|Cyber Securty R&D Town Hall Meeting 2 |
Tuesday Morning Speaker
Provocative Topics in Networking and Security
| Biography: Radia Perlman is a Fellow at Sun Microsystems, designing network and security protocols. She invented many of the basic algorithms that make today's network infrastructure robust and scalable. Her current research interests include assured delete of data, making large networks robust against Byzantine failures, and replacing bridges/switch with technology which is upwardly compatible, but more robust, flexible, and scalable. She is author of "Interconnections: Bridges, Routers, Switches, and Internetworking Protocols", and coauthor of "Network Security: Private Communication in a Public World", which are widely used both as textbooks in universities and for engineers to learn the field. She holds over 90 patents, a PhD in computer science from MIT, and an honorary doctorate from KTH, the Royal Institute of Technology, Sweden. She recently was given a lifetime achievement award by Usenix, and named SVIPLA (Silicon Valley Intellectual Property Law Association) Inventor of the year. I will talk about some of my current work, including a new form of key management that makes it possible to make data expire. Even though backups of all the data exist, once a file reaches its expiration date it will be impossible to recover it. Another topic I'll discuss is network authentication. Why are we still annoying users with hundreds of username/passwords? And yet another topic I'll discuss is some of the folklore in networking and security protocols. What are some technologies that are misunderstood and overhyped? What are some technologies that should be more widely known and used? And I'll talk about some of the flavor of how network protocols get designed.
|Biography: Until June 28, 2008, Steve Nixon was the Director of Science and Technology for the Office of Director of National Intelligence (ODNI DS&T). Mr. Nixon oversaw the intelligence-related Science & Technology activities of the 16 agencies of the US Intelligence Community, including CIA, NSA, NRO, NGA, DIA, and FBI. Mr. Nixon worked for the ODNI for 2.5 years and is most known for the creation of the Rapid Technology Transition Initiative as well as the Intelligence Advanced Research Project Activity (IARPA) for which he served as the first acting director.
Prior to working in the ODNI, Mr. Nixon served ten years with the US Congress as a Professional Staff Member on the House Defense Appropriations Subcommittee. There he was responsible for review of a wide variety of military and intelligence research, development, and acquisition programs. In 2005, the National Journal named him to the "Hill 100" list under the category of Defense Transformation. Also in 2005, he was designated by Space News as one of the top 10 "making a difference" in space. This list also included the Directors of NASA and the European Space Agency and included commercial, military, and civilian government space sectors. Prior to his work with the US Congress, Mr. Nixon was a senior civilian analyst working for the Department of Navy at the Pentagon. He graduated with B.S. degrees in Electrical Engineering and Mathematics (Highest Distinction and Honors) from the University of Kansas. He later earned a M.A. degree in National Security Studies from Georgetown University. Mr. Nixon is currently a consultant in the national security sector in the Washington DC area.
President and CEO
System 1, Inc.
Monday Night Banquet Speaker
Inside the beltway, cyber security transformation in the Government
|Biography: John Abeles has his graduate and undergraduate education from Cornell University. He currently has 30 years of experience in management program and policy development, information security, and performance improvement for the Government, utility and private sector, and national laboratories. Mr. Abeles has an established track record as an “agent of change” assessing organizational effectiveness and charting a course to increase efficiency and lower cost, while increasing security, safety, and quality. He has developed new management and technical approaches which have been adopted industry-wide and has served at executive/senior levels providing leadership on critical client solutions on multi-billion dollar efforts. Mr. Abeles has demonstrated experience in knowledge management paradigms, leading the development of new software and security products, and managing technology solutions for clients. He has supported White House efforts and currently is active in supporting critical projects across the Government. He has led teams and developed solutions which have been used across the Federal Government. Mr. Abeles has authored numerous national publications including some the NIST security publications and has presented papers for many organizations and Federal entities including the Department of Treasury and the Department of Energy. He is an expert in security policy and knowledgeable of security technologies.
Computing and Communications Foundations
The Federal Research Enterprise
|Biography: Dr. Michael Foster is director of the Division of Computing and Communication Foundations (CCF) in the Computer and Information Science and Engineering Directorate (CISE) at the National Science Foundation. He recently spent four years at the Defense Advanced Research Projects Agency (DARPA) as a program manager, providing leadership for programs focused on quantum information science and technology and speech translation. Earlier, Dr. Foster served as acting director for the CISE Division of Experimental and Integrative Activities (EIA). Dr. Foster has served on the faculty of Columbia University, and has done research and product design at several technology companies. He earned a Ph.D. in Computer Science from Carnegie-Mellon University and an SB in Mathematics from MIT.
Associate Director of Science for Advanced Scientific Computing Research
Department of Energy
Five Pillars for Improved Cyber-Security in an Insecure World
|Biography: Michael Strayer has served as the Associate Director of Science for Advanced Scientific Computing Research since October 2004. His background includes over 30 years of math, physics, computational physics, and computational science. He has produced approximately 193 books, proceedings, publications and invited presentations. Dr. Strayer has membership in various Professional Societies.
CTO, Intelligence Group (TASC)
Northrop Grumman IT
Cyberspace... Cyberwar... and Future War
|Biography: George Hull is the CTO & Technical Director of the Information Superiority Operating Unit within the Intelligence Group (TASC) of Northrop Grumman. George is a senior engineering leader with substantial expertise in systems engineering, enterprise and systems architecture, information assurance, information sharing, communications and IP network design and military operations. Since joining Northrop Grumman in May 2005, George has supported several customers in the U.S. Intelligence Community including his most recent assignment as a Line of Business Manager in support of the Office of the Director of National Intelligence, Chief Information Officer. George also serves as a current member of the U.S. Air Force Scientific Advisory Board where he has served on several national-level study panels in recent years including: Networking to Enable Coalition Operations, Space System Survivability; Implications of Cyberwarfare for the U.S. Air Force and Operating and Defending in Contested Cyber Domains.
