REGISTER NOW: Sponsors Exhibitors Attendees

2017 Agenda Day 2

June 7, 2017


7:00 am - 8:00 am

Continental Breakfast


7:00 am - 5:00 pm



8:00 am - 8:15 am

Opening Ceremony & Welcome Remarks


8:00 am - 5:15 pm

Executive Academic Forum (by invitation only)

East Hall

Hosted by the NSA/DHS National Centers of Academic Excellence in Cyber Defense


8:15 am - 9:15 am

Keynote Speaker #1

Thad Allen
Executive Vice President, Booz Allen Hamilton
Former Commandant of the Coast Guard


9:00 am - 11:00 am

Cyber Cup Round 1


9:15 am - 10:15 am

Keynote Speaker #2

Scott Self
Chief Information Officer, Tennessee Valley Authority


10:15 am - 11:00 am

Exhibitor Break / Lightning Briefings (3)

Exhibit Hall

10:15-10:27: “Under Attack – Please Don’t Stand By”
Chandler Hall, Sentar, Inc.

10:30-10:42: “ICS/SCADA”
Chris Poulin, Booz Allen Hamilton

10:45-10:57: “Information Security Operations”
Alan Cochran, BBVA Compass


11:00 am - 12:00 pm

Networking/Exhibit Break

Exhibit Hall


11:00 am - 3:00 pm

NCS Cyber Job Fair


12:00 pm - 1:30 pm


South Hall


12:30 pm - 1:30 pm

Keynote (Lunch) Speaker #3

John Matherly
Founder, Shodan


1:00 pm - 3:00 pm

Cyber Cup Round 2


1:30 pm - 5:00 pm


1:30 pm - 5:00 pm

CAE Faculty Development Workshop (separate registration required)

Meeting Room 2

Open to faculty from CAE designated institutions in the Southeast; separate registration required.


1:30 – 2:00 PM: Sign-in and Introductions

2:00 – 3:00 PM: Critical Infrastructure Security
Margaret Leary, Ph.D., CISSP, CRISC, CEH, CIPP/G
Director, NSA CAE National Resource Center
Northern Virginia Community College

Prof. Stephen Miller
Professor and Director of Information Systems/Cyber Security of Excellence
Eastern New Mexico University – Ruidoso

Introduces the new Critical Infrastructure Cybersecurity course sponsored, published, and made available to instructors for their free use by CyberWatch West. College instructors will learn from presenters Stephen Miller (Eastern New Mexico University – Ruidoso), and Margaret Leary (Northern Virginia Community College), how to adapt the eleven-lesson course for their institutions. The course was created in collaboration with George Mason University’s Center for Infrastructure Protection and Homeland Security, leveraging its graduate-level coursework to produce a beginning course suitable for undergraduate students with a basic understanding of network and computer security. Course materials can be accessed and downloaded from

3:00 – 4:00 PM: Introduction to Industrial Control System Security
Guillermo Francia III, Ph.D.
Distinguished Professor and Director, Center for Information Security and Assurance
Jacksonville State University

Industrial Control Systems (ICS) have been widely utilize to manage and automate critical infrastructures in various sectors such as those supplying and/or controlling essential energy, water, transport, chemicals, and various manufacturing processes. ICS typically consist of a combination of software, hardware, and human operators. The most common components found in ICS are Systems Control and Data Acquisition (SCADA), Distributed Control Systems (DCS) and Programmable Logic Controllers (PLC). A malfunctioning ICS due to inadvertent or malicious action can cause serious consequences to life, property, and economic well-being. Due to the increasing interconnectedness of these systems to enterprise Information Technology (IT) infrastructure, an exposure to cyber-attacks is enabled. It is imperative for the next generation of cyber warriors to gain an adequate knowledge and skill in protecting these systems.
In this segment of the workshop, participants will be provided with an overview of ICS security, ICS-related security standards, the ICS kill-chain and its application, and the value of ICS threat intelligence to security monitoring.

4:00 – 5:00 PM: Lectures and Lab Exercises to Teach SCADA Cybersecurity
University of Alabama Huntsville Computer Engineering Ph.D. Students:
Thiago Alves, Rishabh Das, Aaron Werth and SueAnne Griffith

UAH is currently developing a set of lectures and lab exercises to teach industrial control systems cybersecurity. Topics include introduction to SCADA control systems, networking in SCADA control systems, SCADA control system risk assessment, applying cybersecurity principals to SCADA, threats and vulnerabilities for SCADA control systems, and defending SCADA control systems. At project completion (projected August 2017) the lab and lecture materials will be available to other NSA-DHS Centers of Academic Excellence. The lab exercises use 3 virtual SCADA test beds developed at UAH. This section of the workshop will introduce the lecture materials, lab exercises, and virtual SCADA test beds.



2:00 pm - 2:45 pm

Tech Talk

Exhibit Hall

“Cyber Weapons- The Tools Attackers Use and How to Detect Them”

Douglas Jones
Palo Alto Networks


3:00 pm - 3:30 pm

Exhibitor Break / Lightning Briefings (2)

Exhibit Hall

3:00-3:12: “How to Engage, Recruit and Retain Cybersecurity Talent”
Kathleen Smith, CyberSecJobs.Com

3:15-3:27: “Competitive Advantage in the Age of Information- How the Military Can Use and Protect the Internet of Things (IoT)”
Joe Mariani, Deloitte


4:00 pm - 4:45 pm

Tech Talk

Exhibit Hall

“Hacking Peoples LIVES with Google Sync”

Sean Hopkins
H2L Solutions, Inc.


5:00 pm - 5:30 pm

Bus to the Space and Rocket Center

Bus leaving for the National Centers of Academic Excellence in Cyber Defense Reception and Designation Ceremony


5:30 pm - 8:00 pm

National Centers of Academic Excellence in Cyber Defense Reception and Designation Ceremony

U.S. Space and Rocket Center’s Davidson Center


5:30 pm - 6:30 pm


U.S. Space and Rocket Center’s Davidson Center

Reception Starts at 5:30 pm.


6:30 pm - 8:00 pm


U.S. Space and Rocket Center’s Davidson Center

Ceremony Starts at 6:30pm

Certificates presented by
Dr. Leonard T. Reinsfelder
Commandant, National Cryptologic School, National Security Agency

Mr. Daniel R. Stein
Acting Branch Chief for Cybersecurity Education and Awareness in the Department of Homeland Security’s Office of Cybersecurity and Communications

Be Sure to Visit Our Amazing Sponsors!

Booz Allen Hamilton
All Points

Brought to You By...