November 16-17, 2015

About | Agenda | Speaker Bios | Presentations


The Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C) Chief Technology Officer (CTO) is seeking presentations for the Secure and Resilient Cyber Ecosystem Message Fabric Focus Group Meeting. The purpose of the workshop is to promote technical exchange between Government and industry, identify solutions that achieve a secure and resilient cyber ecosystem, and promote solutions that align to the National Institute of Standards and Technology Cyber Security Framework.

Workshop themes for presentations include but are not limited to:

  • Assured communications: Ensure cross-enterprise communications networks are reliable, with possible alternative ways of moving information to be resilient.
  • Authentication: Support for trustworthy interoperability and automation.
  • Automation - Reduce threats and incident response times from months to milliseconds.
  • Common Data Models: Developing standards for data representation across a wide variety of secure and resilient tools and techniques to include sensors, sense-making, decision-support, and response/actuation.
  • Frameworks: New concepts in the interconnection and interoperability of security and resilient components to dramatically increase the capability and reduce the latency in the cyber ecosystem.
  • Information sharing: Move actionable information across the enterprise at machine speed, in ways that facilitate rapid dissemination with trust and anonymity (where appropriate), and to those who can do something with it.
  • Interoperability: Communicate between products, break down the stovepipes, and bring tools together, integrate them, and maintain the integrations.
  • Open APIs: Open interface specifications that promote the secure and resilient integration and operation of the cyber ecosystem across products and between enterprises.
  • Orchestration: Tools and techniques that are specifically designed to integrate other commercial products and solutions to form a secure and resilient interoperable system.
  • Policy: Local, national, or international policy issues and solutions that support development of a secure and resilient cyber ecosystem.
  • Protocols: New or modified protocols to communicate between components in a heterogeneous secure and resilient cyber ecosystem.
  • Resilient Communications: The integration of new resilient communications techniques and technologies to enable the coordination and resolution of incidents within the ecosystem.
  • Trust: Trust in knowing where information comes from and that those organizations did their due diligence.


Download Agenda (PDF)
Click on titles to view available abstracts.

Speaker Bios

Name Job Title Organization Bio
Dr. Phyllis A. Schneck Deputy Under Secretary for Cybersecurity National Protection and Programs Directorate
Department of Homeland Security
Dr. Phyllis Schneck serves as the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD). She is the chief cybersecurity official for the Department of Homeland Security (DHS) and supports its mission of strengthening the security and resilience of the nation's critical infrastructure.
Schneck came to DHS from McAfee, Inc., where she was Chief Technology Officer for Global Public Sector. Schneck served eight years as chairman of the National Board of Directors of the FBI's InfraGard program and founding president of InfraGard Atlanta.

