Workshop Day
8:00 am - 8:45 am Registration & Networking Breakfast
8:45 am - 10:45 am Understanding Oppositional Cyberattack Strategies and Mimicking Them to Create Realistic Soldier Trainings
· Moving beyond the white card method of simulating attacks on communications
· Gaining tools to better simulate cyberattacks
· Increasing warfighter safety by making training as realistic as possible
10:45 am - 11:00 am Morning Networking Break
11:00 am - 1:00 pm Preparing for Quantum: Understand How Quantum Computing Will Change Cyber Attacks
· Endgames in the race for quantum computing-desired capabilities
· Discovering the new threats quantum poses on connected vehicles
· Evaluating the benefits and threats quantum poses to Defense Community networks
Dr. Lily Chen
Manager, Cryptographic TechnologyNational Institute of Standards and Technology
1:00 pm - 2:00 pm Networking Lunch
2:00 pm - 2:45 pm Know Your Enemy: Understand the Bad Actors behind Cyber Attacks
Targeting the origins of cyberattacks
Conceptualize the goals of near-peer competitors
Understand the strategic goals of cyber-attackers