Prior to joining Northrop Grumman in May 2005, George completed a 30 year career in the U.S. Army. In his last assignment at the Defense Information Systems Agency (DISA), he served as the Chief Engineer for Strategic Communications with responsibilities for enterprise communications architecture for the White House. Earlier at DISA, George served as a Division Chief for Information Assurance and the Chief Engineer for Multi-National Information Sharing. George developed the proposed Multinational Information Sharing Program and led many of the Department of Defense’s efforts to improve information sharing between secure networks within the U.S. Government and between the U.S. and our multi-national partners. While at DISA, George was also part of the senior leadership team that developed DISA’s standard systems engineering process.George’s Army career began in 1974, when he enlisted in the Infantry and joined the 101st Airborne Division. After serving as an Infantry Squad Leader, George obtained a Regular Army Commission in 1983 and served in a variety of company grade assignments including time with the 3d Armored Division in Germany during the Cold War. In other Army assignments, George taught Systems Engineering as a member of the Faculty of the U.S. Military Academy at West Point and was later selected to attend the U.S. Army’s School of Advanced Military Studies. As a Field Grade Officer, George returned to Germany in 1997, serving with the 1st Infantry Division as an Army planner and Infantry Battalion Executive Officer before joining the personal staff of General Montgomery Meigs, Commanding General, U.S. Army Europe, as a Special Assistant. George’s education includes a Master of Science in Engineering from the University of Texas at Austin, a Master of Military Arts and Science in Strategy from the School of Advanced Military Studies (SAMS), Command and General Staff College, Ft. Leavenworth, KS and a Bachelor of Science in Zoology and Physiology from Louisiana State University.
Director, National Center for Applied Secure Systems Research
NCSA/University of Illinois
TCIP: Trustworthy Cyber Infrastructure for the Power Grid
|Biography: Von Welch is the manager for Security R&D at the National Center for Supercomputing Application (NCSA) at the University of Illinois. In this role he leads development of new security services for NCSA’s advanced cyberinfrastructure, he serves as a co-PI on NCSA’s NSF-funded TeraGrid Resource Partner grant, and serves as deputy directory for the ONR-funded National Center for Advanced Secure Systems Research (NCASSR), Mr. Welch’s research activities include a long history of Grid security activities, currently focused on integration of Grid and organization security as PI of the NSF-funded NMI Grid/Shibboleth interoperability project (aka “GridShib”), He also is a member of the NSF-funded CyberTrust Center for Trustworthy Cyber Infrastructure for the Power Grid (TCIP) and has leads the NCASSR Mithril project, focused on applying survivability research to real-world computing systems. Community activities include serving on the program committee for the Conference on Communications and Multimedia Security (Sep ’04), the Workshop on Trust, Security, and Reputation on the Semantic Web (Nov ’04), and the NIST-sponsored PKI R&D Workshop (Apr ’05 and ‘06). He has chaired several working groups in the Global Grid Forum security area as well as organizing several security workshops.
The Information Trust Institute is the home of the TCIP Center, a national center created in August 2005 to address the challenge of how to protect the nation's power grid. The National Science Foundation awarded $7.5 million over five years to the project, which will be led by the University of Illinois ITI team and also involve researchers at Cornell University, Dartmouth College, and Washington State University. The Department of Energy and the Department of Homeland Security have pledged to join NSF in funding and managing the effort. The center will significantly improve the way the power grid cyber infrastructure is built, making it more secure, reliable and safe. Our quality of life is dependent on the continuous functioning of our nation's electric power infrastructure, and the functioning of the power infrastructure is dependent on the health of an underlying computing and communication network infrastructure that is at serious risk from both malicious cyber attacks and accidental failures. Industry studies suggest that the risk of future cyber attacks on the electric power grid cyber-infrastructure is significant, and that such attacks, if successful, could have severe consequences. The August 14, 2003 blackout demonstrated how quickly the failure and/or misbehavior of individual components (in that case, partially caused by software failure) can spread across a large geographical area. Furthermore, the constraints of the power system IT infrastructure, which include changing relationships among participants, increasing data volume, and rapid response requirements, are similar to those faced by many other critical networked information systems, so solutions for the power system IT infrastructure will have applicability to cyber infrastructures for other critical systems.
|Ji Sun Lee
Program Manager, Technology Acceptance & Integration
Human Factors, DHS
Establishing and Conducting a Community Perceptions of Technology Panel
|Biography: Ms. Ji Sun Lee is the Program Manager for the Community Perceptions of Technology Panel within the Human Factor’s Division of the Science and Technology Directorate of the Department of Homeland Security. The purpose of the Community Perceptions of Technology panel reviews is to provide program managers and others in the DHS community with insight into potential issues and problems that may be related to community perception and acceptance of a technology. These reviews are intended to capture diverse opinions so that Program Managers and customers may anticipate how communities will react to the development and deployment of particular technologies. She has 10 years of experience in international and comparative educational research and evaluations. She has worked in the former Soviet republics, Central and Far East Asia, South East Asia, and Western Europe evaluating educational programs, conducting researching on communities of practice, and lecturing on American constitutional law. She has also worked in Sub-Saharan and Southern Africa developing curricula and policy interventions on issues surrounding gender based violence. She is a doctoral candidate in International Educational Development at Teachers College, Columbia University, and she received her J.D. and B.A. from the College of William and Mary.