Before joining McAfee, Schneck was vice president of Research Integration for Secure Computing, where she conceived and built the early intelligence practice into a full Beta program for data as a service. Prior, Schneck was the vice president Enterprise Services for eCommSecurity. Prior to that, she served as vice president of Corporate Strategy for SecureWorks, Inc., and was founder and chief executive officer of Avalon Communications, a provider of real-time security technology, since acquired by SecureWorks, Inc.
Schneck received her Ph.D. in Computer Science from Georgia Tech.
Dr. Peter Fonash Chief Technology Officer for the Office of Cybersecurity and Communications (CS&C) Department of Homeland Security Peter M. Fonash is the Chief Technology Officer for the Office of Cybersecurity and Communications (CS&C) at the Department of Homeland Security (DHS). He has previously held positions at CS&C as the Director of the National Communications System, Acting Director of the National Cyber Security Division, and Acting Deputy Assistant Secretary. Formerly, at the Defense Information Systems Agency he served as the Chief of the Advanced Technology Office and Chief of the Joint Combat Support Applications Division. Dr. Fonash received a Bachelor of Science in Electrical Engineering and a Master of Science in Engineering from the University of Pennsylvania; a Master of Business Administration from the University of Pennsylvania Wharton School; and a Ph.D. in Information Technology and Engineering from George Mason University.
Matthew Scholl Chief of the Computer Security Division NIST Matthew Scholl is the Chief of the Computer Security Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). His responsibilities include the Division's cybersecurity strategic direction and planning in Information Technology (IT) research and development, program coordination with other U.S. federal agencies, international engagements, Standards Development Organization strategy and coordination, and internal logistics and operations. In the Computer Security Division, focus areas include measures, metrics and programmatic guidance in information assurance and cybersecurity, cryptography, IT security test and validation, Federal Government agency security programs, creation of reference materials and security primitives and components. Also among his responsibilities are several national programs including the NIST responsibilities for the Executive Order - Improving Critical Infrastructure Cybersecurity and the National Initiative for Cybersecurity Education.
RADM Michael Brown (Ret.) VP & GM Global Public Sector, RSA Michael Brown, retired Rear Admiral of the U.S. Navy, is VP and GM of RSA's global public sector at RSA, the Security Division of EMC. In this role, he is spearheading strategy and engagement with the U.S. federal government, state and local governments, critical infrastructure organizations and international organizations. Brown joined RSA after serving over 31 years in the U.S. Navy, where he held significant cybersecurity leadership positions, within the Departments of Defense and Homeland Security. His last position was as the Director of cybersecurity coordination for DHS. He graduated from the U.S. Naval Academy in 1980 with a B.S. in Mathematics, holds an M.S. in systems engineering from the Naval Postgraduate School, and an M.A. from the Naval War College.
Dr. Thomas Longstaff Principal Cyber Strategist Resilient Cyber Systems Branch
Applied Physics Laboratory
Dr. Tom Longstaff is the Principal Cyber Strategist for the Resilient Cyber Systems Branch of the Applied Physics Laboratory. APL is a University Affiliated Research Center, a division of the Johns Hopkins University. Tom joined APL and works with a wide variety of projects on behalf of the US Government to include technology transition of cyber R&D, information assurance, security architecture, intelligence, and global information networks.
Tom's academic publications span topics such as malware analysis, information survivability, insider threat, and intrusion detection. Tom is Chair of the Computer Science, CyberSecurity, and Information Systems Engineering Programs at The Johns Hopkins University Whiting School of Engineering. Tom is an editor of the Computers and Security Journal.
Paul Nguyen CEO INVOTAS Paul Nguyen is Founder and CEO of Invotas and has been at the forefront of information security for more than 15 years. Paul is responsible for the overall executive oversight and leadership for the strategy and operations of the business. He brings a wide range of expertise in the cybersecurity arena including executive management as a former Chief Information Security Officer and specialties in security strategy, vulnerability and exploitation, research incident response, forensics, and security operations.
Paul brings a pedigree as a proven executive and technical practitioner with many leading cybersecurity firms including @stake, Symantec, Neohapsis, Deloitte, BearingPoint, and Knowledge Consulting Group (KCG).
Prior to Invotas, Paul served as the Vice President of Cyber Solutions for Knowledge Consulting Group where he led the Federal Civilian and Commercial consulting practice. In addition, he was responsible for the development and launch of leading edge solutions for customers across the public and private sector. His experience includes the management of several security operations centers for customers while providing incident response and forensics services.
Prior to KCG, Paul served in various roles as a vulnerability and exploitation practitioner with @stake, Symantec, and Neohapsis where he gained a deep understanding of the threat landscape and attack vectors through his client engagements and research.
Paul holds a Master of Science in IT Management and a Bachelor of Science in Business Administration-Finance from Carnegie Mellon University. He also holds accreditations as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified in Governance and Enterprise IT (CGEIT).
Gregg Tally   Johns Hopkins University Applied Physics Laboratory Gregg W. Tally, currently a member of the senior professional staff at the Johns Hopkins University Applied Physics Laboratory, has nearly 35 years of experience in information systems, including almost 20 years in information systems security as both a researcher and practitioner. He has worked in systems security analysis and engineering, security operations, and malicious code defense. His current area of interest is in integrated cyber defense architectures. Past sponsors have included the Department of Defense, intelligence community, and Department of Homeland Security. Prior to joining APL, he worked at United Parcel Service, Trusted Information Systems, McAfee, and SPARTA. He holds a Bachelor of Arts from Johns Hopkins University and Master of Science from Northwestern University.
Joseph Loomis Founder & CEO CyberSponse, Inc. Joseph Loomis is the Founder & CEO of CyberSponse. Joe is a proven serial security entrepreneur with successful startup exits and has provided security based technology for companies like Apple, Microsoft, Novartis, Sony, LG, Pfizer and many others. Mr. Loomis is well versed in Cyber Security methodologies, incident response, process automation and leverages his relationships to help define visionary and innovative product offerings for the information security sector. Joe is often seen speaking on national news networks to include CNBC, FOX & CNN. Joe works closely with multiple government agencies in his cooperative efforts combating Cybercrime and Cybersecurity. Joe is driven by a deep passion for helping others in need, mentoring other entrepreneurs and solving big problems with sophisticated technology. Over his career, Joe has served roles as a process production engineer, electrical engineer, network engineer, cyber technologist and cyber-crime investigator working with US Government agencies on early dark web take downs. Combining all these disciplines has allowed Joe, CyberSponse and their team to redefine the security operations center approach and methodology in today's market.
Jay Houghton CTO Firebind Jay Houghton, CTO and Founder of Firebind Inc., has led the development and architecture for high performance servers and systems for financial, network management and enterprise applications. Jay has held executive leadership and engineering positions in several technology organizations, including Lime Brokerage, Magnasource, Lucent, Sun Microsystems, United Technologies Corp., and Digital Equipment Corporation. Jay is a graduate of the University of Massachusetts at Amherst with degrees in Electrical Engineering and Applied Mathematics.
Tim Owen Chief Engineer, Director of Advanced Programs Parsons Tim Owen is Chief Engineer and Director of Advanced Programs for Secure Mission Solutions, a Parsons company. Tim has been serving the Federal government, commercial, and academic communities in developing network and security architectures, methodologies, and technological advancements for well over 25 years. His expertise has been incorporated or cited in federal and international standards and publications on everything from next generation Internet protocols, computing architectures, cloud and mobility, the Internet of Things, Industrial Control Systems (ICS, I&E, BAMS, CI), heuristics/behavioral analytics and advanced algorithms to encryption, dynamic and resilient networks, intrusion management, and security and networking research & development, among others. His work has also contributed to frameworks for many initiatives in and out of government, including Presidential Directives and investment strategies, Federal CIO Council guidance, DoD guidance, and commercial services offerings. As Solutions Architect for Parsons/SMS, Tim continues to help provide engineering, operations, and policy solutions for DHS, DoD, the Intelligence Community, and Civilian agencies as well as multiple commercial sectors including finance, transportation, and energy.
Richard Struse Chief Advanced Technology Officer DHS Mr. Struse serves as the Chief Advanced Technology Officer for the U.S. Department of Homeland Security's National Cybersecurity and Communications Integration Center (NCCIC) where he is responsible for technology vision, strategy and implementation in support of the NCCIC's mission. Mr. Struse is the creator of the STIX and TAXII automated information sharing initiatives which have been widely adopted across the public and private sectors. In October 2014, Secretary of Homeland Security Jeh Johnson presented Mr. Struse with one of the department's highest honors, the Secretary's Award for Excellence, in recognition of his pioneering work on STIX and TAXII.
Prior to joining DHS, Mr. Struse was Vice President of Research and Development at VOXEM, Inc., where he was responsible for the architecture, design and development of a high-performance, extreme high-reliability communications software platform that is in use in telecommunications systems around the world. He began his technical career at Bell Laboratories where his work focused on tools to automate software development and the UNIX operating system.
In 2015 Mr. Struse was named by Federal Computer Week as one of the "Federal 100" in recognition of his leadership role in the development of cyber threat intelligence technology standards.
James R. Rutherford Manager, Mission Development and Management Defense and Intelligence Solutions Division Southwest Research Institute James Rutherford is the Manager of Mission Development and Management in the Defense and Intelligence Solutions Division at Southwest Research Institute. He has been working with the University of Texas at San Antonio Center for Information Assurance and Security in developing the Honey Community concept. Today, he will discuss the Honey Community which is a concept for sharing information between respective parts of a local community to determine cyber threats.
Tieu Luu and Jay Ruhnke Senior Director, Advanced Technology Group

