Cybersecurity Hard Problems Spring 2014 Workshop The Cyber Research Institute with support and participation from the Griffiss Institute and the Air Force Research Laboratory Information Institute is sponsoring a leading edge workshop on “Cybersecurity Hard Problems.” The purpose of this workshop is to bring together distinguished researchers and domain experts for a two-day period to examine, discuss, and propose solutions to the most pressing issues in cybersecurity today. The two-day workshop will be held at the Griffiss Institute in Rome, New York on March 19th and 20th, 2014. Cybersecurity is a dynamic and ever changing field. In today’s information intensive environment, cyber-related incidents are on the rise. Our national security, personal safety, and economic health are at risk. The cyber threat that exists today is highly sophisticated and quite capable. Whether it’s hacking, white collar crime, fraud, identity theft, or stealing proprietary information, today’s threat is very serious. This threat ranges from basic hackers to organized cybercrime groups to terrorists to well-funded nation state actors. So many cybersecurity challenges exist today that must be solved. New connected technologies present unique challenges for the security sector. Recently, we have seen a proliferation of Internet connected devices such as automobiles, set-top boxes, home appliances, and energy consuming devices on a smart-grid. These devices pose quite a challenge to the cybersecurity community. Likewise, the finance and service sectors have new challenges such as big data protection, on-line currency, and mobile application security. Even manufacturing products have unique challenges today in trusting the source of the components. Securing the supply chain is critical for so many reasons. Another interesting aspect of cybersecurity is that cyber-based attacks, using malicious computer software, can do physical damage in the real world. National critical infrastructure systems, including the electric power grid, oil and gas plants, water treatment facilities, and nuclear systems are run by supervisory control and data acquisition (SCADA) systems. SCADA systems control complex critical infrastructure functions like detecting current flow and line voltage, opening and closing valves, regulating traffic lights, and monitoring and regulating water flow. Stuxnet is a recent worked example of what is now possible in the realm of cyberspace; the ability to use software to create damaging real-world effects. Each of the above challenges has an impact on Department of Defense technology and programs. This invitation-only workshop brings together the some of the best minds to identify some of the hardest cybersecurity challenge problems that intersect Department of Defense interests with those of industry, critical infrastructures, and academia. During the workshop, participants will be assigned to groups to address cybersecurity needs for the following domains and areas: Military (including defense and intelligence) Law enforcement Industrial control systems and SCADA Transportation (including air, rail and automotive) Financial Healthcare The tentative structure of the workshop is as follows: DAY 1: 8:00: Registration Attendees will check in and have the opportunity to briefly introduce themselves to other attendees and individuals associated with the Griffiss Institute and AFRL. 8:30 – 11:30: Opening Keynote Addresses During this beginning half of day 1, several cyber leaders will be introduced and will speak on behalf of the Cyber Research Institute, Griffiss Institute, and Information Institute. These cyber leaders will address cybersecurity needs in the following domains and will familiarize attendees with the organization and hard problems. •Military (including defense and intelligence) •Law enforcement •Industrial control systems and SCADA •Transportation (including air, rail and automotive) •Financial •Healthcare 11:30-12:30: Break for Lunch Attendees will break for lunch. 12:30- 3:30: Group Work The second half of the day will be allotted to break attendees into the groups based on the previously chosen domain topics listed above. Members of each group will examine their assigned area from a technological perspective. They will also be encouraged to discuss what threats and vulnerabilities are within the specific topic areas and to identify what hard problems each area faces in both the present and future. DAY 2: 8:30- 9:45 Group work wrap-up Before the groups are to present their findings to the rest of the attendees, they will briefly wrap up what was discussed and assessed on day 1 and will organize a 30 minute presentation reflecting on their priority issues of interest recommended for future research. 9:45-10:00 Short Break 10:00-11:30 Group Presentations 10:00-10:30 Group 1 Presentation 10:30-11:00 Group 2 Presentation 11:00-11:30 Group 3 Presentation 11:30-12:30: Break for lunch 12:30-2:00 Group Presentations 12:30-1:00 Group 4 Presentation 1:00-1:30 Group 5 Presentation 1:30-2:00 Group 6 Presentation 2:00-2:15 Short Break 2:15 -3:00 Conclusions and Closeout The last remarks will be given summarizing key topics and recommendations discussed on both day 1 and 2 of the cybersecurity hard problem workshop. If you are able to attend the workshop, please contact the workshop organizer at [email protected]. Also, please cc Ms. Kelly Boek at [email protected] .When you reply please let us know the top two areas that you have interest in. When you show up to the workshop, we’ll do our best to assign you to one of the groups that you have chosen. It is anticipated that the output of the workshop will be a report that will be used to drive future funded research and development activities in this critically important area. The Cyber Research Institute intends to fund a few teams to continue investigating critical cyber problems. This may include an intense summer research program with CRI, AFRL and academic and industry researchers. If you have any questions please feel free to contact me. Sincerely, Joe Giordano Workshop Organizer
© Copyright 2025 Paperzz