Georgia Tech Cyber Security Symposium. March 28 & 29, Georgia Tech Global Learning Center

Size: px
Start display at page:

Download "Georgia Tech Cyber Security Symposium. March 28 & 29, 2013. Georgia Tech Global Learning Center"

Transcription

1 Georgia Tech Cyber Security Symposium March 28 & 29, 2013 Georgia Tech Global Learning Center

2 [ Agenda ] [ Agenda ] Thursday March 28, 2013 NAE Regional Meeting and Cyber Security Symposium Thursday March 28, 2013 NAE Regional Meeting and Cyber Security Symposium Georgia Tech Hotel and Conference Center, Conference Room 2 Global Learning Center, Room :00 12:45 p.m. Global Learning Center, Room :00 1:00 p.m. 1:00-1:15 p.m. 1:15-2:15 p.m. NAE Regional Business Meeting and Luncheon Closed Session, NAE Members Only Registration Welcome G.P. Bud Peterson President, Georgia Institute of Technology Rafael L. Bras Provost and Executive Vice President of Academic Affairs, Georgia Institute of Technology Maxine L. Savitz Vice President, National Academy of Engineering Keynote Address U.S. Cyber Security: Key Issues for Our Future General Keith B. Alexander, Commander, U.S. Cyber Command (USCYBERCOM), Director of the National Security Agency and Chief of the Central Security Service (NSA/CSS) 3:05-3:35 p.m. 3:35-4:05 p.m. 4:05-5:00 p.m. Coffee Break Session II Cyber Security: Entrepreneurs Meeting Market Needs David Dewey, Bluebox Saving the World from Information Thievery David Moeller, CodeGuard Securing the Internet, One Website at a Time Adam Ghetti, Social Fortress Perimeterless Data Security: Securing Outside the Box Session III The Washington Debate on Cyber Security; A Bi-Partisan Insider s View Stewart Baker, Partner, Steptoe & Johnson, LLP Peter Swire, C. William O Neill Professor in Law and Judicial Administration, Moritz College of Law, The Ohio State University Moderator: Annie Antón, Professor & Chair, School of Interactive Computing, Georgia Institute of Technology 2:15-3:05 p.m. Session I Cyber Security: Research and Entrepreneurship Mustaque Ahamad, Pindrop Securing the Converged Telephony Infrastructure Nick Feamster, BISmark Bringing Reliability to the Last Mile with Programmable Network Infrastructure Wenke Lee, Damballa Internet-Scale Security Monitoring of Cyber Attack Command-and- Control Infrastructures Andrew Howard, GTRI Automated and Correlated Malware Analysis for the Community Steve McLaughlin, Whisper Communications Security of Mobile Payments Global Learning Center, Atrium 5:00-6:00 p.m. Reception 1 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28-29,

3 [ Agenda ] [ Welcome ] Friday March 29, 2013 CIO Cyber Security Conference Global Learning Center, Room 236 8:30 9:30 a.m. 9:00 10:00 a.m. 9:40 9:45 a.m. Registration & Morning Refreshments Session IV Strategies for Creating Community and Information Sharing between Public Sector, Private Sector, and Law Enforcement Moderator: Chris Smoak Session V Legal Issues in Technology: Bring Your Own Device (BYOD); Privacy vs. Security; and Issues Where Law Lags Technology G.P. Bud Peterson President, Georgia Institute of Technology G.P. Bud Peterson is the 11th president of the Georgia Institute of Technology. In this capacity he oversees a top-10 public research university with more than 21,000 students and more than $600 million in sponsored funding. Throughout his career, Peterson has played an active role in helping to establish the national education and research agendas, serving on numerous industry, government and academic task forces and committees. A distinguished scientist, Peterson was selected in 2008 by President George W. Bush to serve on the National Science Board through The Board oversees the National Science Foundation (NSF) and advises the president and Congress on national policy related to science and engineering research and education. Peterson earned undergraduate degrees in mechanical engineering and mathematics as well as a master s degree in engineering from Kansas State University. He earned his doctoral degree in mechanical engineering at Texas A&M University. 11:00 11:45 a.m. Moderator: FBI Legal Counsel Session VI Open Discussion Rafael L. Bras Provost and Executive Vice President of Academic Affairs, Georgia Institute of Technology Georgia Tech Hotel and Conference Center, Conference Room A 12:00-4:00 p.m. Cyber Security Conference & Luncheon Closed Session, CIOs Only Discussion 1: Cloud Security - Challenges/Risks of Cloud-Based Services and the Best Practices for Mitigating Those Risks Discussion 2: Technology Issues in Providing Services While Maintaining Privacy and Security Issues Discussion 3: Security in the Shifting Academic Paradigm Discussion 4: Summary and Recommendations Rafael L. Bras is the provost and executive vice president for academic affairs at the Georgia Institute of Technology. He is a professor in the School of Civil and Environmental Engineering and School of Earth and Atmospheric Sciences. He holds the K. Harrison Brown Family Chair. Prior to becoming provost, Bras was distinguished professor and dean of the Henry Samueli School of Engineering at the University of California, Irvine (UCI). Prior to joining UCI, he was a professor in the departments of Civil and Environmental Engineering and Earth, Atmospheric and Planetary Sciences at Massachusetts Institute of Technology for 32 years. Bras is the former president of the hydrology section of American Geophysical Union (AGU) and is presently a member of its board of directors. He also serves on the board of directors of the Foundation for Puerto Rico and is a member of the board of trustees for the University Corporation for Atmospheric Research (UCAR). Bras is an elected member of the U.S. National Academy of Engineering, the Academy of Arts and Sciences of Puerto Rico, and is a corresponding member of the Mexican National Academy of Engineering and the Mexican National Academy of Sciences. He also is an elected fellow of the American Society of Civil Engineers, the American Meteorological Society, and the American Association for the Advancement of Science. Bras has published two textbooks, 200 refereed journal publications, and several hundred other publications and presentations. 3 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28-29,

