2019 TTP Workshop Agenda (detailed)

Back to TTP workshop main page

9:00 AM Opening and Overview of the Workshop — Florence Hudson

9:15 AM Cybersecurity Risk Mitigation - Data, Cloud and Cyberinfrastructure

Researchers:

  • Mayank Varia, Boston University

    • Secure multi-party computation and Multi-institution cloud security

  • Laura Albert, University of Wisconsin - Madison

    • Cyberinfrastructure Protection

  • Ehab Al-Shaer, University of North Carolina at Charlotte

    • Cyber threat intelligence analytics, mitigation and response automation

Practitioners:

  • Seth Vargo, Developer Relations Engineer, Google

  • Steve Barnet, Senior Systems Engineer, University of Wisconsin - Madison

10:30 AM Break

10:45 AM Artificial Intelligence and Machine Learning for Cybersecurity

Researchers:

  • Jay Yang – Rochester Institute of Technology

    • Automating Attack Strategy Recognition to Enhance Cyber Threat Prediction

  • Gang Wang – Virginia Tech

    • Machine Learning Assisted Crowdsourcing for Phishing Defense

  • Jean Camp – Indiana University

    • Control Plane

Practitioners:

  • Edward Aractingi, CIO, Marshall University

  • Andrew Keating, Managing Director, Education & Healthcare, Box

12:00 PM Lunch and poster session

  • Ahmet Okutan, Rochester Institute of Technology, Research Faculty

    • CyberAMPS: Cyberattack Analytics, Modeling, Prediction, and Simulation

  • Steve Jan, Virginia Tech, PhD Student

    • Connecting the Digital and Physical World for Adversarial Attacks

  • Vafa Andalibi, Indiana University, Student

    • Securtle for Cyber Defense

  • DongInn Kim, Indiana University, Student

    • Defending against Man In The Middle (MITM) Attacks at the Edge

  • Pablo Moriano, Indiana University, PhD

    • Insider Threat Mitigation

12:45 PM Transition to Practice Success Stories

Researchers:

  • Jim Basney - NCSA UIUC

    • CILogon 2.0 - Integrated Identity & Access Management Platform for Science

  • Robin Sommer - Corelight

    • Enhancing Zeek for Operational Network Security Monitoring in Scientific Environments

Practitioner:

  • Warren Anderson, LIGO, University of Wisconsin - Milwaukee

1:30 PM Human Factors in Cybersecurity

Researchers:

  • Aunshul Rege – Temple University

    • Applying a Criminological Framework to Understand Adaptive Adversarial Decision-Making Processes in Critical Infrastructure Cyberattacks

  • Anna Squicciarini - Penn State

    • User-Centered Multiparty Access Control for Collective Content Management

  • Mohd Anwar - North Carolina A&T State University

    • Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials

Practitioners:

  • Joe Adams, VP Research & Cybersecurity, Michigan Cyber Range, MERIT

  • Paul Vallee, CEO, Pythian and Tehama

2:45 PM Break

3:00 PM Internet of Things / Cyber Physical Systems / Networking Cybersecurity

Researchers:

  • Shantanu Chakrabartty – Washington University in St. Louis

    • IOT security solutions based on zero-power timer technology

  • Miroslav Pajic – Duke University

    • Foundations for Secure Control of Cyber-Physical Systems

  • Taejoong (Tijay) Chung – Rochester Institute of Technology

    • Measuring and Improving Management of Resource Public Key Infrastructure

Practitioners:

  • Chris Sedore, CIO, University of Texas – Austin

  • Wendy Fairfield, SVP Strategy & Operations, Solution Architect, SurePassID

4:15 PM Co-creation next steps

4:45 PM Networking

5:00 PM End of Workshop