Senior Architect in the Advanced Technology Group
SuprTEK Tieu Luu is the Senior Director of the Advanced Technology Group at SuprTEK. Tieu leads the company's R&D efforts to develop new products and capabilities across the cyber security, healthcare and defense mission areas.

Mr. Jay Ruhnke is Senior Architect in the Advanced Technology Group at SuprTEK. Jay has over 21 years of experience in the technology field and has built several cyber security systems for customers such as Department of Defense, DISA, Defense Logistics Agency, and the US Navy.
Ehab Al-Shaer(1)(2), Bill Chu(1) Professor(1), Director(2) (1) University of North Carolina Charlotte, (2) RTI International Ehab Al-Shaer is a Professor in Computer Science, the director of the Cyber Defense and Network Assurability (CyberDNA) Center, and the director of NSF IUCRC Center on Security Configuration Analytics and Automation inUNC Charlotte. His area of research expertise include cyber analytics, security automation, configuration verification and hardening, security and resiliency for smart grid security, and cyber agility. Dr. Al-Shaer has edited/co-edited more than 12 books and book chapters, and published about 170 refereed journals and conferences papers in his area. He was designated as a Subject Matter Expert(SME) in the area of security configuration analytics and automation in Information Assurance Newsletter published by DoD in 2011I was the General Chair of ACM Computer and Communication in 2009 and 2010 and NSF Workshop in Assurable and Usable Security Configuration in 2008. Dr. Al-Shaer was also the PC chair for many other conferences and workshops including ACM/IEEE SafeConfig 2009 and 2013, IEEE Integrated Management 2007, IEEE POLICY 2008, and others.