4 [ Welcome ] [ Keynote Speaker ] Maxine L. Savitz Vice President, National Academy of Engineering Maxine Savitz is the former general manager of Technology Partnerships at Honeywell, Inc. and has more than 35 years of experience managing research, development, and implementation programs for the public and private sectors, including the aerospace, transportation and industrial sectors. From , she served as deputy assistant secretary for conservation in the U.S. Department of Energy. She currently serves as vice president of the National Academy of Engineering. Savitz serves on advisory bodies for the Sandia National Laboratory and Pacific Northwest National Laboratory, and is a member of the board of directors of the American Council for an Energy-Efficient Economy. She served on the National Academy s committee on America s Energy Future and was vice chair of the Energy Efficienc y committee. She is a member of the president s Council of Advisors for Science and Technology. Savitz received her bachelor s degree in chemistry from Bryn Mawr College and her doctorate in chemistry from the Massachusetts Institute of Technology. Dean Zvi Galil John P. Imlay Dean of Computing, Georgia Institute of Technology Zvi Galil has served as the John P. Imlay Dean of Computing in the College of Computing at Georgia Tech since He earned his bachelor s and master s degrees in applied mathematics from Tel Aviv University, and his doctorate in computer science from Cornell University. After a post-doctorate in IBM s Thomas J. Watson Research Center, he returned to Israel and joined the faculty of Tel Aviv University, where he served as the chair of the Computer Science department from In 1982, he joined the faculty of Columbia University and served as the chair of the Computer Science department from , and as dean of The Fu Foundation School of Engineering & Applied Science from From , Galil served as president of Tel Aviv University. Galil s research areas include the design and analysis of algorithms, complexity, cryptography and experimental design. From he served as chairman of ACM SIGACT, the Special Interest Group of Algorithms and Computation Theory. He has written more than 200 scientific papers, edited five books and has given more than 150 lectures in 20 countries. Galil has served as editor in chief of two journals and as the chief computer science adviser to the Oxford University Press in the United States. He is a fellow of the Association for Computing Machinery and the American Academy of Arts and Sciences and a member of the National Academy of Engineering. In 2009, the Columbia Society of Graduates awarded him the Great Teacher Award. General Keith B. Alexander Director of the National Security Agency (NSA), Chief of the Central Security Service (CSS) and Commander of the U.S. Cyber Command General Keith B. Alexander is the commander, U.S. Cyber Command (US- CYBERCOM), director of the National Security Agency and chief of the Central Security Service (NSA/CSS), Fort George G. Meade, MD. As Commander, USCYBERCOM, he is responsible for planning, coordinating and conducting operations and defense of DoD computer networks as directed by USSTRATCOM. As the director of NSA and chief of CSS, he is responsible for a Department of Defense agency with national foreign intelligence, combat support, and U.S. national security information system protection responsibilities. NSA/CSS civilian and military personnel are stationed worldwide. He was born in Syracuse, New York, and entered active duty at the U.S. Military Academy at West Point. Previous assignments include the deputy chief of staff (DCS, G-2), Headquarters, Department of the Army, Washington, DC; commanding general of the U.S. Army Intelligence and Security Command at Fort Belvoir, VA; director of intelligence, United States Central Command, MacDill Air Force Base, FL; and Deputy Director for Requirements, Capabilities, Assessments and Doctrine, J-2, for the Joint Chiefs of Staff. Alexander has served in a variety of command assignments in Germany and the United States. These include tours as Commander of Border Field Office, 511th MI Battalion, 66th MI Group; 336th Army Security Agency Company, 525th MI Group; 204th MI Battalion; and 525th MI Brigade. Additionally, Alexander has held key staff assignments as deputy director and operations officer, Army Intelligence Master Plan, for the Deputy Chief of Staff for Intelligence; S-3 and executive officer, 522nd MI Battalion, 2nd Armored Division; G-2 for the 1st Armored Division both in Germany and for Operation Desert Shield/Desert Storm in Saudi Arabia. Alexander holds a bachelor s degree from the U.S. Military Academy and a master s degree in business administration from Boston University. Additionally, he holds a master s degree in systems technology (Electronic Warfare) and a master s degree in physics from the Naval Postgraduate School. He also holds a master s degree in national security strategy from the National Defense University. His military education includes the Armor Officer Basic Course, the Military Intelligence Officer Advanced Course, the U.S. Army Command and General Staff College, and the National War College. 5 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28 & 29,

