Business and Economics Forum Cyber Security Research and Policy Review. List of Participants



Similar documents
Commonwealth of Virginia Cyber Commission. Town Hall Virginia Tech 24 February 2015

Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology

Refining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector

22 nd Annual Review of the Field of National Security Law

22 ND ANNUAL REVIEW OF THE FIELD

Assessing Risk in Turbulent Times

Information Security and Risk Management

MeriTalk Cyber Security Exchange June 26 Meeting Participants

FirstNet Statutory Overview

2014 Montana Government IT Conference. Securing Data Networks and People

Exploring the potential for a CDC for Cyber Informal Davos Follow up Meeting

INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder

( 4EC C11392)

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

Global Talent and the Next Generation Workforce. A Thought Leadership Roundtable on Digital Strategies

2012 Sample Titles & Companies

Chemical Sector Cyber Security Program

Carnegie Institute of Technology

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Charles Caramello Associate Provost and Dean, Graduate School

Like a hail storm over a car lot filled with new vehicles,

U.S. Department of Transportation Intelligent Transportation Systems Program Advisory Committee. ITS Program Advisory Committee

Security through Information Risk Management

GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT

Information Technology Infrastructure Committee (ITIC)

Which Describes Your Cybersecurity Program Eager Beaver or Deer in Headlights? October 29, 2015

DHS, National Cyber Security Division Overview

AGENCY: National Telecommunications and Information Administration, U.S. Department of

AGENDA (Subject to change)

ISSA Women in Security Special Interest Group (WIS SIG)

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

BOARD OF TRUSTEES. President Dr. Randy Avent. Chief Operating Officer Ava L. Parker. Vice President Advancement TBD

ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY

International Advisory Council and Committee Contacts

Department of Defense DIRECTIVE

Chairman Stratton called the meeting to order at 1:00 p.m. Chairman Stratton asked the recording Secretary, Darby McDonald to call roll.

Original Group Gap Analysis Report

FULL BOARD OF VISITORS MEETING UNIVERSITY OF VIRGINIA JANUARY 31, 2003

Bringing Health Care Online: The Role of Information Technologies. September OTA-ITC-624 GPO stock #

U.S. Cyber Security Readiness

Graduate Student Leadership Certificate Program Pilot

University of Maryland Cybersecurity Center (MC 2 )

Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective

UC Berkeley Campus Data Warehouse Governance and Delivery Organization Proposal Campus Data Warehouse / Business Intelligence Competency Center

Local Emergency Management-Civil Defense Organizations

TAX ADVICE. Second Obama Administration. for the. Friday, January 18, A Pepperdine Law Review Symposium Cosponsored by.

National Security Telecommunications Advisory Committee Member Conference Call Meeting Summary February 5, 2015

Embedding Information Security Risk Management into the Extended Enterprise

DAY ONE. Congressional Remarks Senator Gordon Smith (Oregon)

KATHLEEN BRAGDON SENIOR ADVISOR, OFFICE OF PATENT QUALITY

Commandants of the U.S. Army War College

AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE Crystal Gateway Marriott Arlington, Virginia

Organizing and Managing Information Resources on Your Campus

Andrea Ballinger Associate Vice President Administrative Technologies. Erica Johnson Administrative Assistant. Michael Davis Acting Director, BITS

The University of Texas at Austin Campus Master Plan. Cesar Pelli & Associates Balmori Associates, Inc.

Interventional Pulmonology Course and Hands-On Workshop

DEPARTMENTAL PROFILES,

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

CSRIC IV - Working Group 4: Cybersecurity Best Practices Status Update

Faculty Personnel Changes Report ACADEMIC AFFAIRS COMMITTEE AND FINANCE AND AUDIT COMMITTEE. Quarter ending December 31, 2014

Recommended Citation: U.S. Congress, Office of Technology Assessment, Bringing Health Care Online: The Role of Information Technologies, OTA-ITC-624

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

MARTIN B. ZIMMERMAN. Ross School of Business University of Michigan 701 Tappan Street Ann Arbor, MI 48109

TD AMERITRADE Executive Management Team

Alan Murray President, Pew Research Center Dr. Lori E. Murray Former Special Advisor to the President

A B C D E F G H I J K L Nonsalary Benefits FY % $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0 $0

Case 1:10-cv RMU Document 1 Filed 02/04/10 Page 1 of 11 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Strategic Progress Update July 2014 March 2015

Possession of Marijuana While Operating a Motor Vehicle

P.O. Box 1028 New York, NY (212) April 10, 2012

HR Strategy: Creating Competitive Advantage through People October 26-30, 2009

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Contact: Mark Primoff FOR IMMEDIATE RELEASE

MSU Denver Global Lists: Definitions and Guidelines

Avoice Summary Paper Authored by Terry A. Wilson

Program Drill-Downs National

National Officials Committee 2013 Annual Meeting December 6-7, 2013 Indianapolis, Indiana Minutes

