CSTTF 2016 Aug. 24, 2016 to Aug. 25, 2016, colorado,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Remarks Cindy Thornburg , Chapter President , Issa- Cos N/A
KEYNOTE Ron Ross , Stuart Mcclure N/A
Meet the New World of Autonomic Security David O'berry N/A
Check Yourself Before You Wreck Yourself: Operationalizing the Verizon Data Breach Investigation Report (DBIR) App Joan Ross N/A
Tackling DFARS Cybersecurity Requirements: Threats, DFARS and Requirements, Options, and Urgency Jim Henderson N/A
Measuring Resilience Steve Hultquist N/A
Advancing Cybersecurity in the Air Domain Tom Kupiec N/A
Panel: Coordination Between IT Technical Functions & Cyber Security Colonel Michael Moyles , Bruce Oehler N/A
Millennials and the Fed: Do Cracks in the Government's Generational Dam Signal a Cybersecurity Tsunami Michael Crouse N/A
Dynamic Deception in Cyber Warfare Joseph Salazar N/A
The Transition from DoDD 8570 to DoDD 8140 Linda Montgomery N/A
Best Practices in Achieving Speed to Competency for the Cyber Mission Workforce Al Kinney N/A
Securing the Manufacturing Digital Thread Frank Backes N/A
National Cyber Center, A Colorado Initiative Panel Jay Lindell , Eric M. Hopfenbeck , Ed Rios , President , Michael Semmens , Jeff Collins N/A
Welcome Remarks: Day 2 Cindy Thornburg N/A
KEYNOTE- Security Reports:100% Clouds Mark Weatherford N/A
RMF PANEL Mark Spencer , Cindy Thornburg , Paul Shock , Dave Reed N/A
Application Security as a Business Enabler Matt Rose N/A
Aligning Skills-Based Training and Performance-Based Assessment to NICE/NIST to Achieve Cyber Resilient Workforce Robin Williams N/A
Unto the Breach Again: When the data loss gets personal and the notification letters pile up Jack Callaghan N/A
ICS/SCADA Cybersecurity Dawn Roth Lindell N/A
How FedRAMP Turned Cybersecurity into a Convincing Business Case Patrice Siravo N/A
Insiders Are The New Malware Brian Vecci N/A
Strategic Incidents and Current Approaches to SCADA/Industrial Control Systems Security Anne Rogers N/A
Keynote: Gazing into the Cybersecurity Crystal Ball Dale W. Meyerrose N/A
Using Proven Techniques and Industry Best Practices to Enhance and Support Cybersecurity Judy Gerber N/A
Broken Trust Models And Security Exploitations Alex Kreilein N/A