2019 TTP Workshop Agenda (detailed)

Back to TTP workshop main page

8:00 AM Breakfast and networking

9:00 AM Opening, Overview, and Goals of the Workshop — Florence Hudson

9:15 AM Artificial Intelligence and Machine Learning for Cybersecurity

Practitioners:

  • Edward Aractingi, CIO, Marshall University

  • Andrew Keating, Managing Director, Education & Healthcare, Box

Researchers:

  • Jay Yang – Rochester Institute of Technology

    • CyberMPS for Actionable Real-time Predictive Analytics

  • Gang Wang – Virginia Tech

    • Machine Learning Assisted Crowdsourcing for Phishing Defense

  • Jean Camp – Indiana University

    • Machine Learning in Security: Understanding Human Networks

10:30 AM Break and Posters

10:45 AM Cybersecurity Risk Mitigation - Data, Cloud and Cyberinfrastructure

Practitioners:

  • Seth Vargo, Developer Relations Engineer, Google

  • Steve Barnet, Senior Systems Engineer, University of Wisconsin - Madison

Researchers:

  • Mayank Varia, Boston University

    • Secure Multi-Party Computation and a Modular Approach to Cloud Security

  • Laura Albert, University of Wisconsin - Madison

    • Cyberinfrastructure Protection

  • Ehab Al-Shaer, University of North Carolina at Charlotte

    • Cyber threat intelligence analytics, mitigation and response automation

12:00 PM Lunch and Poster Session

  • Ahmet Okutan, Rochester Institute of Technology, Research Faculty

    • CyberMPS: Cyberattack, Modeling, Prediction, and Simulation

  • Vafa Andalibi, Indiana University

    • Securtle for Cyber Defense

    • Defending IoT devices and Edge network with Manufacturer Usage Description

  • DongInn Kim, Indiana University

    • Defending against Man In The Middle (MITM) Attacks at the Edge

  • Pablo Moriano, Indiana University, PhD

    • Insider Threat Mitigation

  • Olivia Kenny, Indiana University

    • Who’s Watching Your Child?

    • The Overly Friendly Crockpot

  • Joshua Streiff, Indiana University

    • Why Johnny Doesn’t Use Two Factor

  • Steve Jan, Virginia Tech

    • Connecting the Digital and Physical World for Adversarial Attacks

  • Sri Harsha Kondapalli and Darshit Mehta, Washington University in St. Louis

    • Zero-powered Dynamic Authentication based on Quantum Tunneling Timers

12:45 PM Transition to Practice Success Stories

Practitioner:

  • Warren Anderson, LIGO, University of Wisconsin - Milwaukee

Researchers:

  • Jim Basney - NCSA UIUC

    • CILogon 2.0 - Integrated Identity & Access Management Platform for Science

  • Robin Sommer - Corelight

    • Enhancing Bro for Operational Network Security Monitoring in Scientific Environments

1:30 PM Human Factors in Cybersecurity

Practitioners:

  • Joe Adams, VP Research & Cybersecurity, Michigan Cyber Range, MERIT

  • Paul Vallee, CEO, Pythian and Tehama

Researchers:

  • Aunshul Rege – Temple University

    • Applying a Criminological Framework to Understand Adaptive Adversarial Decision-Making Processes in Critical Infrastructure Cyberattacks

  • Anna Squicciarini - Pennsylvania State University

    • Multiparty Access Control

  • Mohd Anwar - North Carolina A&T State University

    • Improving Employees’ Security Behaviors

2:45 PM Break and Posters

3:00 PM Internet of Things / Cyber Physical Systems / Networking Cybersecurity

Practitioners:

  • Chris Sedore, CIO, University of Texas – Austin

  • Wendy Fairfield, SVP Strategy & Operations, Solution Architect, SurePassID

Researchers:

  • Shantanu Chakrabartty – Washington University in St. Louis

    • IOT security solutions based on zero-power timer technology

  • Miroslav Pajic – Duke University

    • Foundations for Secure Control of Cyber-Physical Systems

  • Taejoong (Tijay) Chung – Rochester Institute of Technology

    • Measuring and Improving Management of Resource Public Key Infrastructure (RPKI)

4:15 PM Co-creation next steps and networking

5:00 PM End of Workshop