5 [ About the Speakers ] [ About the Speakers ] Mustaque Ahamad Professor, College of Computing, Georgia Institute of Technology Chief Scientist & Co-Founder, Pindrop Security Mustaque Ahamad is a professor in the School of Computer Science at Georgia Tech. He also serves as chief scientist of Pindrop Security, which he co-founded in He served as director of the Georgia Tech Information Security Center (GTISC) from As director of GTISC, Ahamad helped develop several major research thrusts in areas that included security of emerging converged communication networks and applications, identity and access management, and security of healthcare information technology. In his 27 years at Georgia Tech, Ahamad has led numerous research projects and educational initiatives. His research interests include distributed systems and middleware, computer security, and dependable systems, and he has published more than 100 research papers in these areas. Ahamad led the effort to create a broad and comprehensive information security curriculum and a graduate degree program in this area at Georgia Tech. Ahamad received his doctorate in computer science from the State University of New York at Stony Brook in He received his undergraduate degree in electrical and electronics engineering from the Birla Institute of Technology and Science, Pilani, India. Annie Antón Professor & Chair, School of Interactive Computing, Georgia Institute of Technology Annie Antón is professor and chair of the School of Interactive Computing at Georgia Tech. Previously she served as a professor in the Computer Science department of the College of Engineering at North Carolina State University (NCSU), where she was director of the CSC Policy and Compliance Initiative and a member of the NCSU Cyber Defense Lab. In 2010, she chaired the N.C. State University Reappointment, Promotion, and Tenure Committee. In 2008, she chaired the N.C. State Public Policy Task Force. Antón is the founder and director of ThePrivacyPlace.org, a research group of students and faculty at NCSU and Purdue University. Her professional activities include a notable combination of multidisciplinary research and education. She is co-founder of the Symposium on Requirements Engineering for Information Security (SREIS) and the annual Requirements Engineering and the Law Workshop (RELAW). In 2002, she coordinated NCSU s successful application for a National Security Agency Center of Academic Excellence in Information Assurance Education, involving the participation of faculty in three colleges. She is a former associate editor for IEEE Transactions on Software Engineering, former cognitive issues subject area editor for the Requirements Engineering Journal and is currently a member of the International Board of Referees for Computers & Security. Stewart Baker Partner, Steptoe & Johnson, LLP Stewart A. Baker is a partner in the Washington office of Steptoe & Johnson, LLP. He returned to the firm after serving as the first assistant secretary for policy for the Department of Homeland Security for three and a half years, during which he created and staffed the 250-person DHS Policy Directorate. He was responsible for policy analysis across the department, as well as for the department s international affairs, strategic planning and relationships with law enforcement and public advisory committees. This work required a broad understanding of all aspects of the department s activities, including maritime regulation, customs enforcement, immigration, identity management, SAFETY Act implementation, money laundering enforcement, government contracts, and regulation of travel and air transportation, and its role in the Committee on Foreign Investment in the United States (CFIUS). While at DHS, Baker led successful negotiations with European and Middle Eastern governments over travel data, privacy, and visa waiver and related issues. He devised a new approach to visa-free travel, forged a congressional and inter-agency consensus on the plan, and negotiated acceptance with key governments. He also managed the passage and implementation of the SAFE Ports Act, led the Department s policy effort to reform federal immigration laws, and transformed the department s role in CFIUS, helping to drive the first rewrite of CFIUS law and regulations in a generation. David Dewey Vice President of Engineering, Bluebox David Dewey serves as the vice president of Engineering for Bluebox. Prior to this role, the majority of his career was spent at Internet Security Systems (acquired by IBM in 2005) where he worked as a vulnerability researcher on the renowned X-Force Advanced Research Team - discovering, investigating, and exploiting vulnerabilities in enterprise-class software. Dewey was promoted to manage the research team, and later served as the senior manager of Technical Strategy for the ISS division of IBM. Prior to BlueBox, Dewey worked at Fortify Software (acquired by HP in 2010), as the product architect for the Source Code Analyzer static analysis product line. Dewey earned a bachelor s degree in electrical engineering from the Virginia Military Institute, and is currently pursuing a doctorate in computer science at Georgia Tech. 7 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28 & 29,

