Past Presentations
Strategies for Protecting Critical Infrastructures From Cyberattack & Making Them More Resilient
- Identifying weaknesses in the system to inform improvement decisions
- Acquiring the tools to increase protection
- Incorporating cybersecurity in the planning phase of new infrastructure projects
Fred Ruonavar, Chief Contingency Operations, DISA
Post-Quantum Cryptography and Standardization
- Quantum key distribution (QKD) promises to provide perfect encryption
- Hacking attempts of QKD transmission cannot go unnoticed by the administrator
- The technology is using mostly commercially available technology to protect data
Dr. Lily Chen, Mathematician, Manager of Cryptographic Technology Group, National Institute of Standards and Technology
Russia’s Approach to Cyber Warfare
- The role of cyber in Russian and Iranian doctrine and strategy
- How Moscow and Tehran use cyber to achieve their objectives
- Cyber capabilities and trends
Dr. Michael Connell, Principal Research Scientist, Center for Naval Analyses