2010 Workshop on Cyber Security and Global Affairs

&

Security Confabulation IV

with focus on

International Cyber Security Governance Including Low Resource Environments - Human Factors, Policy and Technology
,


International Cyber Center
George Mason University, Fairfax, VA, USA

In Cooperation With




Location: ETH (Swiss Federal Institute of Technology), Zurich

July 7 to July 9, 2010

Sponsored By Office of Naval Research


Workshop Corporate Sponsors

                                              
                                   

            

                                                              
     
                  

             
       
                
    
    
                    
                                                                                                      
        
         
                               

ICC Corporate Patrons: Lockheed Martin Corporation; Sallie Mae Corporation

The International Cyber Center at GMU and Center for Security Studies, ETH, Zurich, Switzerland are jointly organizing the Second Workshop on Cyber Security and Global Affairs.  This program will take an interdisciplinary view of cyber security and related global issues.  We will have two types of sessions – plenary sessions and break-out sessions.  The plenary presentations will involve a mix of invited speakers and active discussion among the attendees.  The program is structured to facilitate participant interaction. We plan on a session which will facilitate interaction in small groups.  Except for the break-out sessions there will be no parallel sessions

Workshop Venue

The meetings will be held at the ETH (Swiss Federal Institute of Technology) main building (“Hauptgebäude”) located on the ETH central campus in Zurich, Switzerland.  The campus is located in the heart of Zurich – with excellent views of the city, Lake Zurich, and the Swiss Alps. It is within walking distance of the Zurich main train station (“Hauptbahnhof”), the old town, and other key sights and attractions. For a map click here

For additional Logistical Information click here.

Who should attend

We invite participation of students, faculty, corporate executives, senior government officials, and executives from international organizations.  This is meant to be an interdisciplinary workshop.  Participants with technology, strategy, and law enforcement backgrounds are encouraged to attend.

Workshop Program and Agenda - Now Available

Keynote Speakers

The following speakers have accepted our invitation to speak at the workshop.

  • Scott Borg
    • "Regional Cyber Conflicts and Their Implications for Global Cyber Security"
  • Nils Puhlmann

Contributing Speakers

  • Rich Baich
    • "Developing a Cyber Threat Intelligence Capability"
  • Roberto BaldoniProfessor, University of Rome, Rome, Italy
    • "Information Sharing for the Financial IT Infrastructure: Opportunities and Technological Challenges"
  • David Coleman
    • "Information Sharing Effectiveness and Organizational Impact in the Federal Sector"
  • Pa Sara Drammeh
    • "Cybercrime in third world countries especially inside Africa"   
  • Steven Elefant
    • "Realizing Payments Security through Encryption and Tokenization"
  • Kah-Kin Ho
    • "Hacked While Browsing. Using the Web to Spread Malware"
  • Terry Janssen
    • "Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security"
  • Max Kilger
    • "Motivations for Malicious Online Behavior and Consequent Emerging Cross-National Cyber Threats"
  • O B Longe
    • "Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security"
  • Jesus Luna
    • "Towards Cloud-based Intelligence Services: an IP Reputation system to detect financial drones"
  • David McCue
    • "Real World Issues in Managing Cyber in a Global Enterprise"
  • Tom Patterson
    • "Payment System Security vs. Advanced Persistent Threats"
  • Nathaniel Puffer
    • "APT in Corporate America and the Exposure to Foothold Scenarios"
  • Andy Purdy
    • "A Global, Strategic Approach to Cyber Crime"
  • Jim Reavis
    • "Cloud Computing: Critical Threats and Global Security Initiatives
  • Roland Rieke
    • "Challenges for Systems of Systems Security Information and Event Management
  • Alex Shipp
    • "Learning from the bad guys is learning from the best"
  • Rajiv Sinha
    • " 'Education, Empowerment, Enforcement' - Ingredients for high quality software "
  • Arun Sood
    • "Intrusion Tolerance to Mitigate Attacks that Persist"
  • Manuel Suter
    • "Unpacking Public-Private Partnerships: Identifying Differences, Challenges and Practices of Collaboration in Cyber Security"
  • Anthony Walsh
    • "Cyber Threat Intelligence - Actionable and effective cyber security"
  • Bob West
    • "Information Integrity - the Missing Link
  • John Wyatt
    • "BSIMM2 – The Building Security in Maturity Model"
  • Elad Yoran
    • "Security: Emerging from the Black Hole of Innovation

Organizing Committee

Jerry Archer, Senior Vice President and Chief Security Officer, Sallie Mae

Dr. Myriam Dunn Cavelty, Head New Risks Research Unit, Center for Security Studies, ETH Zurich

Dr. Stuart Malawer, Distinguished Service Professor of Law and International Trade, George Mason University

Andy Purdy, Chief Cybersecurity Strategist, CSC

Katie Kendal Richards, Advisory Board, Fair Winds Partners

Dr. Arun Sood, Professor Computer Science and Co-Director International Cyber Center, George Mason University - Organization Committee Chair {asood at gmu dot edu}

Moderator

Other Attendees
Workshop Topics

In general, the workshop will deal with strategic, policy, technology and global issues.  The cyber security threat is not constrained by national boundaries.  Thus, the international implications of the security and privacy issues is very important in this workshop. 

Some of the topics to be covered in the workshop are:

  1. International Cyber Security Governance
  2. Policy, technology, human factors in cyber security
  3. Cyber warfare, intelligence, defense and preparedness 
  4. Cyber risk assessment and reduction 
  5. International standards of privacy 
  6. Cyber crime and other malicious activity 
  7. Intellectual Property Rights protection


Call for Papers

Participants in this workshop is by invitation.  Participants will have an opportunity to participate actively in the discussions, make presentations during the plenary sessions or in the break out sessions.  Interested participants should submit a one page abstract for evaluation by the workshop organizing committee.  The abstract submission and processing schedule is:

Abstract due                            - 28 May 2010

Selection and notification          -  7 June 2010

Full paper                                - 28 June 2010

Email the abstracts to Dr Arun Sood - asood (at) gmu (dot) edu


Registration

Registration is now closed.


Scholarships

The workshop organizers expect that they will be able to offer scholarships to a few attendees.  The scholarship will partially cover the costs in connection with the workshop. Please contact Dr. Arun Sood: asood (at) gmu (dot) edu.



 

Subpages (56): View All