6 [ About the Speakers ] [ About the Speakers ] Nick Feamster Associate Professor, College of Computing, Georgia Institute of Technology; Co-Founder, BISmark Nick Feamster is an associate professor in the College of Computing at Georgia Tech. He received his doctorate in computer science from Massachusetts Institute of Technology in 2005, and his bachelor s and master s degrees in electrical engineering and computer science from MIT in 2000 and 2001, respectively. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network operations and security, and anonymous communication systems. In December 2008, Feamster received the Presidential Early Career Award for Scientists and Engineers (PECASE) for his contributions to cybersecurity, notably spam filtering. His honors include the Technology Review 35 Top Young Innovators Under 35 award, a Sloan Research Fellowship, the NSF CAREER award, the IBM Faculty Fellowship, and award papers at SIGCOMM 2006, the NSDI 2005 conference, Usenix Security 2002, and Usenix Security Adam Ghetti Director & Co-Founder, Social Fortress As founder and CTO, Adam Ghetti leads the technology and product direction of Social Fortress. He is a lifelong entrepreneur, building internet-connected technology businesses, who has extensive experience in automation, systems engineering, development, and information security. Andrew Howard Research Scientist, Georgia Tech Research Institute Andrew Howard is a research scientist at the Georgia Tech Research Institute focused on keeping organizations out of the news. Howard assists organizations, ensuring that their networks are safe, their data is secure, and their employees understand the threat. A computer scientist by training, Howard leads research teams focused on building new secure solutions and evaluating the security of corporations across the United States. By mimicking advanced persistent threats, Howard is able to help organizations identify where they are the weakest. Howard currently serves as a division chief at GTRI focused on emerging threats and countermeasures. Howard received his bachelor s in computer science and master s in information security from Georgia Tech. In addition to conducting research at Georgia Tech, Howard was previously employed by PricewaterhouseCoopers, LLP in the Threat and Vulnerability Advisory practice. Howard holds the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) certifications. Wenke Lee Professor of Computer Science, Georgia Institute of Technology & Director of the Georgia Tech Information Security Center (GTISC) Co-Founder, Damballa Wenke Lee is a professor of computer science in the College of Computing at Georgia Tech. He also serves as the director of the Georgia Tech Information Security Center (GTISC). He received his doctorate in computer science from Columbia University in Lee works in systems and network security. His current research projects are in the areas of botnet detection and attribution, malware analysis, virtual machine monitoring, mobile phone security, and detection and mitigation of information manipulation on the Internet, with funding from NSF, DHS, DoD, and the industry. Lee has published more than 100 articles, 40 of which have been cited more than 100 times. In 2006, Lee co-founded Damballa, Inc., a spinoff from his lab that focuses on botnet detection and mitigation. Steve McLaughlin Steve W. Chaddick Chair, School of Electrical and Computer Engineering, Georgia Institute of Technology; Co-founder, Whisper Communications Steven W. McLaughlin received his bachelor s degree from Northwestern University, his master s degree from Princeton University, and his doctorate degree from the University of Michigan. He joined the School of Electrical and Computer Engineering at Georgia Tech in September 1996 where he now serves as the Steve W. Chaddick School Chair for the School of Electrical and Computer Engineering. He is also a co-founder of Whisper Communications, a physical-layer security company established in 2009 to commercialize technologies developed in his research group. From , he was deputy director of Georgia Tech - Lorraine in Metz, France. He was a Ken Byers Professor from and president of the IEEE Information Theory Society in He has published more than 240 papers in journals and for conferences and holds 30 U.S. patents. He has served as the research and thesis advisor to more than 50 students at the bachelor s, master s, doctoral, and post-doctoral levels. In 2011, he was awarded the honor Chevalier dans l`ordre Nationale de Merite (Knight of the French National Order of Merit), the second highest civilian award given by the Republic of France. He was the first Georgia Tech recipient of the Presidential Early Career Award for Scientists and Engineers (PECASE), where he was cited by President Clinton for leadership in the development of high-capacity, nonbinary optical recording formats. He also received the National Science Foundation CAREER award and the Information Storage Industries Consortium Technical Achievement Award (with Dr. David Warland at UC-Davis) for this work. 9 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28 & 29,

7 [ About the Speakers ] [ About the Speakers ] David Moeller Chief Executive Officer & Co-Founder, CodeGuard CodeGuard is led by CEO and co-founder David Moeller, a seasoned manager and entrepreneur with two successful exits in the past five years. After being featured on ABC s American Inventor, Moeller co-founded a company and licensed technology to Whirlpool. With a passion for education, he built and grew a startup SAT/ACT test preparation business to several hundred employees before leading it to an acquisition. He was formally trained on General Electric s Technical Sales Leadership Program, and held sourcing and operations positions with GE in the U.S. and China before beginning his entrepreneurial career. Moeller has a bachelor s in mechanical engineering, highest honors, from Georgia Tech, and a master s from Harvard Business School. Chris Smoak Research Scientist & Branch Head, Cyber Technology and Information Security Laboratory, Georgia Tech Research Institute Christopher Smoak is a research scientist and branch head in the Cyber Technology and Information Security Laboratory at the Georgia Tech Research Institute. He has more than ten years of security-related experience ranging from building defensible systems to advanced malware and exploitation research. Smoak directs research efforts geared toward automated, dynamic malware analysis to help detect and mitigate compromises. Within this realm, he has worked to facilitate and empower organizations to derive and share threat intelligence. He earned a bachelor s in computer science and a master s in information security from Georgia Tech. He holds a CISSP certification. Smoak has been consulted as a subject matter expert in information security for both televised and print media in the U.S. and Europe. James (Jim) O Connor Executive Director and Deputy Chief Information Officer, Georgia Institute of Technology As the vice president for information technology and chief information officer at Georgia Tech, Jim O Connor leads 230 professionals in the office of information technology (OIT) and collaborates with campus units on information technology strategies. He brings more than 35 years of information technology experience in higher education and in federal government environments to this role. Previously, O Connor served as director of the enterprise information systems, operation and engineering, and director of customer support. O Connor joined Georgia Tech in 1994 as a member of OIT s newly formed planning and program office. In 2002, O Connor became the executive director and deputy chief information officer. While continuing to lead the System 2000 project, he also assumed responsibility for leading the operations and engineering directorate. In this role, he provided strategic direction in the modernization of Georgia Tech s central computing infrastructure including , electronic storage, and administrative systems. Prior to joining Georgia Tech, O Connor served as an Air Force officer for almost 20 years in various assignments, including chief of plans and programs at the Air Force Institute of Technology. Peter Swire C. William O Neill Professor of Law at the Moritz College of Law of the Ohio State University Currently, Peter Swire is a visiting professor at the Scheller College of Business at Georgia Tech. He is the C. William O Neill Professor of Law at the Moritz College of Law of Ohio State University. He is a senior fellow with the Future of Privacy Forum and the Center for American Progress, and policy fellow with the Center for Democracy and Technology. In 2012, Swire was named to co-chair the Do Not Track standards process of the World Wide Web Consortium. From Swire was special assistant to the president for Economic Policy, serving in the National Economic Council under Lawrence Summers. From , Swire served as the Clinton Administration s chief counselor for privacy in the U.S. Office of Management and Budget, the only person to date to have government-wide responsibility for privacy issues. In both of these positions, he worked on cybersecurity issues as well as privacy issues. He also was the first law professor to teach a semester course on the Law of Cybersecurity. In 2012, the International Association of Privacy Professionals published his two new books for the Certified Information Privacy Professional program, co-authored with Kenesa Ahmad: Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws, and Practices, and U.S. Private Sector Privacy: Law and Practice for Information Privacy Professionals. Many of his writings appear at Please visit for additional information on symposium speakers. 11 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28 & 29,

