From Evolution to Revolution: The Founders and the Headliners of Information Security



Similar documents
Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

IC B10 - Vision Panel Discussion: Scaling the Information Security Program Maturity Model: 3 Practitioners Perspectives

Computer Security Incident Response Team

AOPA'S GUIDE TO CANDIDATE FORUMS. stand on issues important to General Aviation. A guide to help pilots discover where candidates

Meeting Cyber Security Challenges

Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee

Information Security Curricula in Computer Science Departments: Theory and Practice

GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic

PERSONAL HISTORY AND PROFESSIONAL QUALIFICATIONS (2015)

Implementing Cisco IOS Network Security v2.0 (IINS)

Active Learning with the CyberCIEGE Video Game

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Gila County Superior Court Judge Bryan B. Chambers

Welcome to the Webinar A Candid Conversation: The Future of the Health Care CIO. February 25, pm 1pm PST

Computer Security Incident Response Team

What is the Right Security Solution for Mobile Computing? #RSAC

Financial Training 2016 COURSE CATALOG. in the Energy Sector. Use code Energy2016 and save $200 on any live, in-person training course

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Topic: The role of Enterprise Architecture in the design of the digital future: A Zachman Perspective

Bernice P. (Bernie) Dixon

Autonomous Vehicle Technologies for Passenger and Freight Mobility

The Security Development Lifecycle

Partnership prospectus

Information Security Policy

OUR SPONSORS. South Florida Hedge Funds 2011 Industry Outlook. The Miami Finance Forum. Presents A Panel Discussion on.

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

INTERNET SECURITY ARCHITECTURE

5 Panelists from U.S.A. (affiliated with IMC USA and IERG)

ERIC E. SPIRES. Ph.D. May 1987, University of Illinois (major - accounting; special area - auditing; minor - statistics and experimental design)

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio & Video Forensics Forensic Photography

MS-55096: Securing Data on Microsoft SQL Server 2012

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract

Bellevue University Cybersecurity Programs & Courses

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Wireless Mobile Internet Security. 2nd Edition

2015 Public Safety Broadband Stakeholder Meeting. Applied Public Safety Cybersecurity Research Nelson Hastings Electronics Engineer PSCR

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Cyber Security. Smart Grid

Policy on Academic Tracks and Promotions for the School of Nursing (SON) at the American University of Beirut (AUB)

The Virtualization Practice

2012 RECIPIENT SINGAPORE AUSTRALIA EMINENT ALUMNI AWARD. Dr TAN Chin Nam

SPAR emedia Marketing Kit

Managing Hybrid Cloud Enlivenia

The Fight for the Last Mile

CS 464/564 Networked Systems Security SYLLABUS

AC : DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY

Standards for Security Categorization of Federal Information and Information Systems

Data Security Breaches The Worldwide Epidemic

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

2014 Montana Government IT Conference. Securing Data Networks and People

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

BSA-ISSA Information Security Study Online Survey of ISSA Members

Why Cryptosystems Fail. By Ahmed HajYasien

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

California Counties Information Security Programs A look into the progress and future plans across counties

The 2 nd Hong Kong Public Relations Awards 2014 Now Calling For Entry

Timothy Renick Vice President for Enrollment Management and Student Success and Vice Provost Georgia State University

Leveraging Sponsors to Advance Careers

THERESE M. ( TERRI ) VAUGHAN

ARIZONA STATE SENATE 46TH LEGISLATURE FIRST REGULAR SESSION

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

National Black MBA Association is Impacting Time, Technology, and Tomorrow One Member at a Time at the 34 th Annual Conference & Exposition

Dr Dennis Reynolds Dennis Reynolds

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

4A Healthcare Data Security & Privacy

Digital Forensics at the National Institute of Standards and Technology

What Risk Managers need to know about ICS Cyber Security

Transcription:

From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22 nd National Information Systems Security Conference Fall, 1999 Panel Chair: Blaine W. Burnham, Ph.D. Director, Georgia Tech Information Security Center (GTISC) Georgia Institute of Technology Atlanta, Georgia 30332 Phone: 404.385.0270 Fax: 404.385.0332 Burnham@cc.gatech.edu Point of Contact: Phyllis A. Schneck, Ph.D. Special Assistant to the Director, GTISC Georgia Institute of Technology Atlanta, Georgia 30332 Phone: 404.894.6731 Fax: 404.385.0332 Pschneck@mindspring.com July 1999

Session Abstract: The purpose of this panel session is to present an overview of the issues which span the history of, and developments in, the field of Information Security. We aim to accomplish this by presenting selected key players to present a chronological, first-hand account of the following points: Where have we come from? What have we forgotten? Where are we now? Where are we headed? What are the current government and industry demands, and how do those differ from 30 years ago? We propose that these panel sessions be videotaped for later use in developing a complete history of the evolution of Information Security and preserving the business lessons learned. GTISC would like to extend special thanks to Cynthia Irvine of the Naval Post Graduate School for her contributions to the creation of this panel. Background of Target Audience: The GTISC panel presentation is intended for anyone interested in the aforementioned issues. As key emphasis will be placed on the importance of the future of Information Security, young attendees are strongly encouraged, and therefore no background prerequisites exist for this panel session.

