Monday, April 24, 2017
REGISTRATION FOR THE 2017 CONFERENCE IS FULL
To be placed on our waiting list, please email firstname.lastname@example.org
Georgetown University's seventh annual International Conference on Cyber Engagement will take place on Monday, April 24, 2017 in Gaston Hall on the Third Floor of Healy Hall. This gathering promotes dialogue among policymakers, academics, and key industry stakeholders from across the globe, and explores the worldwide community’s increasing interconnectivity in this domain.
Drawing on the experience of government practitioners, industry representatives and academic scholars, this event brings a multidisciplinary and international approach to the challenges in cyberspace from technical, corporate, legal, and policy perspectives in both the United States domestic and international realms – with several topics targeting private sector interests. The 2016 conference covered: National Cyber Readiness, Cyber Accountability, International Norms, Deterrence, Critical Infrastructure Protection, Wassenaar Arrangement, EU-US Privacy Shield, Encryption and Deterrence.
Past speakers have included: Director/FBI, the White House Cybersecurity Coordinator, Deputy Secretaries from the US Departments of Homeland Security and the Department of Defense, the former and current Directors of the NSA and DNI, the cyber coordinator for the State Department, the President and Secretary General of INTERPOL, Executive Director of INTERPOL’s Global Complex for Innovation, the ICANN Chairman of the Board, the UN High Representative for Disarmament Affairs, international representatives from the Netherlands, Switzerland, China, Japan, Singapore, Israel, Italy, France, the UK, Estonia, South Korea, Germany, Romania, Hungary, Russia and Pakistan among others, senior leaders from the US Cyber Command, FCC, FBI, DHS, NSA, and CIA and leading private industry experts.
Mr. Misha Glenny | Author of DarkMarket and Consultant
Mr. Rafal Rohozinski | Principal and Executive Director, SecDev Group, Canada
Mr. Robert Joyce | Special Assistant to the President and Cybersecurity Coordinator, The White House
Mr. Ciaran Martin | CEO, National Cyber Security Centre, UK
Ms. Marietje Schaake | Member of the European Parliament (ALDE); Commissioner, Global Commission on the Stability of Cyberspace, The Netherlands
Mr. Pedro Abreu | Senior Vice President & Chief Strategy Officer, ForeScout Technologies, Inc.
Dr. Edward G. Amoroso | Chief Executive Officer, TAG Cyber LLC; Former Senior Vice President & Chief Security Officer, AT&T
Ms. Maria Belovas | Director of Communications Department, Ministry of Foreign Affairs, Estonia
Mr. Robert Butler | Senior Vice President, Critical Infrastructure Protection Operations, AECOM
H.E. Mr. Valeriy Chaly | Ambassador Extraordinary and Plenipotentiary of Ukraine to the United States
Mr. Scott Charney | Corporate Vice President, Microsoft Corp.
Mr. Alvaro Chaves | Director of Public Security, Ministry of National Defense, Colombia
Mr. Stefano Ciminelli | Deputy CISO, SWIFT, Belgium
Mr. Rajesh De | Partner, Mayer Brown; former General Counsel, National Security Agency
H.E. Ambassador Sorin Ducaru | Assistant Secretary General of the Emerging Security Challenges Division, NATO
Colonel Patrick M. Duggan | Commander, Joint Base Myer-Henderson Hall
Mr. Art Ehuan | Managing Director, Alvarez & Marsal Disputes and Investigations, LLC
Brigadier General Hans Folmer | Commander Defense Cyber Command, The Netherlands
Mr. Lior Frenkel | CEO & Co-Founder, Waterfall Security Solutions, Israel
Mr. Rashid Gabdulhakov | PhD Candidate at the Erasmus University Rotterdam, Department of Media and Communication, The Netherlands
Mr. Karsten Diethelm Geier | Head, Cyber Coordination Staff, Federal Foreign Office, Germany
Ms. Toni Gidwani | Director of Research Operations, ThreatConnect
Dr. Sebastian Gorka | Deputy Assistant to the President, The White House
Ms. Siobhan Gorman | Director, Brunswick Group
Mr. Juan Andres Guerrero-Saade | Senior Security Researcher, GReAT, Kaspersky Lab
Mr. Shane Harris | Senior Writer, The Wall Street Journal
Ms. Melissa E. Hathaway | President, Hathaway Global Strategies LLC
Mr. Adam S. Hickey | Deputy Assistant Attorney General for National Asset Protection, U.S. Department of Justice
Mr. Michael Janke | Founder/Managing Partner, DataTribe; Executive Chairman and Co-Founder of Silent Circle
Ambassador Marina Kaljurand | Minister of Foreign Affairs (2015-2016), Republic of Estonia and Chair, Global Commission on the Stability of Cyberspace
Mr. Tom Kellermann | CEO, Strategic Cyber Ventures
Mr. Daniel Kimmage | Acting Coordinator, Global Engagement Center, U.S. Department of State
The Honorable Franklin D. Kramer | Distinguished Fellow, Board Member, Atlantic Council
Dr. James A. Lewis | Senior Vice President, Center for Strategic and International Studies; Commissioner, Global Commission on the Stability of Cyberspace
Mr. Ping Li | Partner, Accel Partners
Dr. Jarno Limnéll | Professor of Cybersecurity, Aalto University, Finland