8 [ About the Sponsors ] [ About the Georgia Tech Organizations ] National Academy of Engineering Founded in 1964, the National Academy of Engineering (NAE) is a private, independent, nonprofit institution that provides engineering leadership in service to the nation. The mission of the NAE is to advance the well-being of the nation by promoting a vibrant engineering profession and by marshalling the expertise and insights of eminent engineers to provide independent advice to the federal government on matters involving engineering and technology. The NAE has more than 2,000 peer-elected members, and foreign associates, and senior professionals in business, academia, and government who are among the world s most accomplished engineers. They provide the leadership and expertise for numerous projects focused on the relationships between engineering, technology and the quality of life. The NAE is a member of the National Academies, which includes the NAE, the National Academy of Sciences (NAS), the Institute of Medicine (IOM), and the National Research Council (NRC) which serves as the principal operating arm of the academies. The NAE operates under the same congressional act of incorporation that established the National Academy of Sciences, signed in 1863 by President Lincoln. Under this charter, the NAE is directed whenever called upon by any department or agency of the government, to investigate, examine, experiment, and report upon any subject of science or art. Engineering program activities of the National Academies cut across the many operational units of the four organizations constituting the Academies, although most projects are executed by units of the NRC. The NAE s independent assets and operating funds are held in the National Academy of Engineering Fund (NAEF), a tax-exempt corporation under section 501 (c) (3) of the Internal Revenue Code. It was created to support the mission and goals of the NAE and its tax identification number is In addition to offices in Washington, DC, the Academy maintains meeting facilities in Irvine, California, and Woods Hole, Massachusetts. Federal Bureau of Investigation As an intelligence-driven and a threat-focused national security organization with both intelligence and law enforcement responsibilities, the mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners. The FBI leads the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud. Computer intrusion cases counterterrorism, counterintelligence, and criminal are the paramount priorities of the FBI s cyber program because of their potential relationship to national security. To stay in front of current and emerging trends, the FBI gathers and shares information and intelligence with public and private sector partners worldwide. Georgia Tech Flashpoint Flashpoint creates better startups, faster. Our output is startups with true market and product fit. Flashpoint is the opposite of an incubator; I nstead of shielding startups from risk so they can create products, we expose them to customers and partners and help them shape themselves into companies with a valid business model. We teach startup engineering; we get startups moving incredibly fast and we teach founders the process. For additional information on Flashpoint, please visit GTISC The Georgia Tech Information Security Center (GTISC) has close to 20 faculty members from several schools, including computer science and electrical and computer engineering. It also has educational programs that enroll more than 100 graduate students. GTISC faculty conduct fundamental and forward-looking research and are leaders in several key areas such as malware analysis and botnet detection, attack attribution and traceback, mobile and VoIP security, searchable encryption and latticebased encryption. GTISC researchers believe in making real impacts with their research. In addition to government-funded projects, GTISC researchers also work very closely with the industry and have started several successful companies in recent years. GTISC also engages with the broader community. The annual security summit is attended by hundreds of government and industry representatives, and the annual emerging threats report is widely circulated and referenced. GTRI Over the past 15 years, information security has rapidly become one of the most critical areas of concern for government, industry, and individuals alike. Of primary concern is malicious software (malware), intended to burrow deep into the infrastructure of organizations, giving attackers access to highly sensitive data and costing billions of dollars in damage. Couple this ability with the immense increases in malware volume over the past five years, and organizations are struggling to protect their enterprises. The informal exchange of identified malware information among trusted parties is a critical piece of many organization information security programs today; however, these informal alliances rely heavily on preexisting relationships and often move slowly. The Georgia Tech Research Institute (GTRI) has established a partnership with Fortune 500 organizations, government and academia to anonymously analyze and share malicious software threats. The project focuses on the rapid exchange of information, selective anonymity of participants, and strong analytical and visualization methods to effectively identify and convey subtle relationships across threats. With more than 50 partners today and 45,000,000 unique samples of malicious software, GTRI s shared intelligence platform allows for the deployment of proactive defensive measures based on actionable intelligence from the community. 13 GEORGIA TECH CYBER SECURITY SYMPOSIUM MARCH 28 & 29,

9

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: elewis@etgl.com

EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: elewis@etgl.com 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: elewis@etgl.com PROFESSIONAL EXPERIENCE 2001 - Present Member, Board of Directors, National Veterans Business

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

David J. Berteau Senior Vice President and Director of International Security Program, Center for Strategic & International Studies

David J. Berteau Senior Vice President and Director of International Security Program, Center for Strategic & International Studies David J. Berteau Senior Vice President and Director of International Security Program, Center for Strategic & International Studies David J. Berteau is senior vice president and director of the CSIS International

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

2014 Montana Government IT Conference. Securing Data Networks and People

2014 Montana Government IT Conference. Securing Data Networks and People Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE 2014. Crystal Gateway Marriott Arlington, Virginia

AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE 2014. Crystal Gateway Marriott Arlington, Virginia AUSA HOT TOPICS Army Networks and Cyber Security in Force 2025 12 JUNE 2014 Crystal Gateway Marriott Arlington, Virginia FINAL AGENDA The Association of the Institute of Land Warfare Hot Topic A Professional

More information

Curriculum Vitae. March 2012

Curriculum Vitae. March 2012 March 2012 Curriculum Vitae Lisa S. Nelson Graduate School of Public and International Affairs University of Pittsburgh 3E25 Wesley Posvar Hall Pittsburgh, Pennsylvania 15260 (412) 648-7601 (office) lsnelson@pitt.edu

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

Computer and Network Security in Higher Education

Computer and Network Security in Higher Education The Authors Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass, A Wiley Company.