Panelists: Roger Schell 801-861-2879 schellr@alum.mit.edu Clark Weissman 818-776-8221 PROTCB1@acm.org Steve Lipner Mitretek Systems 703-610-1928 lipner@mitretek.org ABSTRACT Achieving Assurance: What will we do? For thirty years, high security, multilevel security, and the goal of protecting sensitive or classified information from hostile code have been the holy grails of computer security research. We have now reached the point where the threats defined as academic hypotheses in 1975 are manifest on the Internet. Meanwhile, attempts to build systems that could respond to those threats have failed the test of the marketplace. This presentation will review some of the history of threats and countermeasures. It will then discuss some options for achieving effective protection of sensitive information that have a chance of achieving technical and market success. Steven B. Lipner is director of Mitretek s Systems Technology Center division. In this role, he leads over one hundred staff who conduct specialized engineering projects in INFOSEC, software technology, and Internet applications. With almost thirty years of experience in INFOSEC, Mr. Lipner has been responsible for the evolution of Mitretek s INFOSEC work to provide additional focus on research and innovative technologies. Mr. Lipner serves as the executive agent for the cross-agency INFOSEC Research Council under a contract from the National Security Agency to Mitretek. Prior to joining Mitretek, Mr. Lipner spent about fifteen years as a business unit manager and development manager responsible for COTS INFOSEC products. As an executive vice president of Trusted Information Systems (TIS), he was responsible for the Gauntlet Internet Firewall product line, and was the principal inventor of the TIS cryptographic key recovery technology. As manager of the Secure Systems Group at Digital Equipment Corporation, he was responsible for the development of secure operating system, network encryption and security management products including an operating system for VAX

computers that was targeted at Class A1 of the Orange Book. Mr. Lipner was one of the original industry members of the National Computer Systems Security and Privacy Advisory Board. *** Peter Neumann Computer Science Laboratory, SRI International 650-859-2375 neumann@csl.sri.com Peter G. Neumann is a Principal Scientist in the Computer Science Laboratory at SRI (where he has been since 1971), concerned with computer system survivability, security, reliability, human safety, and high assurance. He is the author of Computer-Related Risks, Moderator of the ACM Risks Forum (comp.risks), Chairman of the ACM Committee on Computers and Public Policy, and Associate Editor of the CACM for the Inside Risks column. He was founder and for 19 years Editor of the ACM SIGSOFT Software Engineering Notes. He is currently a member of the U.S. General Accounting Office Executive Council on Information Management and Technology. See his Web site <http://www.csl.sri.com/neumann/> for Senate and House committee testimonies, reports, papers, a partial bibliography, and RISKS material. Neumann is a Fellow of the American Association for the Advancement of Science, the ACM, and the Institute of Electrical and Electronics Engineers (of which he is also a member of the Computer Society). He has received the ACM Outstanding Contribution Award for 1992, the first SRI Exceptional Performance Award for Leadership in Community Service in 1992, the Electronic Frontier Foundation Pioneer Award in 1996, the ACM SIGSOFT Distinguished Service Award in 1997, and the CPSR Norbert Wiener Award for in October 1997, for ``deep commitment to the socially responsible use of computing technology.'' *** Todd Inskeep Vice President - Information Security Architecture Bank of America todd.inskeep@bankofamerica.com 704-386-6599 ABSTRACT

Mr. Inskeep will briefly discuss the circular history of computer security practices, and the difficulty of building systems today with applications that lack assurance, and requirements to enforce security policies that are beyond the capability of today's distributed system. Mr. Inskeep will also discuss both the need for education and some current trends in INFOSEC education. Mr. Inskeep has over 15 years of Information Security experience ranging from military communications through policy, security evaluation, trusted operating systems, secure applications including PCMCIA cards and smart cards, and Public Key Infrastructure implementation. After a variety of work at the National Security Agency, Mr. Inskeep joined NationsBank as it began merging with Bank of America. At Bank of America, Mr. Inskeep explores, develops, and documents security architecture across various bank projects. These projects include distributed secure applications, secure connections to legacy systems, and application architectures for demilitarized zones (DMZ) within the firewall system. His focus is on the bank's internal PKI implementation, and the bank's implementation of the Identrus PKI - an international banking effort to enable trusted electronic commerce world-wide. Jim Anderson James P. Anderson Co. 215-646-4706 Ande801@ibm.net