2014 Government Cyber-Security Forum Agenda
2015 Government Cybersecurity Forum Agenda
Cybersecurity has become more than just a risk with a heightened focus on data privacy rather than just a technology issue. The agenda is packed with privacy advocates, technologists, and policymakers across stakeholder groups working through the complex issues between the need for security, privacy and anonymity in the current era of data breaches and cyber threats.
Tuesday, October 20, 2015
|8:00 AM||Breakfast and Registration|
|8:30 AM||Welcome and Opening Remarks||Phillip Bond President & CEO, Bond & Associates|
||Opening Keynote: Anonymity, Privacy, Technology, Security: Identifying Concerns and Impacts||
Lieutenant General Michael Flynn (Ret) Former Director of the Defense Intelligence Agency
|10:00 AM||Panel Discussion: The Stumbling Blocks to Removing Anonymity||
Robert Burton Partner Venable LLP
Dr. Thomas Cellucci Former Chief Commercialization Officer at the U.S. Department of Homeland Security and the White House
John Scott President, Selection Pressure, LLC
Dr. Beverly Magda Associate Dean Georgetown University
Peter Van Valkenburgh Director of Research Coin Center
Mike Lennon SecurityWeek Editor
|11:00 AM||Networking Break|
|11:15 AM||Morning Keynote: Anonymity, Privacy, Technology, Security: Aligning Top Level Requirements||Adam Firestone President & General Manager, KGSS, Inc.|
|12:15 PM||Lunch: Fireside Chat||
Joseph Lorenzo Hall Chief Technologist and Director of the Internet Architecture project at the Center for Democracy & Technology
Daniel Ford, D. Sc. Chief Security Officer Silent Circle
Henry J. Sienkiewicz Cyberseucrity Author and Former Senior Executive Service Assigned to the Defense Information Systems Agency
Camille Tuutti Executive Editor Nextgov
|2:00 PM||Congressional Discussion||Congressman Michael T. McCaul Chairman of the House Committee on Homeland Security|
|2:45 PM||Networking Break|
|3:00 PM||Panel: The Technical Road Ahead: Ones and Zeroes to Meaningful Privacy and Security||
Jim Jones Associate Professor Computer Forensics George Mason University
Jennifer Chemel Privacy Associate at Booz Allen Hamilton
Richard Marshall Former Director of Global Cybersecurity Management U.S. Department of Homeland Security
Chuck Brooks First Director of Legislative Affairs for the Science & Technology Directorate at the Department of Homeland Security
César Andrés López Co-founder of Numerous Technology Companies
Dan Verton Cybersecurity Author and Veteran Technology Journalist
Paul Syverson Inventor of Onion Routing & Mathematician, Center for High Assurance Computer Systems of the Naval Research Laboratory
|4:00 PM||Closing Keynote: Cloaking Devices, CyberPersonas and Neutral Zones||
Chris Haddad Chief Architect and digital transformation expert
|5:00 PM||Closing Remarks||
Phillip Bond President & CEO, Bond & Associates
Lieutenant General Michael Flynn
As technology becomes more advanced and nuanced, the focus has become security: safeguarding the information that flows through our smart phones, tablets, computers and their associated software and systems. Security, however, is often stymied where it apparently conflicts with privacy.
The problem is that security is not at odds with privacy. The popular misperception of a conflict arises from the conflation of anonymity and privacy, or “privanymity.” The two words are similar in that they both relate to the control of personal activities and information. Whereas privacy hides information, anonymity hides the person. Understanding the difference in these terms is essential to implementing effective cybersecurity measures that are consistent with our values, our laws and the Constitution.
This session will introduce participants to the risks that we face and will provide a framework through which we can examine how anonymity breeds both uncivil behavior and insecurity whereas privacy is essential to our civil society, our liberties and our prosperity. General Flynn will engage the audience and challenge them to participate fully in identifying not only the security and privacy concerns facing a world that is built on technology, but the impact that each critical decision will have on its security.
The Internet’s architecture is an anonymity enabler: Cloaked behind a screen name, the user is free to become whatever he wants to be and do whatever she wants to do — including stalking, crime and terrorism. It is possible to close this identity gap and still defend privacy rights, but it may not be easy or inexpensive. Digital fingerprints can be built into communications sent across the Internet; modern protocols such as IPv6 and IPsec support such mechanisms while protecting essential privacy rights.
This session discusses social issues resulting from the Internet’s identity gap, identifies currently available technical solutions and posits a way ahead that satisfies legislative, political, privacy and civil liberties requirements.
When every endpoint is under constant attack, and all traffic is being parsed and analyzed, how can we safeguard confidential
information, freely interact, and express our digital persona without concern? Chris will describe why privacy must not be breached; why
anonymity can engender hostility, and what mindset is leading us into cyberwar zones instead of cybertrade neutral zones.
The Fireside Chat is the highlight of a one-day conference focused on exploring the nexus between privacy, anonymity, technology and security. Over lunch, 400 attendees will experience a moderated conversation between stakeholders from all sides of the privacy debate. You will hear from a platform provider offering privacy in an environment of widespread data surveillance and collection, a former member of the Senior Executive Service and a technologist dedicated to ensuring the Internet remains open, innovative and free. The discussion will explore the following ideas:
- Can adequate security be achieved while also protecting individual privacy rights?
- Is the conflict between privacy and security real at all, or has technology rendered it moot?
- Is there a difference between privacy and anonymity on the Net?
- Does industry have any obligation to work with government to ensure security, and does government have any obligation to work with industry to ensure privacy?
Listen to the Congressman talk about the competing interests of privacy and security as he provides examples of how proposed legislation can address both these issues. The Congressman will discuss how to defend critical infrastructure from cyber attacks while also addressing concerns over privacy and civil liberties. While it is said that the government should have appropriate tools to investigate cyber attacks and crimes, recent domestic surveillance revelations show that law enforcement may not need more legal authorities to conduct more digital surveillance. Recent hacks also expose a lack of uniform practices for notification and response. This conversation will explore the reforms taking place that both increase transparency and enhance privacy protections while maintaining national security.
There are many perspectives with respect to the roles played in cyberspace by anonymity, privacy, technology and security. This panel represents all of these viewpoints, including privacy advocates, government regulators, academics and technologists.
Each panelist will draw on years of expertise and experience to assess the current threat landscape and articulate a mitigations plan the risks identified consistent with their perspective. These ideas will be collated and combined to offer a way ahead that satisfies the needs of all stakeholder communities in from all parts of the privacy-anonymity continuum.
It's time for data scientists and security technologists to put their minds to work. We have many ways to defeat cyber threats. What we lack are methodologies that satisfy technical, social, policy and moral requirements. Are there really tools that are simple to use and satisfy the complex patchwork of requirements? This expert panel strives to answer these questions and lay out a road ahead for the collaboration of the technical and policy communities. Without a joint effort between the two, we cannot achieve either effective security or meaningful privacy.