2019 Cybersecurity Transition to Practice (TTP) Workshop
Wednesday, June 19th, 9am - 5pm.
The Cybersecurity TTP workshop is an opportunity for Cybersecurity researchers and practitioners to discuss the needs and gaps we can fill with cybersecurity research, and enjoy co-creation of plans on accelerating this valuable research to practice. Researchers and practitioners in cybersecurity are encouraged to attend. Invitation requests are reviewed and approved by the Cybersecurity TTP Workshop Events Team. Contact us for questions.
Registration to the workshop is now closed. The workshop is free. Invitation requests expire on June 10th or when seats are no longer available. Invitation requests are reviewed and approved by the Cybersecurity TTP Workshop Events Team. You will be notified if your application is approved. Contact us for questions.
Hosted by Microsoft at the Aon Center in Chicago
200 E. Randolph St.
Chicago, IL 60601
Agenda is subject to change. Updates will be posted here. A detailed description of the agenda can be found here.
8am — Breakfast
9am - Noon — Morning session
Welcome, Overview, and Goals
Artificial Intelligence and Machine Learning for Cybersecurity Panel
Practitioners from Box and Marshall University.
Researchers from Rochester Institute of Technology, Virginia Tech, Indiana University.
Cybersecurity Risk Mitigation Panel - Data, Cloud and Cyberinfrastructure
Practitioners from Google and University of Wisconsin-Madison.
Researchers from Boston University, University of Wisconsin-Madison, University of North Carolina at Charlotte.
12pm - 1pm — Lunch and poster session including Rochester Institute of Technology, Virginia Tech, Indiana University students
Lunch is provided by the workshop events team. If you need to make separate arrangements, there are many options in the area.
1pm - 5pm — Afternoon session
Transition to Practice Success Stories Panel - Identity and Access Management and Operational Network Security Monitoring
Practitioner from LIGO, University of Wisconsin - Milwaukee
Researchers from NCSA/UIUC and Corelight
Human Factors in Cybersecurity Panel
Practitioners from MERIT - Michigan Cyber Range and Pythian / Tehama
Researchers from Temple University, Penn State, North Carolina A&T State University
Internet of Things / Cyber Physical Systems / Networking Cybersecurity Panel
Practitioners from University of Texas – Austin and SurePassID
Researchers from Washington University in St. Louis, Duke University, Rochester Institute of Technology
Co-creation next steps and networking
The 2019 Cybersecurity TTP Workshop is sponsored by Trusted CI, Indiana University’s Research and Technology Corp, Microsoft, Box, and the National Science Foundation (Grant ACI-1547272). We thank them for their support.
Parking instructions can be found on the Aon Center’s website. The Aon Center and The Cybersecurity TTP Workshop Events Team are not responsible for parking violations. Attendance to the workshop does not include free parking.
The TTP workshop dress code is business casual.
Code of conduct
The Cybersecurity TTP Workshop aims to foster and provide a welcoming environment of mutual respect for all people. We have adopted the following code of conduct to provide guidance to all on the type of behavior that is expected while in attendance of the workshop.
All people attending the workshop are expected to demonstrate the proper respect for others in attendance regardless of, for example, age, race, gender, or abilities.
Physical, social or sexual harassment, or intimidating behavior will not be tolerated.
Use the restroom facilities for the gender for which you identify yourself.
Weapons are not welcome at the workshop.
Illegal drugs are not welcome at the workshop.
Smoking is not permitted at the workshop as the The Aon Center, where the workshop is located, is a 100% smoke free facility.
Attendees will be given access to the event venue’s WiFi access point. Please use the provided networks appropriately and in accordance with their terms and conditions.
Please do not use flash photography during presentations.
There is to be no audio or video recording of presentations.
Violation of these any of these rules may put the attendee at grounds for disciplinary action and/or dismissal from the workshop.
If you are an attendee who feels that you have been threatened or have been a victim of or who would like to report a violation of the above rules, please report the incident to one of the following people who are contacts for Trusted CI:
Diana Borecky (email@example.com)
Jim Basney (firstname.lastname@example.org)