the world since 2009. Mr. Carr is widely published and frequently quoted on matters of cyber security and cyber warfare in the i... Read More →
avatar for Paul Kurtz

Paul Kurtz

CEO, TruSTAR Technology
Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years... Read More →
avatar for Jody Westby

Jody Westby

Adjunct Professor, College of Computer Science, Georgia Institute of Technology
Jody Westby is the CEO of Global Cyber Risk and provide consulting services in the areas of privacy, security, cybercrime, and IT governance. She also serves as Adjunct Professor at Georgia Institute of Technology's School of Computer Science and Distinguished Fellow for Carnegie... Read More →


Friday February 12, 2016 12:15pm - 12:45pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

12:45pm

BREAK
Friday February 12, 2016 12:45pm - 1:00pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:00pm

Applying International Law To Norms in Cyber Warfare
Speakers
avatar for Gary Brown

Gary Brown

Professor of Cyber Security, Marine Corps University
Gary Brown is Professor of Cyber Security at Marine Corps University, Quantico, Virginia.  Previously he served as Head of Communications and Congressional Affairs for the Washington Delegation, International Committee of the Red Cross (ICRC); he was with the ICRC from 2012-2015... Read More →
avatar for Catherine Lotrionte

Catherine Lotrionte

Director, Institute for Law, Science and Global Security, Georgetown University
Professor Catherine Lotrionte is the Director of the Institute for Law, Science and Global Security and Visiting Assistant Professor of Government and Foreign Service at Georgetown University. Professor Lotrionte teaches courses on national security law, U.S. intelligence law, and... Read More →


Friday February 12, 2016 1:00pm - 1:30pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

1:30pm

PANEL: The Evolution of The Daesh (ISIL): Combating Urban Terrorism in 2016 and Beyond
This panel discussion will explore the evolution of terrorism by the Daesh, also known as ISIS, ISIL or IS, against targets around the world including Paris. The panel participants are world-renowned authorities in intelligence, counterinsurgency, and counter-terrorism, and topics for discussion will include adversary strategy, tactics, and countermeasures as well as how Western governments should respond to protect their populations.

Speakers
avatar for Mark Kelton

Mark Kelton

Mark Kelton served as a senior Central Intelligence Agency executive with 34 years of experience in intelligence operations. His career culminated as Deputy Director of the National Clandestine Service for Counterintelligence (DDNCS/CI), one of the most senior ranking positions in... Read More →
DK

David Kilcullen

Dr David Kilcullen is the founding CEO and president of Caerus Associates, a firm that specializes in designing for humanitarian impact in conflict-affected and complex environments. Dr. Killcullen has substantial experience in designing, implementing and evaluating rural and peri-urban... Read More →


Friday February 12, 2016 1:30pm - 2:15pm
National Press Club 529 14th Street Northwest, Washington, DC 20045

2:15pm

NETWORKING
Friday February 12, 2016 2:15pm - 2:45pm
TBA