Cyber at the Crossroads
 

AGENDA

Cyber at the Crossroads

Cyber Center for Education & Innovation, Home of the National Cryptologic Museum

Fall Symposium

University of Maryland University College

College Park Marriott Hotel & Conference Center

Tuesday, October 10, 2017

8 a.m.–6:30 p.m.


REGISTRATION AND CONTINENTAL BREAKFAST

8–9 a.m. | Lobby


WELCOME AND SYMPOSIUM OVERVIEW

9–9:30 a.m | Chesapeake Salons A & B


Symposium Welcome

Lt. Gen. Ken Minihan (U.S. Air Force, Ret.)

Symposium Chair

Chairman, CCEI-NCM Founders Group


Greetings

President Javier Miyares

University of Maryland University College


Symposium Overview

Lt. Gen. John Campbell (U.S. Air Force, Ret.)

Senior Advisor, CCEI-NCM


PANEL ONE - ELIGIBLE RECEIVER 97: A WAKEUP CALL

9:30 a.m.–10:45 a.m. | Chesapeake Salons A & B


Exercise Eligible Receiver 97 (ER97) demonstrated that the US Government was ill-prepared to detect and defend against even a moderately sophisticated cyber attack.  ER97 alarmed key leaders in DOD and the Interagency and set in motion events that are still playing out, including new cyber policy and new organizational structures which were the predecessors of today’s US Cyber Command.  John Hamre, Deputy Secretary of Defense in 1997, famously said “Just like Sept. 11 changed our consciousness about the vulnerability of airplanes, Eligible Receiver changed our consciousness about our vulnerability to cyber warfare”.  This panel, made up of individuals directly involved with the 1997 exercise, will act as a scene-setter for the symposium and discuss how the exercise was conducted, what it revealed, what actions resulted, and how today’s cyber initiatives are still being influenced by ER97 lessons learned.   


Moderator

Professor Jason Healey

Senior Research Scholar, Columbia University

Senior Fellow, Atlantic Council


Session Speakers

Lt. Gen. Ken Minihan (U.S. Air Force, Ret.)

Director, National Security Agency (1996-1999)


Lt. Gen. John Campbell (U.S. Air Force, Ret.)

Commander, Joint Task Force - Computer Network Defense (1998-2000)


CAPT Michael Sare (U.S. Navy, Ret.)

Director

ER97 Red Team


Dr. Michael Warner

Command Historian, U.S. Cyber Command


BREAK

10:45–11 a.m.


MORNING KEYNOTE

11 a.m.–12 p.m. | Chesapeake Salons A & B


Keynote Speaker

Dr. John Hamre

President and CEO

Center for Strategic and International Studies (CSIS)

Deputy Secretary of Defense (1997–2000)


Dr. John Hamre was the deputy secretary of defense during ER97 and provided senior supervision of the exercise as well as the visionary DOD leadership needed to enact organizational and doctrinal changes to address its findings.  In his post-DOD career as chairman and CEO of CSIS, Dr. Hamre has been a leader in the evolution of our national cybersecurity strategy.  Dr Hamre will discuss his perspectives on the exercise, what it showed us, and what effects it has had on our current national cybersecurity enterprise.  With more than two decades of national cybersecurity leadership, Dr Hamre is uniquely qualified to comment on our past, present, and future.


LUNCHEON KEYNOTE

12–1:15 p.m. | Potomac Salons 1 & 2


CCEI-NCM Overview

MG Rod Isler (U.S. Army, Ret.), Vice President, CCEI-NCM New Museum Campaign


Keynote Speaker

Dr. Thomas Rid

Professor of Strategic Studies, Johns Hopkins University School of Advanced International Studies

Author of Rise of the Machines

BREAK

1:15–1:30 p.m.


PANEL TWO - CYBER ORGANIZATION, EDUCATION AND TRAINING: IMPERATIVES TO DEAL WITH PRESENT AND EVOLVING THREATS

1:30–2:45 p.m. | Chesapeake Salons A & B


Session Overview

In the wake of ER97 and other real-world cyber events over the past 20 years, the cyber threat has become broadly recognized, and the nature of the threat has continued to evolve. Today its scope and scale have expanded to touch nearly every aspect of our interconnected society.  Employed by hackers, criminals, terrorists, transnational and nation-state sponsored groups, the target set has expanded from basic communications services to include most every service and critical infrastructure that relies on information technology. In addition, cyber-enabled information operations are a powerful tool to influence public opinion and, as a consequence, public policy. However, while virtually every institution and equity in daily life has been influenced by some aspect of the expanded “cyber threat,” the responses of such organizations have been dissimilar and uneven. There is a continually growing need for development of expert practitioners to manage technology systems engaged in these processes, and to inoculate society broadly against the effects of systemic disinformation, media manipulation, and attack on fundamental institutions of society. Some say that we have already seen the “golden age of the Internet” when it was possible to conduct business and control industrial processes safely and reliably.  Are we now at an inflection point—or crossroads—in the evolution of our cyber ecosystem?  If so, what issues are important today to set conditions for success in the future? This broadly based panel will seek to examine the current state of readiness, response, and planning to address the range of cyber-related concerns and priorities across government, industry, and academia.