Bill Chu received his Ph.D. in Computer Science from the University of Maryland at College Park. He is currently Professor of Software and Information Systems at the University of North Carolina at Charlotte. His research interests include application security, network security, cyber intelligence, and cybersecurity education. He is associate director of the Center of Configuration Analytics and Automation, a industry and university collaborative research center focused on cyber security. In that capacity, he has worked with financial service to conduct research in cyber threat intelligence sharing and ways to automate cyber defense based on shared information.
Pat Muoio Director of Research and Development G2, Inc. As Director of Research and Development at G2, Ms. Muoio advises on technical strategic direction; runs the research line of business; and builds connections between G2 and external research organizations in industry, academia, and government. Prior to joining G2, Ms. Muoio worked for 30 years at the National Security Agency in a variety of technical leadership roles, most recently as the Chief of the Trusted Systems Research Group. Her details to the NRO and the ODNI added breadth to her understanding of the technical needs of the Intelligence Community. Ms. Muoio is also a venture partner at Sinewave Ventures which is committed to bringing novel commercial technology in the public sector, She has a BA from Fordham University and a PhD from Yale University, both in Philosophy.
Steve Klos Executive Director TagVault Steve Klos is the Vice President for Software Asset Optimization for 1E and the Executive Director for, the non-profit organization providing technical support, tools and certification services for organizations that want to streamline the creation of industry normalized SWID tag implementations. He is the convener and editor of the ISO/IEC published SWID tagging standard (technically known as ISO/IEC 19770-2). Steve is a member of the U.S. Technical Advisory Group and is heavily involved in ISO's JTC1 SC7 working group 21 – which is focused on both process and technical ITAM standards. Steve also supports the efforts between and numerous other standards development organizations including the DMTF, the Industry Connections Security Group (ICSG) within the IEEE, the IETF, NIST, and the Trusted Computing Group. Steve's efforts in the commercial world with 1E reflect his deep seated interest in improving automation IT Systems Management within Enterprise level organizations.
Charles Schmidt Principal Cyber Security Engineer The MITRE Corporation Charles Schmidt is a Principal Information Security Engineer at the MITRE Corporation. In his 15 years at MITRE he has worked on a range of topics including autonomous agents, security policy development, cyber attack characterization, cyber resiliency techniques, and security automation. Charles holds a Bachelors degree in both Mathematics and Computer Science from Carleton College and a Masters degree in Computer Science from the University of Utah.
Gideon Goldman
Gay Adams
Gideon Goldman, Principal Product Manager
Gay Adams, District Manager
Informatica LLC Gideon Goldman holds a bachelor's degree in Mathematics and Computer Science from the University of Illinois. He started his career at 29West, a start-up specializing in high-performance data transport (messaging middleware) for capital markets high-frequency electronic trading. At 29West, Gideon contributed to product development, customer enablement and sales engineering. Following the acquisition of 29West by Informatica in 2010 (a market-leader in multiple categories including cloud integration, data archiving and application retirement, data integration, data quality, data masking, data security and master data management), Gideon transitioned to a product management role overseeing the 29West portfolio, now known as Ultra Messaging. Over the past five years, Gideon has engaged with customers and prospects to define product strategy and a roadmap of continuous innovation focused on the requirements of capital markets. Since 2012, the introduction of a new software message routing capability for intelligently bridging data across Wide Area Networks has contributed to widespread adoption of Ultra Messaging for Foreign Exchange trading to move transactions totaling more than one trillion dollars per day. Because Ultra Messaging supports multiple messaging semantics (publish/subscribe, request/response, and queuing), multiple data transport protocols (unicast, multicast and inter-process) and multiple qualities of service (reliable, durable/guaranteed, and once-and-only-once), it addresses a wide array of use cases in electronic trading, including the distribution of market data (a one-to-many pattern) and the handling of transactions (orders) both for brokers, hedge funds and proprietary traders and within exchanges and other trading venues. As the Ultra Messaging products are differentiated by a modern peer-to-peer architecture that eliminates messaging daemons and brokers (reducing infrastructure costs and improving latency, throughput, scalability, resiliency, and availability), Ultra Messaging has found additional applications beyond capital markets, such as enabling data collection for streaming analytics through a product introduced in 2013 called Vibe Data Stream. In 2014, Gideon defined a roadmap for supporting standards-based protocols and APIs such as the Advanced Message Queuing Protocol (AMQP) and Java Message Service (JMS). In recent months, prompted by emerging customer requirements as well as his involvement in the Active Cyber Defense initiative sponsored by the NSA and DHS, Gideon has prioritized security investments for the products he manages and has sought to learn more about cyber security and how it relates to his products and customers.

