November 27-28, 2012 Dublin, Ireland Tuesday, November 27th 09:00 10:00 10:30 11:30 12:15 13:15 14:30 14:45 15:45 16:30 Registration, Coffee & Tea Introduction by Mr. Tom McDermott, Director of Research, Georgia Tech Research Institute Opening Keynote: Mr. John Grimes, Former Assistant Secretary of Defense for Networks and Information Integration, Chief Information Officer, Department of Defence Keynote Address: Mr. Alex Vandurme, Chief Engineer, NATO Computer Incident Response Capability (NCIRC) NCIRC Overview: The NCIRC is responsible for the cyber defense of all NATO sites, whether they are those of static HQs or HQs deployed for operations or exercises. It also offers cyber defense assistance to it member nations. Discover how NATO guards its networks against cyber-attacks, detect them, and – once they have happened - react swiftly to limit the damage. Insight into the Alliance’s nerve center in the fight against cyber-crime. Overview of NATO’s Rapid Reaction Team concept for assisting member states which ask for help in the event of an attack of national significance Learn about NCIRC’s Malware Information Sharing Platform (MISP) Networking Lunch (provided) Session 1: Thwarting Cyber Crime Discover the key priorities and challenges that business, government, law enforcement and security agencies face in thwarting cyber crime such as: balancing the openness of the Internet with cyber crime prevention policies, solutions to transborder access to data, and forensic capability requirements to support investigations in countering cyber crime. Session Chair: Mr. Pavel Gladyshev, University College Dublin Forensics Mr. Joep Gommers, iSight Dr. Maura Conway, Dublin City University Mr. Jaap Oss, Europol, European Cybercrime Centre, The Hague Prof. Sakir Sezer, Centre for Secure Information Technologies, Queen’s University Belfast Coffee & Tea Networking Break Deep Dive 1: “Incident Response – From Detection to Eradication” Dr. Fred Wright, Georgia Tech Research Institute Threats to network operations are continuing to evolve, incorporating zero-day exploits and covert communication channels. Threat actors are maintaining a constant presence on target networks, sometimes going dark for months before acting on objectives. In the face of such challenges, organizations need to evolve their network monitoring and incident response efforts to gain greater visibility and flexibility. This deep dive will focus on areas organizations can focus on to give their incident response teams a chance against the growing threat. Methodology: Why tracking all facets of an attack is important, and how it helps protect organizations from zeroday attacks Indicators of Compromise: A brief introduction to threat indicators Threat Intelligence: What data is out there to protect your environment? Monitoring Infrastructure: What data is necessary to detect and contain an intrusion? What is feasible to collect and visualize, and how can this data be operationalized effectively? Closing Keynote Address: Lord John Reid, former Home Secretary and Principal in the Chertoff Group Adjourn Wednesday, November 28th 08:30 09:00 15:45 Networking Breakfast (provided) Opening Keynote: Dr. Robert J. Elder, USAF Lt General (Ret.), Research Professor, George Mason University “Alternative Approaches to Leverage Cyberspace for National Security” Session 2: International Collaboration and Information Sharing This session discusses the key international challenges affecting cooperation and coordination of cyber policy and solutions. Understand how fostering strong public-private partnerships are a critical element in combatting the continually evolving threat posed by cyber attacks and the role industry and academia can play in creating strong international partnerships. Understand the difficulties in exchanging business and government cyber intelligence and how the outmoded bureaucratic barriers that slow us down can be removed. Session Chair: Mr. Jeff Evans, Georgia Tech Research Institute Mr. Ben Canino, United States Department of Homeland Security Mr. Brian Honan, Irish Reporting and Information Security Service, CERT Mr. Etienne DeBurgh, Financial Services Information Sharing and Analysis Center Mr. Philip Mills, Centre for Secure Information Technologies, Queen’s University Belfast Mr. Slawomir Grzonkowski, Digital Enterprise Research Institute, National University of Ireland Galway Coffee & Tea Networking Break Deep Dive 2: "Malicious Software Analysis and Threat Intelligence Sharing" Mr. Andrew Howard, Georgia Tech Research Institute Malicious code is one of the most common tools in breaching computer networks, despite continued efforts to improve detection and removal. State-sponsored malware has become increasingly difficult to prevent and mitigate due to the use of advanced data-stealing capabilities. Benefit from the opportunity to get the latest innovations on malware forensics and anti-malware techniques. Learn about an approach for community-driven threat intelligence to ensure that actionable intelligence disseminates quickly among organizations, ensuring rapid reaction to increasingly agile threats. This deep dive will: Describe methods for designing and implementing automated malware analysis systems Discuss reasons why building an automated environment is beneficial to any organization's incident response capability Enhance your understanding of technical solutions to anonymous sharing of community-driven threat intelligence Networking Lunch (provided) Keynote Address: Mr. Joe Weiss, Applied Control Solutions, LLC Building the Industrial Control Systems Cyber Security Workforce: The average life of an ICS system is typically about 815 years (INL, 2004) but we all know that individual devices can be out there a great lot longer, and that the chain is as strong as its weakest link… The reality is that most control systems engineers and operations teams have to make do with their legacy workstations and OSs, communications networks and field devices. In this unique session, you will learn about cyber-security risks that affect our world’s infrastructure and perhaps the weakest link in the chain—the lacking ICS cyber security workforce. Session 3: Building the Cyber Workforce Despite new approaches to network design and the latest in automated tools for detecting threats and defending networks, cyber security professionals are outflanked, outgunned, and often outwitted by very sophisticated and unknown enemies. This session discusses what must be done to expand and better prepare a more technically diverse cyber workforce and how leveraging industry, international partnerships, and especially academia is crucial to meeting the challenges of advanced persistent threats. Session Chair: Dr. Robert J. Elder, USAF Lt General (Ret.), Research Professor, George Mason University Mr. Joe Weiss, Applied Control Solutions, LLC Dr. James Breckenridge, Mercyhurst University Lt Col (S) Bryant Springer, US Army, Chief Intel Systems, USAFRICOM Mr. Colm Fagan, Espion Mr. Tahar Kechadi, University College Dublin Forensics Closing Keynote: Dr. Jack Callahan, Office of Naval Research Global 16:30 Adjourn 10:00 11:15 11:30 12:30 13:30 14:30