How To Become A Cybersecurity Consultant

Computer and Network Security in Higher Education

The Midsouth Political Science Review Volume 15, Number 1, 2014

Federal Sponsors/GCO. Agency for International Development Columbia Warren. Corporation for National and Community Service Columbia Warren

STATE OF NORTH CAROLINA

(Subject to Change) 10:00-10:45 AM BYOD and MDM: Reducing Risk on the Mobile Perimeter Moderator Chris Crowley Ethical Hacker SANS Institute

Priscilla Clarkson Dean

AHIC Transition Update

Rice University IT Structure and Governance. Klara Jelinkova Vice President and CIO

How To Get A Green Book

A Call to Paris Climate Negotiators: Tax Carbon.

Panel: Transitioning Systems Engineering Research into Programs and Practice

Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, Washington, DC

CBIA 2015 Connecticut Tax Conference June 26, 2015 Presenters

Who We Are. The Challenge

The Fight for the Last Mile

WITNESS LIST. Peebles, Rex (Texas Higher Education Coordinating Board), Austin, TX

BENTON COUNTY FELONY SENTENCINGS FOR THE MONTHS OF MAY, JUNE & JULY, 2009

How To Understand And Understand Cyber Security

4. Contact local academic professional associations/societies for professionals of color and ask them for referrals or to publicize your positions.

Transcription:

Business and Economics Forum Cyber Security Research and Policy Review List of Participants Christine Adams Director, Chemical Sector Cyber Security Program and IT Public Policy The Dow Chemical Company Susan Alexander Chief Technology Officer for Information and Network Assurance Office of the Assistant Secretary of Defense Networks and Information Integration Stewart Baker Assistant Secretary of Policy Naba Barkakati Chief Technologist Government Accountability Office Rod Beckstrom Director of the National Cybersecurity Center Patrick Beggs Director, CIP Cyber Security Program National Cyber Security Division Jeff Chumbley Director of Global Information Security and Compliance and CISO Dell Eric Cowperthwaite Providence Health and Services John Craparo Senior Vice President Hewlett Packard Company Mary Anne Davidson Oracle

James Dipasupil Vice President and Technology Information Security and Compliance Ameriprise Financial Donna Dodson Deputy Division Chief National Institute of Standards and Technology Tom Donahue Director, Cyber Policy Homeland Security Council Chris Dunning Director, Information Security Staples, Inc. Mary Erlanger Director, Information Technology Risk Management Colgate-Palmolive Company Ronald Ford National Cyber Security Division John Garing CIO and Director of Strategic Planning and Information Defense Information Systems Agency Lawrence Gordon Ernst & Young Alumni Professor of Managerial Accounting and Information Assurance Robert H. Smith School of Business University of Maryland John Grant Senator Susan Collins Barry Horowitz Professor, Department of Systems and Information Engineering University of Virginia Dan Hurley Director, Critical Infrastructure Protection Department of Commerce National Telecommunications and Information Administration M. Eric Johnson Professor of Operations Management and Director, Glassmeyer/McNamee Center for Digital Strategies Tuck School of Business

Eric Litt General Motors Corporation Martin Loeb Professor of Accounting and Information Assurance Robert H. Smith School of Business University of Maryland Jack Matejka Director, IT Security Eaton Corporation Kevin Milliken Vice President, Information Technology Staples, Inc. Ray Musser Director, Security General Dynamics Corporation Sheldon Ort Director, Information Technology Information Asset Management and Architecture Eli Lilly and Company Charles Palmer Chair and Director for Research I3P, Deborah Parkinson Senator Joseph Lieberman Walt Polansky Supervisory Physicist Office of Science, Department of Energy Geir Ramleth Senior Vice President and CIO Bechtel Group, Inc. Helga Rippen President Advisors in Health Information Technology David Ryan Chief Architect, Technology Solution Group Hewlett Packard Company

Adam Sedgewick Senator Joseph Lieberman Tom Seivert Office of the Director of National Intelligence Joint Interagency Cyber Task Force Jeff Sherwood Manager, Office of the CISO H&R Block John Stewart Vice President and Chief Security Officer Cisco Systems, Inc. Keith Sturgill Chief Information Officer Eastman Chemical Company Rahul Telang Associate Professor of Information Systems Heinz School of Public Policy Lee Warren United Technologies Corporation Martin Wybourne Vice Provost for Research Francis and Mildred Sears Professor of Physics List of I3P staff present Kiel Alarcon Communications Assistant Martha Austin Executive Director Trudy Bell Writer and Editor Laurie Burnham Assistant Director for Communications and Outreach Heather Drinan Associate Director for Research Nicole Hall Hewett Event Manager

List of Dartmouth staff present Hans Brechbühl Executive Director Glassmeyer/McNamee Center for Digital Strategies, Tuck School of Business