More information

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

Technology Everywhere A Campus Agenda for Educating and Managing Workers in the Digital Age

Technology Everywhere A Campus Agenda for Educating and Managing Workers in the Digital Age The Authors Technology Everywhere A Campus Agenda for Educating and Managing Workers in the Digital Age Brian L. Hawkins, Julia A. Rudy, and William H. Wallace, Jr., Editors A Publication of EDUCAUSE Copyright

More information

Saturday Plenary Session

Saturday Plenary Session Saturday Plenary Session May 9, 2015, 2:00 PM 3:30 PM; Venue: Columbia 5-8 Aleda Roth, College of Business and Behavioral Science, Clemson University Vinod Singhal, Associate Dean, Scheller College of

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

22 ND ANNUAL REVIEW OF THE FIELD

22 ND ANNUAL REVIEW OF THE FIELD 22 ND ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CO-SPONSORED BY THE AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY LAW, UNIVERSITY OF VIRGINIA

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

TESTIMONY OF STEVE COOPER DEPARTMENT OF COMMERCE CHIEF INFORMATION OFFICER BEFORE THE SUBCOMMITTEES ON

TESTIMONY OF STEVE COOPER DEPARTMENT OF COMMERCE CHIEF INFORMATION OFFICER BEFORE THE SUBCOMMITTEES ON TESTIMONY OF STEVE COOPER DEPARTMENT OF COMMERCE CHIEF INFORMATION OFFICER BEFORE THE SUBCOMMITTEES ON INFORMATION TECHNOLOGY AND ON GOVERNMENT OPERATIONS OF THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO.: AAC 12-26 COMMITTEE DATE: February 28, 2012 BOARD DATE: March 6, 2012 APPLICATION OF ENDICOTT COLLEGE TO

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce

Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government

More information

Speaker Biographies. Formal chairman, National Defense Reform Commission

Speaker Biographies. Formal chairman, National Defense Reform Commission Speaker Biographies Kim, Jae Chang Formal chairman, National Defense Reform Commission General (ret.) Kim Jae Chang was born in Andong, Korea on 5 March 1940. He graduated from the Korean Military Academy

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free)

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free) JOINT SERVICE SCHOOLS Defense Acquisition University 2001 North Beauregard Street, Alexandria, VA 22311 1772 Phone, 703 845 6772 THOMAS M. CREAN The Defense Acquisition University (DAU), established pursuant

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

15. 1981 was a founding member of the Robotics International Society and chairman of the research group.

15. 1981 was a founding member of the Robotics International Society and chairman of the research group. 1. Appointed in June of 2003 as the Senior Fellow for Creative Programs in the P.C. Rosin College of Engineering. Responsibilities include facilitating the creation of new academic programs such as a minor

More information

WILLIAM BULLOCK. 143 Art&Design Building, 408 E. Peabody Dr., Champaign, IL 61820; wbullock@illinois.edu 217-265-0873

WILLIAM BULLOCK. 143 Art&Design Building, 408 E. Peabody Dr., Champaign, IL 61820; wbullock@illinois.edu 217-265-0873 OVERVIEW EDUCATION EMPLOYMENT WILLIAM BULLOCK Professor of Industrial Design and Program Chair University of Illinois at Urbana-Champaign 143 Art&Design Building, 408 E. Peabody Dr., Champaign, IL 61820;

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.

Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C. THE ROLE AND FUTURE OF HEALTH INFORMATION TECHNOLOGY IN AN ERA OF HEALTH CARE TRANSFORMATION Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

PUBLIC SAFETY SUMMIT I. Crime Prevention through Cooperative Policing and Best Practices

PUBLIC SAFETY SUMMIT I. Crime Prevention through Cooperative Policing and Best Practices PUBLIC SAFETY SUMMIT I Crime Prevention through Cooperative Policing and Best Practices Wednesday, January 16, 2013 Greetings, Thank you for taking time out of your busy schedule to attend today s Public

More information

George J. Woods Vitae CURRICULUM VITAE

George J. Woods Vitae CURRICULUM VITAE CURRICULUM VITAE PERSONAL INFORMATION Name: Current Position: George J. Woods, III Associate Professor, Strategic Leadership United States Army War College 122 Forbes Avenue, Room B314 (717) 245-4741 George.J.Woods6.civ@mail.mil

More information

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: ashutosh.dutta@ieee.org Realization of Your Dream

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

22 nd Annual Review of the Field of National Security Law

22 nd Annual Review of the Field of National Security Law ABA_Security_Law_Program_#72865:Layout 1 11/28/12 1:30 PM Page 1 A NATIONAL SECURITY CONFERENCE 22 nd Annual Review of the Field of National Security Law CO-SPONSORED BY THE American Bar Association Standing

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Ernest H. Joy II. Educational Background. 1997 VPI AND STATE UNIVERSITY Blacksburg, VA. Ph.D. Education: Curriculum and Instruction