Gay Adams has been providing the Federal Government with software and services solutions for 25 years and has been with Informatica for 9 years. Her role is to find use cases that can benefit from Informatica technology purposed for new applications and to see those requirements through to delivery into Production systems. She is the lead for Informatica's Cyber engagement at John's Hopkins Applied Physics Lab and other such endeavors. Gay is a graduate of Clemson University Summa Cum Laude.
Carey Nachenberg Fellow and Vice President Symantec Corp. Carey Nachenberg, Vice President, Fellow and Chief Architect of Symantec's office of the CTO, has been an innovator at Symantec for the past twenty years. As Chief Architect, Carey drives the technical strategy for all of Symantec's core security technologies and security content. He has led the design and development of Symantec's core antimalware, intrusion prevention and reputation-based security technologies; his work in these areas have garnered over eighty-five United States patents. In addition to his work in the cyber-security field, Carey has also recently published his first novel, a cyber-security thriller entitled "The Florentine Deception, and is donating all proceeds from sales of the novel to charities supporting underserved students and veterans. Carey holds BS and MS degrees in Computer Science and Engineering from University of California at Los Angeles, where he continues to serve as Adjunct Professor of Computer Science.
Kevin Fealey and Tony Miller Principal Consultant, Automation & Integration Services Aspect Security Kevin Fealey is a Principal Consultant and lead of Aspect Security's Automation & Integration Services Division. He specializes in automating commercial, open source, and custom tools to provide faster security feedback to developers and real-time security dashboards to executives. Kevin strives to minimize disruptions to existing developer processes by integrating security transparently into the development process. He has spoken at several conferences around the US about how tools can be used as part of a scalable, efficient, and effective security program.

Tony Miller is a Principal Application Security Consultant and Practice Leader for the Program Services Division at Aspect Security. He has over a decade of experience building and enhancing vulnerability management programs and Secure SDLC, aided by his previous experience as a software developer in the Financial Services sector. Tony specializes in assessing the current capability of Application Security programs, developing and implementing improvement plans, conducting architecture and threat modeling reviews, and providing guidance for improving Secure SDLC processes.
Kent Landfield Director of Standards and Technology Policy Intel Corporation Kent Landfield has spent 30+ years in software development, global network operations and network and cybersecurity security arenas. Kent is currently Director of Standards and Technology Policy for Intel. He has been extremely active in the NIST National Cybersecurity Framework development, participating in all workshops as well as writing RFI and draft comments, and participates in the U.S. President's National Security Telecommunications Advisory Committee (NSTAC) efforts. He is also currently involved in threat and information sharing efforts.

Previously he was Director of Content Strategy, Architecture and Standards for McAfee Labs and was the McAfee Labs Vulnerability Group Architect as well as one of McAfee's Principal Architects. Kent also managed the global Risk and Compliance Security Research teams. He has been actively involved in global security automation development efforts for many years. He was one of the founding members of the CVE Editorial Board. Kent is also an OVAL Board member and is highly active in SCAP related development projects, both from a content and product perspective. In addition, Kent holds patents in DNS, Email and software patch distribution technologies
Richard Graubart Senior Principal Cybersecurity Engineer The MITRE Corporation Richard Graubart is a Senior Principal Information Security Engineer at the MITRE Corporation, with over 35 years of cyber security experience. He has worked in multiple areas of cyber security including data base management security, healthcare information system security, operating system access control, biometrics, and mission assurance engineering. His primary focus areas for the last few years has been cyber resiliency, where he has supported some of the seminal work, and cyber security policy, helping author key documents such DCID 6/3, NIST 800-37, NIST 800-39 and NIST 800-53. Richard received both his Bachelor of Computer Science and Engineering and his Master of Computer and Information Science from the University of Pennsylvania.
Paul Grassi   NIST Paul Grassi is the Senior Standards and Technology Advisor at the National Institute of Standards and Technology (NIST). He joined NIST in June 2014 to advance and accelerate the development and adoption of identity authentication and authorization related standards and technologies needed to implement the identity ecosystem envisioned in the National Strategy for Trusted Identities in Cyberspace (NSTIC). Paul has a broad background of technology and management consulting, and significant experience developing enterprise security strategies and systems, having served a range of Fortune 500 companies, as well as domestic and foreign governments.