Moderator

ADM William O. Studeman (U.S. Navy, Ret.)

Deputy Director of Central Intelligence (1992–1995)

Director, National Security Agency (1988–1992)


Speakers

Hon. Steven Cambone

Associate Vice Chancellor for Cyber Initiatives, Texas A&M University System

Undersecretary of Defense for Intelligence (2003–2007)


MG John Davis (U.S. Army, Ret.)

Vice President and Chief Security Officer, Palo Alto Networks

Acting Deputy Assistant Secretary of Defense for Cyber Policy (2014–2015)

Former Director, Current Operations, US Cyber Command (2013–2015)

Christopher C. Krebs, Senior Official Performing the Duties of the Under Secretary,

National Protection and Programs Directorate, Department of Homeland Security

Assistant Secretary for the Office of Infrastructure Protection

Dr. David Mussington

Director of the Center for Public Policy and Private Enterprise

Professor of the Practice at the University of Maryland School of Public Policy

Senior Advisor for Cyber Policy, Office of the Secretary of Defense (2010-2011)


BREAK

2:45–3 p.m.


PANEL THREE: A CONVERSATION ON CYBER FUTURES

3–4:15 p.m. | Chesapeake Salons A & B


Our cyber future seems to be on a course to be shaped by market forces and technological innovation with minimal direction from consistent and current policy oversight. Projections are that in just a few years, the Internet will connect much more than computers, phones, and laptops; in fact, nearly every sensor and control device which exists will be online. Cars, refrigerators, televisions, household appliances, cameras, aircraft, and even your wallet—along with sophisticated analytic engines and weapons systems—will all be connected online.  As ubiquitous as the Internet of Things (IoT) is today, in the future, billions more devices will communicate with each other in ways that will open up new levels of revenue and advertising streams. The IoT will also open up new opportunities for malevolent actors to use this world of interconnected devices to gain an even greater asymmetric advantage in a broad range of business, government, and military mission arenas.

  • Smart cities, where sensors and GPS tracking facilitate smoother flows of traffic.

  • Infrastructure sensors and control nodes that monitor equipment condition, send alerts when repairs are needed, and provide access for remote maintenance and control.

  • Smart appliances, working with smart electric grids, that run themselves or perform their chores after peak loads subside.

  • Self-driving cars—and potentially pilotless aircraft and drones—that dispatch themselves and navigate independently.


The IoT is here today and the Internet of Everything (IoE) is on the horizon. These are just a few examples that humans will have to adjust to.


"Nearly everything in daily life will have a connected application associated with it,” said Patrick Stack, manager for Accenture Interactive. “We can think of each person as a plug and each part of life as a socket.… Each step along the way will be able to recognize your common identifier and tailor your experience accordingly."


And it’s not just the humans; machines are also doing the same, communicating, self-organizing, and sharing information with each other and with us, over essentially the same complex and connected global mesh. And, they already outnumber us.


But is the future already determined?  Is ever greater networking of society inevitable?  Will the rising costs of a connected society—disruptions of increasing magnitude, the loss of control over the most intimate personal information, a growing skepticism about the security of systems and the information they convey—engender a reflective caution and deliberate limits across society on what is connected, where sensors are deployed, and what information is collected? These same questions have informed strategic discussions about weapons development, where certain weapons have been banned by treaty because, while possible, their development and deployment were judged to be destabilizing. Could a similar logic of limits inform our cyber future?


Moderator

Mr. Marcus Sachs

Senior Vice President and Chief Security Officer

North American Electric Reliability Corporation (NERC)


Speakers

Dr. Ivan Arreguín-Toft

Assistant Professor of International Relations, Frederick S. Pardee School of Global Studies, Boston University

Oxford Martin Fellow, The Global Cyber Security Capacity Centre at the Oxford Martin School, University of Oxford

Mr. Shawn Barry

Senior Technical Intelligence Officer

Directorate of Science and Technology, Central Intelligence Agency

MG Dave Bryan (U.S. Army, Ret.)

President & CEO, Bryan Business Management and Technology


Mr. Russell Gyurek

Director, IoT-CTO and Industries, Cisco

AFTERNOON KEYNOTE

4:15–5:15 p.m. | Chesapeake Salons A & B


Introduction

Lt. Gen. Ken Minihan (U.S. Air Force, Ret.)

Symposium Chair and Chairman, CCEI-NCM Founders Group


Keynote Address: Cybersecurity Executive Order and Key Administration Priorities

Mr. Rob Joyce

White House Cybersecurity Coordinator


CLOSING REMARKS

5:15–5:30 p.m. | Chesapeake Salons A & B


RECEPTION

5:30–6:30 p.m. | Potomac Salons 1 & 2


Join symposium speakers and organizers for a cocktail reception and the screening of a recently declassified ER97 after-action report video.