Dr. Chuanying Lu | Research Fellow, Shanghai Institute for International Studies; Visiting Research Fellow, Center for Strategic and International Studies
Mr. Markku Mantila | Director General, Government Communications Department, Prime Minister’s Office, Finland
Ms. Cheri McGuire | Group Chief Information Security Officer, Standard Chartered Bank, UK
LtCol GS Matthias W. Mielimonka | Personal Assistant to the Director General for Cyber/IT, Federal Department of Defense, Germany
Mr. Klaus H. Mühleck | Director General for Cyber/IT and Chief Information Officer, Federal Department of Defense, Germany
Mr. Christopher Painter | Coordinator for Cyber Issues, U. S. Department of State
Mr. Philip Reitinger | President & CEO, Global Cyber Alliance
Mr. William H. Saito | Special Advisor to the Cabinet, Government of Japan; Commissioner, Global Commission on the Stability of Cyberspace
Dr. Florian Schaurer | Desk Officer Hybrid Warfare, Directorate General for Political Affairs, Federal Ministry of Defense, Germany
Dr. Joanna Świątkowska | The Programme Director of the European Cybersecurity Forum; Senior Research Fellow for Cybersecurity of the Kosciuszko Institute, Poland
Mr. Richard Wells | Managing Director, Insight Venture Partners
Mr. Mike Williams | Director of Raytheon Blackbird Technologies, Raytheon
Mr. Elie Wurtman | Managing Partner, PICO Partners
Ms. Kim Zetter | Freelance Journalist; Former Senior Staff Reporter, Wired
2017 Panels Announced
Elements of a National Cybersecurity Strategy
In order to respond to cyber threats in a constantly changing environment, countries need to have flexible and dynamic cybersecurity strategies that effectively incorporate the economic, social, educational, legal, law enforcement, technical, diplomatic, military and intelligence-related aspects of cybersecurity. The cross-border nature of threats makes it essential to focus on strong international engagement and cooperation. Cooperation is necessary to effectively prepare for, but also respond to, cyber-attacks. Comprehensive national cybersecurity strategies are the first step in this direction. This panel will highlight the progress that has been made globally and the challenges that persist as countries develop and implement their cyber strategies while facing complex challenges of developing holistic approaches which take into account sovereignty and economic/social concerns, the involvement of a large range of government bodies, increased cooperation with the private sector and the need to preserve the openness of the Internet while being prepared to face a possibly serious cyber incident.
International Cyber Diplomacy: Developing Norms For Responsible State Behavior
There is increasing interest among the international community towards the issue of international cybersecurity and a willingness to develop shared understanding on threats and their mitigation. Technology-dependence and cyber-attacks are the new normal and it is paramount for all countries to coordinate their contributions to the security of our common information infrastructure. Experts in many international forums have begun developing norms related to the behavior of states, companies and individuals. By actively contributing to international cyber diplomacy states have sought to build a safe cyberspace for all.
This panel will discuss the progress that has been made in negotiating norms for acceptable state behavior in cyberspace under the auspices of the UN, through the UN Group of Governmental Experts, and the challenges that such negotiations have met. It will reflect on the different national and private sector views on the role and effectiveness of norms for cyberspace, the nature of the specifically agreed upon norms and point out where additional normative clarity might be needed and developed over time. While there are clear examples of progress, the panelists will also examine the question as to whether there are recognized limits to what can be achieved under the UN through the GGE at a practical and applied level. And if so, what other options may exist for further development of productive consensus in the international community for collective responsibility for the security and defense of the international infrastructure of cyberspace as well as the national systems that are part of that global infrastructure.
The Role of Practical Attribution: Views from Private Sector, Policy, Military and Law Enforcement
Attribution of cyberattacks is a tricky business, since it's possible for actors to create deliberate false flag operations that point the finger at innocent parties. Different sectors have different needs and requirements for attributing an attack and responding to it. This panel will look at attribution from the different perspectives of private industry, law enforcement and the military.
The Internet of Things: The Good, the Bad, and the Way Forward
The Internet of Things is connecting more devices every day with estimates indicating that by 2020 there will be 24 billion IoT devices. That translates into about 4 devices for each individual on the planet.