Monday November 16th

Plenary Session

0915-1000 Overview of a Secure and Resilient Cyber Ecosystem Dr. Peter Fonash, Chief Technology Officer, Office of Cybersecurity and Communications, DHS Not available

Track 1 Automation / Orchestration

1030-1100 Proposed Capability-Based Reference Architecture for Real-Time Network Defense Gregg Tally, JHU/APL Download Presentation
1100-1130 Automate or Die! - Real-world Use Cases for Leveraging Security Automation and Orchestration Paul Nguyen, INVOTAS Download Presentation
1130-1200 Continuous Empirical Validation of Network Security Controls Jay Houghton, Firebind  Download Presentation
1200-1330 Break for Lunch    
1330-1400 Building a User Driven Automation Eco-System Joseph Loomis, CyberSponse (Demo) Not available
1400-1430 What's the Score? A Decade of Continuous Pervasive Security Assessment and Risk-Based Situational Awareness Tim Owen, Parsons    Please contact
1430-1500 Discussion    

Track 2: Information Sharing

1030-1100 STIX/TAXII:  Powering the Cyber Threat Intelligence Ecosystem Richard Struse, DHS Not available
1100-1130 Protecting Large Organizations and Communities through the Use of a Honey Community James R. Rutherford, Southwest Research Institute Download Presentation
1130-1200 The Sweet Spot of Cyber Intelligence Tieu Luu and Jay Ruhnke, SuprTEK Download Presentation
1200-1330 Break for Lunch    
1330-1400  STIX Analytics - From Threat Information Sharing to Automated Response Ehab Al-Shaer and Bill Chu, University of North Carolina Charlotte and RTI International  Download Presentation
1400-1430 An Open Source Command and Control Language for Resilient Cybersystems
Pat Muoio, G2 Download Presentation
1430-1500 Discussion    

Plenary Session

1530-1615 Lessons Learned from IACD Spirals Dr. Thomas Longstaff, JHU/APL Not available
1615-1700 Keynote: Deputy Under Secretary Dr. Phyllis Schneck, National Protection and Programs Directorate, DHS   Not available

Tuesday November 17th

Plenary Session

0915-1000 Secure and Resilient Cyber Ecosystem: A Provider Perspective RADM Michael Brown (Ret.), VP & GM, Global Public Sector, RSA Not available

Track 3: Interoperability / Common Data Model

1030-1100 Software Identity Tags: An Interoperability Standard for Information about Software Products Steve Klos, TagVault    Download Presentation
1100-1130 Trusted Network Communications and Security Automation Charles Schmidt, The MITRE Corporation Download Presentation
1130-1200 Cyber Integration, Message Fabric and Streaming Analytics Gideon Goldman and Gay Adams, Informatica LLC Download Presentation
1200-1330 Break for Lunch    
1330-1400 An Overview of Symantec's Unified Security Approach and its Implications for the Resilient Cyber Ecosystem Carey Nachenberg, Symantec Corp.  Not available
1400-1430  Discussion    

Track 4: Architectures / Frameworks

1030-1100 Achieving Visible Security at Scale with the NIST Cybersecurity Framework Kevin Fealey and Tony Miller, Aspect Security Download Presentation
1100-1130 Implementing the US Cyber Security Framework at Intel: A Case Study Kent Landfield, Intel Corporation Download Presentation
1130-1200 Cyber Resiliency Engineering Framework Richard Graubart, The MITRE Corporation Download Presentation
1200-1330 Break for Lunch    
1330-1400 The Identity Ecosystem Framework (IDEF) Paul Grassi, NIST Download Presentation
1400-1430 Discussion    

Plenary Session

1500-1600 Track Report-Outs    Not available
1600-1615 Significant Conclusions and Closing Remarks Dr. Peter Fonash, Chief Technology Officer, Office of Cybersecurity and Communications, DHS Not available