Ernest H. Joy II. Educational Background. 1997 VPI AND STATE UNIVERSITY Blacksburg, VA. Ph.D. Education: Curriculum and Instruction 138 Ernest H. Joy II Educational Background 1997 VPI AND STATE UNIVERSITY Blacksburg, VA. Ph.D. Education: Curriculum and Instruction 1990 US NAVAL WAR COLLEGE Newport, RI. M. A., National Security And

More information

June 24, 2009. NSA/CSS Washington, DC 20511 Fort George G. Meade, MD 20755-5999. Washington, DC 20502-0001 Washington, DC 20301-1400

June 24, 2009. NSA/CSS Washington, DC 20511 Fort George G. Meade, MD 20755-5999. Washington, DC 20502-0001 Washington, DC 20301-1400 Alliance for Network Security AMT The Association for Manufacturing Technology Business Software Alliance Coalition for Employment Through Exports Computer Coalition for Responsible Exports Information

More information

Helping Individuals Into and Through Retirement with Confidence

Helping Individuals Into and Through Retirement with Confidence Helping Individuals Into and Through Retirement with Confidence Co-Organized with Alicia H. Munnell and The Center for Retirement Research at Boston College October 5, 2007 AGENDA 10:30 Non-Financial Aspects

More information

know school PubliC affairs

know school PubliC affairs know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to

More information

A Fast Track to Attaining a Prestigious US Bachelor Qualification

A Fast Track to Attaining a Prestigious US Bachelor Qualification Bachelor of Business Administration (BBA) Bachelor of Science in Computer Science (BSCS) Top-Up Degree Program Specially Designed for Diploma/Associate Degree Holders (Hong Kong EMB course registration

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Master of Business Administration. A Fast Track to Attaining a Prestigious US MBA Qualification

Master of Business Administration. A Fast Track to Attaining a Prestigious US MBA Qualification Master of Business Administration A Fast Track to Attaining a Prestigious US MBA Qualification 1 About UMT The University of Management and Technology (UMT), chartered by the State Council of Higher Education

More information

HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS

HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS NOVEMBER 12, 2015 HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING

More information

Institutional Effectiveness Report Academic Year 2013-14 Political Science Program

Institutional Effectiveness Report Academic Year 2013-14 Political Science Program Institutional Effectiveness Report Academic Year 2013-14 Political Science Program Dr. Jonathan M. Acuff IE Coordinator and Assistant Professor of Political Science Dr. David R. White Chair, Department

More information

Bachelor of Business Administration

Bachelor of Business Administration Bachelor of Business Administration Top-Up Degree Program Specially Designed for Diploma/Associate Degree Holders A Fast Track to Attaining a Prestigious US Bachelor Qualification Hong Kong EMB Registration

More information

Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION

Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION Context There exists a need for business school curriculum that prepares experienced managers with technology

More information

Managing Business, Government, and Public Policy: A Washington, D.C. Residency Program for MBA Students

Managing Business, Government, and Public Policy: A Washington, D.C. Residency Program for MBA Students Managing Business, Government, and Public Policy: A Washington, D.C. Residency Program for MBA Students Presented by The Washington Campus June 9-13, 2014 MBA 6 Washington, D.C. Monday, June 9, 2014 8:00

More information

Doctor of Business Administration (DBA) A Fast Track to Attaining a Prestigious US DBA Qualification

Doctor of Business Administration (DBA) A Fast Track to Attaining a Prestigious US DBA Qualification Doctor of Business Administration (DBA) A Fast Track to Attaining a Prestigious US DBA Qualification 1 About UMT The University of Management and Technology (UMT), chartered by the State Council of Higher

More information

Rhode Island Women in Higher Education (RIWHE) Third Annual Spring Conference

Rhode Island Women in Higher Education (RIWHE) Third Annual Spring Conference Rhode Island Women in Higher Education (RIWHE) Third Annual Spring Conference Friday, April 22, 2005 ~ Salve Regina University ~ Ochre Court BIOGRAPHIES OF TABLE-TOP LEADERS Judith A. Brissette, Ph.D.

More information

The CIO. Join Us this spring. Are You Ready for Growth and Innovation?

The CIO. Join Us this spring. Are You Ready for Growth and Innovation? The CIO Pocket MBA Are You Ready for Growth and Innovation? Executive Programs April 7-11, 2014 Executive Leadership Center For complete program details visit ciopocketmba.bu.edu Early Bird Discount: Save

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

August 16 August 22, 2009 November 1 November 7, 2009

August 16 August 22, 2009 November 1 November 7, 2009 Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from Experts in High-Risk Environments August 16 August 22, 2009 November 1 November 7, 2009 S ecurity

More information

Leveraging Sponsors to Advance Careers

Leveraging Sponsors to Advance Careers Leveraging Sponsors to Advance Careers a symposium for sponsors and those seeking sponsorship Thursday, March 19, 2015 Eugene McDermott Plaza, Lecture Hall D1.602 Most of you know that having a mentor

More information

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,

More information

NPTS Program Summer 2014 Professional Development Experience Final Report

NPTS Program Summer 2014 Professional Development Experience Final Report NPTS Program Summer 2014 Professional Development Experience Final Report The Nonproliferation and Terrorism Studies Students are doing exciting things this summer, whether here in Monterey or around the

More information

MASTER AGREEMENTS How to use them to advance academic and corporate interests

MASTER AGREEMENTS How to use them to advance academic and corporate interests MASTER AGREEMENTS How to use them to advance academic and corporate interests March 30-31, 2015 Purdue University Purdue Memorial Hall West Lafayette, IN The University Industry Demonstration Partnership

