2019 TTP Workshop Agenda (detailed)
Back to TTP workshop main page
8:00 AM Breakfast and networking
9:00 AM Opening, Overview, and Goals of the Workshop — Florence Hudson
9:15 AM Artificial Intelligence and Machine Learning for Cybersecurity
Practitioners:
- Edward Aractingi, CIO, Marshall University 
- Andrew Keating, Managing Director, Education & Healthcare, Box 
Researchers:
- Jay Yang – Rochester Institute of Technology - CyberMPS for Actionable Real-time Predictive Analytics 
 
- Gang Wang – Virginia Tech - Machine Learning Assisted Crowdsourcing for Phishing Defense 
 
- Jean Camp – Indiana University - Machine Learning in Security: Understanding Human Networks 
 
10:30 AM Break and Posters
10:45 AM Cybersecurity Risk Mitigation - Data, Cloud and Cyberinfrastructure
Practitioners:
- Seth Vargo, Developer Relations Engineer, Google 
- Steve Barnet, Senior Systems Engineer, University of Wisconsin - Madison 
Researchers:
- Mayank Varia, Boston University - Secure Multi-Party Computation and a Modular Approach to Cloud Security 
 
- Laura Albert, University of Wisconsin - Madison - Cyberinfrastructure Protection 
 
- Ehab Al-Shaer, University of North Carolina at Charlotte - Cyber threat intelligence analytics, mitigation and response automation 
 
12:00 PM Lunch and Poster Session
- Ahmet Okutan, Rochester Institute of Technology, Research Faculty - CyberMPS: Cyberattack, Modeling, Prediction, and Simulation 
 
- Vafa Andalibi, Indiana University - Securtle for Cyber Defense 
- Defending IoT devices and Edge network with Manufacturer Usage Description 
 
- DongInn Kim, Indiana University - Defending against Man In The Middle (MITM) Attacks at the Edge 
 
- Pablo Moriano, Indiana University, PhD - Insider Threat Mitigation 
 
- Olivia Kenny, Indiana University - Who’s Watching Your Child? 
- The Overly Friendly Crockpot 
 
- Joshua Streiff, Indiana University - Why Johnny Doesn’t Use Two Factor 
 
- Steve Jan, Virginia Tech - Connecting the Digital and Physical World for Adversarial Attacks 
 
- Sri Harsha Kondapalli and Darshit Mehta, Washington University in St. Louis - Zero-powered Dynamic Authentication based on Quantum Tunneling Timers 
 
12:45 PM Transition to Practice Success Stories
Practitioner:
- Warren Anderson, LIGO, University of Wisconsin - Milwaukee 
Researchers:
- Jim Basney - NCSA UIUC - CILogon 2.0 - Integrated Identity & Access Management Platform for Science 
 
- Robin Sommer - Corelight - Enhancing Bro for Operational Network Security Monitoring in Scientific Environments 
 
1:30 PM Human Factors in Cybersecurity
Practitioners:
- Joe Adams, VP Research & Cybersecurity, Michigan Cyber Range, MERIT 
- Paul Vallee, CEO, Pythian and Tehama 
Researchers:
- Aunshul Rege – Temple University - Applying a Criminological Framework to Understand Adaptive Adversarial Decision-Making Processes in Critical Infrastructure Cyberattacks 
 
- Anna Squicciarini - Pennsylvania State University - Multiparty Access Control 
 
- Mohd Anwar - North Carolina A&T State University - Improving Employees’ Security Behaviors 
 
2:45 PM Break and Posters
3:00 PM Internet of Things / Cyber Physical Systems / Networking Cybersecurity
Practitioners:
- Chris Sedore, CIO, University of Texas – Austin 
- Wendy Fairfield, SVP Strategy & Operations, Solution Architect, SurePassID 
Researchers:
- Shantanu Chakrabartty – Washington University in St. Louis - IOT security solutions based on zero-power timer technology 
 
- Miroslav Pajic – Duke University - Foundations for Secure Control of Cyber-Physical Systems 
 
- Taejoong (Tijay) Chung – Rochester Institute of Technology - Measuring and Improving Management of Resource Public Key Infrastructure (RPKI) 
 
4:15 PM Co-creation next steps and networking
5:00 PM End of Workshop