This growth carries several benefits, as it will change the way people carry out everyday tasks and potentially transform the world. Smart lighting in homes and office buildings will reduce overall energy consumption and lower your electric bill, connected cars will link up with smart city infrastructure to create an entirely different ecosystem for the driver, and connected healthcare devices will give people a deeper and fuller look at their own health, or lack thereof, as never possible before.
But with all of these benefits comes risk, as the increase in connected devices gives hackers and cyber criminals more entry points. IoT has become everyone's favorite bogeyman after the emergency of the Mirai botnet. It's a common answer to the question "What keeps you up at night." The combination of nearly universal deployment of connected devices, long lifecycles, connectivity to the physical world, and poor security are an ideal recipe for botnets and other forms of cyber disruption and destruction.
What is coming? Are we doomed to living in a cyber dystopia? This panel will explore what is likely coming in the near and intermediate future, how bad things will be, and possible approaches for IoT security. What solutions will stick, how effective will they be, and what is the end-state?
Responsive Cyber Defense: Options for Governments and the Private Sector for a Robust Defense
Military, government and commercial IT networks face constant cyber intrusions from both criminal and state-sponsored adversaries. Typically responses entail finding the invading code, unplugging the affected systems, creating security patches to thwart particular attacks, and applying those patches network-wide. This reactive engagement model is effective on a case-by-case basis but does not address key advantages attackers have.
Can defenders move beyond traditional static defenses to exploit the natural advantages of their systems and expertise to challenge the adversary, making it significantly harder for the adversary to attack? As more actively executed defensive operations involve direct engagement with adversaries, what risks will be involved and how will government and private entities manage those risks? This panel will place the current cyber threat in its larger strategic context and then discuss the role of governments and the private sector in responsive cyber defense, sometimes called active defense, and the relative risk and impact of such activities.
Changing the Business of Cybersecurity Through Investment, Incubation and Adoption of New Technologies
This seminal panel will encompass how astute cybersecurity investment can mitigate the harsh realities of cybercrime. The discussion will highlight investment strategies for improving national security. One key point of the discussion will surround how offense must inform defense. Specifically, how a security driven thesis will endow economic growth and security. The panelists will engage in a colorful discussion on the effectiveness of modern cybersecurity controls.
The Unconventional Use of Cyber between War and Peace
This panel brings together military, academia, and private sector experts to engage in a candid dialogue with the goal of offering insightful perspectives on how to address the unconventional use of cyber between the space of war and peace. Individuals, groups, and nations are increasingly using cyber to advance their interests across a wide spectrum of conflict, and the urgency to better understand cyber's unconventional employment to those ends has never been greater. Characterized by ambiguous interactions and unclear motivations, cyber's unconventional application has serious geopolitical, commercial, and military implications. To better understand them requires fresh thinking, formulating new frameworks, and offering new theories about the nature of an emerging new character of conflict.
News, Alternative Facts, and Propaganda: The Role of Cyber in Influence Operations
Fake news has the power to move markets, influence elections, and misinform the general public. While fake news is not a new phenomenon, it rose to prominence in the 2016 U.S. presidential elections and quickly became either a call to action or cause for alarm. This panel will examine the prevalence of fake news, its rise in elections, its impacts on society and business, and how organizations across the spectrum are addressing this complex issue.
Thank you to the sponsors of the 2017 International Conference on Cyber Engagement:
Alvarez & Marsal Holdings, LLC
Baker & McKenzie LLP
Brunswick Group LLP
Debevoise & Plimpton LLP
Deloitte & Touche LLP
ForeScout Technologies, Inc.
Lockheed Martin Corporation
Tenable Network Security
Waterfall Security Solutions
Ziften Technologies, Inc.
For any questions pertaining to the conference, please email: email@example.com.
Special thanks to InfoSec-Conferences.com.
ARRIVING ON CAMPUS AND PARKING
Arriving on campus:
The morning and afternoon portions of the conference will be held in Gaston Hall (located in the Healy Building) on Georgetown University’s main campus. If you are taking a cab or car service please have them bring you to the campus entrance at 37th and O Streets NW. From there, proceed directly into the Healy Building to the registration tables.
Please know that street parking is limited around Georgetown and is restricted to 2 hours. Arriving via taxi or car service is recommended.
A limited number of daily parking spaces are available on campus in the Southwest Garage and can be reached by entering campus from Canal Road. The hourly parking rate is $3.00. Daily parking is $20. This garage is a 5-minute walk to the Healy Building, and these spaces tend to fill early in the morning. For more information and a map of this garage, please click HERE. Please plan to arrive early if you would like to ensure you get a space in this garage.
Additional on-campus parking can be found at the Georgetown Hotel & Conference Center at 3800 Reservoir Road. Daily parking is $25, and this garage is a 10-15 minute walk to Healy Hall. Again, spaces are limited and available first come-first serve. For more information, please click HERE.