EMBRY-RIDDLE AERONAUTICAL UNIVERSITY
& CYBER INTELLIGENT PARTNERS
PRESENT THE INAUGURAL
CYBER INTELLIGENCE READINESS WORKSHOP
September 20, 2018 | 8:30am-6:30pm | The Ritz Carlton Tysons Corner | McLean, VA
OUR 2018 WORKSHOP AGENDA
8:00AM - Registration and Coffee
8:30AM - Welcome and Program Introduction – Michelle Watson, President, Cyber Intelligent Partners
8:45AM - Cyber Intelligence - A Strategic & Operational Approach – Dr. Jon Haass, Dean, College of Security and Intelligence, Embry Riddle Aeronautical University (ERAU)
Every company and sector is a potential target for the adversary, developing and deploying a strategic and operational Cyber Intelligence program is critical to move beyond reactive and slow defense only implementations.
Pivot from simple framework to resiliency oriented – proactive stance.
How does Cyber Intelligence show up? in the changing and competitive global environment?
What is the framework that experts are offering and that will be explored today?
What are the innovation areas being explored in Academia and Embry-Riddle – block chain, machine learning and AI, simulation science and data science.
9:30AM - Cyber Assessment Tools: Review, Evaluation, Recommendation – Daryl Haegley, GICSP, OCP
Implementing relevant cyber security programs requires identifying, prioritizing and managing organizational risk.
Increasing connectedness creates challenging environments to make informed risk decisions.
Many frameworks and self- assessment tools evaluate your organization’s compliance, not performance.
Comparative review of prominent cyber self-evaluation tools and reveal application benefits and shortfalls.
Identify a gap evident in all of them: An integrated intelligence function.
10:15AM - Coffee Break
10:30AM - Establishing a State of Readiness – Don DeBolt, Senior Manager, Education and Training Division at Mandiant, a FireEye Company
Today’s cyber threats are dynamic and constant. Companies and governments are finding it difficult to keep up with the changing threat environment. We look at this problem and share how the combination of proven experiential learning methods, the latest cyber intelligence, and periodic exercises can establish a state of preparedness for current and future cyber threats.
Understand where current training strategies fall short.
Get inspired and learn from other high stress, high intensity disciplines.
Learn the key role cyber intelligence plays in establishing a state of readiness.
11:15AM - Intro and Set-up – Cyber Analytical War Game – Dr. Chris Lew, Water Dragons Consulting (WDC)
Attendees will participate in a mini-session of the proprietary software based, “Analytical War Game-Cyber” in which they will conduct all-source strategic and tactical cyber intelligence analysis within a simulated, real-world cyber-focused scenario.
War game revolves around a team effort to transform raw, technical cyber information into strategic recommendations and actionable intelligence for high-level decision makers.
12:00PM - Boxed Lunch - working through set-up.
12:15-2:15PM - Cyber Analytical War Game Simulation - Dr. Chris Lew, WDC
Participants will understand and interpret malicious cyber actor tactics, techniques, and procedures, and integrate with political, economic, and social factors - to determine the overall strategic picture and conduct predictive analysis.
Participants will employ individual intelligence tradecraft skills.
Conclude with After Action Review focusing on how participants navigated the scenario, as well as how effectively the principles of information sharing, analysis, and dissemination were applied.
2:15PM - Coffee Break
2:30PM - Active Defense Discussion – Martin Hellmer, FBI Special Agent and Cybersquad Supervisor
Cyber Intelligence requires the collection of data from numerous sources – information sharing, large volume network and application data, and open source repositories. The spectrum of activities that are possible grow as techniques are developed by the private sector for government and other uses.
Learn where the boundaries lie for deployment of solutions that could be perceived as hacking back, currently limited to certain authorized groups in the US.
Listen and learn from the FBI Cyber Team about activities that are being used to stretch beyond the US borders for intelligence gathering and take downs.
Understand the partnership possibilities with government agencies before the knock comes on the door – “you’ve been breached by …”
3:15PM - “Cyber Intelligence in an Era of Great-Power Competition” - Barry Pavel, Senior VP, Atlantic Council and Director of the Scowcroft Center for Strategy and Security
We're on the cusp of the digital age, and we are entering a new era of great-power competition. As new digital-based technologies including artificial intelligence continue to unfold, their applications will greatly affect the contours and use of cyberspace by a wide range of actors. Powerful state actors will continue to use cyberspace as an important tool to achieve domestic and, increasingly, geopolitical objectives. This discussion will frame the context for the ongoing evolution of the cyberspace domain.
3:45PM - "Ask the Experts Fireside Chat" - Current and Future Cyber Intelligence Challenges: Featuring Michael Allen, Managing Director, Beacon Global Strategies and former National Security Council Senior Director. Moderated by Christopher Porter, Chief Intelligence Strategist, FireEye.
Nation State Case Studies
AI and Emerging technologies
Cyber Intelligence in 2028: A Look at Coming Tradecraft Changes
4:30PM - CLOSING KEYNOTE - “The Cyber Threatscape: What are the Key Trends in Cybersecurity?” - Peter W Singer, Author
From ransomware to the collapse of cyber deterrence, a series of new threats are changing the cybersecurity landscape. A best selling author described by the Wall Street Journal as "one of Washington's pre-eminent futurists," and a consultant for groups that range from the CIA and the Chairman of the Joint Chiefs to Hollywood, Singer uses an exciting speaking style to explore for an audience the key trends emerging today that will shape the world of cybersecurity tomorrow. http://pwsinger.com/biography.html
5:15PM - Wrap-up and Concluding Comments – Michelle Watson and Jon Haass
5:30-6:30PM - Networking and Cocktail Reception – Ritz Carlton Ballroom