More information

Entrepreneurial Opportunities for Georgia Tech Students

Entrepreneurial Opportunities for Georgia Tech Students 2009, Georgia Institute of Technology Entrepreneurial Opportunities for Georgia Tech Students Stephen Fleming Chief Commercialization Officer 4/22/09 Technology Commercialization at

More information

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP) A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant

More information

2012 Regional Overview

2012 Regional Overview 2012 Regional Overview Hampton Roads, Virginia Aerospace & Aviation International Business Advice Composed of experts within the Hampton Roads business community, the International Advisory Council provides

More information

J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia 30350. GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management Atlanta, GA

J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia 30350. GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management Atlanta, GA J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia 30350 Phone: (404) 385-2658 Fax: (404) 984-6030 cumminsjm@mindspring.com July 2001 Present GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management

More information

Welcome to the 2007 DHS University Network Summit. Matthew Clark, Director Office of University Programs DHS Science and Technology Directorate

Welcome to the 2007 DHS University Network Summit. Matthew Clark, Director Office of University Programs DHS Science and Technology Directorate Welcome to the 2007 DHS University Network Summit Matthew Clark, Director Office of University Programs DHS Science and Technology Directorate Summit Objectives Describe the Office of University Programs

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause

Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause Biographies OAS POLICY ROUNDTABLE: Scholars, Policymakers and International Affairs: Finding Common Cause Thursday, November 6 th, 2014 Hall of the Americas, Organization of American States 17 th Street

More information

PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES

PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES PANEL CHAIR: Dr. Rayford Vaughn ( Mississippi State University): Dr. Vaughn teaches

More information

Message from Richard A. Clarke Special Advisor to the President for Cyberspace Security

Message from Richard A. Clarke Special Advisor to the President for Cyberspace Security The CIP Report VOLUME 1, ISSUE 1 JULY 2002 Welcome to the Inaugural Edition of The CIP Report Each month, the CIP Project will publish an electronic newsletter focusing on Critical Infrastructure Protection.

More information

23 Y.D Berkovitz St. The Museum Tower Fl. 7 Tel Aviv, Israel

23 Y.D Berkovitz St. The Museum Tower Fl. 7 Tel Aviv, Israel 23 Y.D Berkovitz St. The Museum Tower Fl. 7 Tel Aviv, Israel Phone +972-3-6935356 +972-544-336056 E-mail: nimrod@kozlovski.co.il Website: www.internetlaws.co.il Dr. Nimrod Kozlovski, Adv. Personal Information

More information

EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990

EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990 Bonnie E. Melhart Associate Provost and Dean of University Programs TCU Box 297024 Fort Worth, Texas 76129 B.Melhart@TCU.edu Office phone: 817.257.5570 Home phone: 817-341-2560 Mobile phone: 817-726-4635

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Atlantic Trust Disclosure

Atlantic Trust Disclosure Atlantic Trust Disclosure Atlantic Trust Private Wealth Management includes Atlantic Trust Company, a division of Invesco National Trust Company (a limited-purpose national trust company), and Stein Roe

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing

More information

CAREER SYNOPSIS. Marsha L. Lewis, PhD, RN

CAREER SYNOPSIS. Marsha L. Lewis, PhD, RN CAREER SYNOPSIS Marsha L. Lewis, PhD, RN Marsha Lewis, PhD, RN is the Dean of the UB School of Nursing (UB SON). Dr. Lewis was recruited to the position in February 2012 following a national search. Dr.

More information

Center for. Emergency Management and Homeland Security. what keeps you awake at night? mitigate prepare respond recover manage

Center for. Emergency Management and Homeland Security. what keeps you awake at night? mitigate prepare respond recover manage Center for Emergency Management and Homeland Security what keeps you awake at night? mitigate prepare respond recover manage diverse areas of expertise comprehensive, timely and cost-effective solutions

More information

Ron LeMay Chairman and CEO

Ron LeMay Chairman and CEO Ron LeMay Chairman and CEO As the Chairman and Chief Executive Officer of FarmLink, Ron provides more than the strategic direction for the agriculture technology company, he also provides the inspiration.

More information

Sunil A. Bhave Ph.D. (UC Berkeley, 2004)

Sunil A. Bhave Ph.D. (UC Berkeley, 2004) Academic Roots The chain of doctoral thesis advisors over the past century: Sunil A. Bhave, Ph.D., UC Berkeley 2004 Roger T. Howe, Ph.D., UC Berkeley 1984 Richard S. Muller, Ph.D., Caltech 1962 R. David

More information

LESLIE G. WISER, JR. CURRICULUM VITA. Education. Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh, Pennsylvania

LESLIE G. WISER, JR. CURRICULUM VITA. Education. Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh, Pennsylvania LESLIE G. WISER, JR. University of South Carolina 115 Currell College 1305 Green Street Columbia, SC 29208 CURRICULUM VITA Education Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh,

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

2015 Annual Conference

2015 Annual Conference 2015 Annual Conference State of the Nursing Workforce in an Era of Health Care Reform: Data, Trends, and New Collaborations June 10-12, 2015 - Denver, Colorado Grand Hyatt Denver 1750 Welton St., Denver,

More information

Civil & Environmental Engineering

Civil & Environmental Engineering Department of Civil & Environmental Engineering Developing Leaders of Innovation At the U.Va. Department of Civil and Environmental Engineering, our faculty and students serve society s need for sustainable

More information