29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

W ashington A rea T rustworthy C omputing H our
14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
16th WATCH: Security, Cybercrime and Scale Cormac Herley Microsoft Research THURSDAY March 21 st, Noon, Room 110 W ashington A rea T rustworthy C omputing.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
The 2009 Cloud Consensus Report July 28, 2009 Bringing the Cloud Down to Earth Sponsored by the Merlin Federal Cloud Initiative.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Enterprise Architecture and the Architect.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2007 IBM Corporation © 2009 IBM Corporation 1 Tran Viet Huan, PhD CTO, IBM Vietnam IBM Research Global Technology Outlook.
Real world cloud computing challenges Giedrius Markevičius Territory account manager.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Welcome. eworks Seminar Series The n e twork: Building the Foundation for eBusiness Chris Parsons Senior Vice President Business Development and Strategy.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Sept 29-30, 2005 Cambridge, MA 1 Grand Challenges Workshop for Computer Systems Software Brett D. Fleisch Program Director National Science Foundation.
Edward Seidel, Assistant Director Directorate for Mathematical and Physical Sciences.
IT Innovation Driven Service Based Economy: Building Blocks Dinesh Dhamija, Ph.D. Senior VP and Chief Strategy Officer TDCI Inc. CETI Industry Day June.
Paul King Director, Threat Intelligence CiscoSystems.
COMPETING WITH INFORMATION TECHNOLOGY
Transformation of Research and Education in the 21 st Century Edward Seidel Director, Office of Cyberinfrastructure National Science Foundation
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
11th WATCH: Security, Privacy, and Usability: Better Together Lorrie Cranor Computer Science & Engineering Science Policy Carnegie Mellon University THURSDAY.
Tom O’Reilly, CTO - TEEAM, VCE DIGITAL BANKING SUCCESS THROUGH THE EMC FEDERATION.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
+ Entrepreneurial Government: Why innovation needs to come from within International e-Government Forum 9-11 th April 2012.
IBM Bluemix Your gateway to cloud innovation Dejan Podgoršek IBM Ecosystem Development Manager, SEE IBM Slovenija.
Technology Assessment ISAT 655 Fall 2005 Day 1. Overview Introduction What we are doing here How we will do it - syllabus Definitions Organizations and.
Randy Beavers CS 585 – Computer Security February 19, 2009.
CETI Industry Day 2010 – Technology Focus areas Vijay Gopal Chief Technology Officer, Shared Application Nationwide Nationwide Confidential.
HPC Centres and Strategies for Advancing Computational Science in Academic Institutions Organisers: Dan Katz – University of Chicago Gabrielle Allen –
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
LAN of Milk and Honey: Ensuring safe networks through virtualisation Suné von Solms.
Welcome! 11 th Annual MOVES Research and Education Summit On behalf of MOVES Faculty, Staff and Students CDR Joseph A. Sullivan, PhD USN
Department of Computer Science and Engineering, and KINDI Laboratory for Computing Research Joint Seminar Cloud computing is a paradigm shift to a new.
33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,
Courses & Certifications Networking Academy courses are designed to help students prepare for career opportunities, continuing education, and globally.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Joint Information Systems Committee Bridging the gap between ICT support services and researchers challenges and opportunities Matthew J. Dovey JISC Programme.
State and Future of Computing Mary Lou Soffa
Total Enterprise Mobility Comprehensive Management and Security
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Cloud Storage Market Share,
Cybersecurity as a Business Differentiator
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
1st BSMA/MassBIO Conference Boston Marriott Cambridge, MA April 26
How Smart Networks are Changing Corporate Networks
The 4th Industrial Revolution (4IR)
Software Defined Data Center Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Unified Communications and Collaboration Market to grow at 9% CAGR from.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Software Defined Networking Market to grow at 54% CAGR from 2017 to 2024:
Virtual Private Network (VPN) Market
What are your Career Options?
Cloud Helps Company Scale to Demand for Growing Healthcare Provider Field MINI-CASE STUDY “Microsoft Azure gives us the opportunity to focus on the task.
Cybersecurity ATD technical
Computer Services Business challenge
Silvia Losco, ISTAT, Strategies and approaches for managing risks in the official statistics production: ISTAT experience in the.
Sonnet Insurance Company
Presentation transcript:

29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy C omputing H our NSF Stafford I Room 110, Noon Public Invited Abstract The next wave of the Internet is disrupting everything and creating new ways to do business. The Internet of Everything (IoE) is changing our daily lives, from the way we provide healthcare to heating our homes to running our manufacturing facilities and other critical infrastructure. The changing nature of computing due to the Digital Economy and the IoE brings tremendous economic opportunity, coupled with tremendous security risk. In today’s world of IoE, cybersecurity is not just a top consideration, but one that is foundational to enabling people and organizations to gain greater value from IoE advancements. As more organizations adopt new business models related to mobility, cloud, and the IoE, their security operations, technologies and solutions must evolve to keep pace and adapt quickly to address these new and unforeseen risks. Bret will discuss strategies for enabling organizations to implement security controls that offer effective protection for rapidly evolving environments and address security incidents—before, during and after an attack. As part of this discussion, he will outline examples of how these controls can create significant advantages in combatting sophisticated attacks. Speaker As VP & CTO, Bret Hartman is responsible for defining the corporate security technology strategy for Cisco, as implemented by the Security Business Group. Bret has over thirty years of experience building information security infrastructures, including cloud, virtualization, SOA, Web Services, policy development and management, and security modeling and analysis. Bret has spoken at dozens of security industry events, and prior to Cisco held senior management roles at EMC, IBM, DataPower, Hitachi, and Concept Five. Bret started his career as a U.S. Air Force officer assigned to the U.S. National Security Agency. Bret has co-authored security industry specifications, security technology books, and a patent for enterprise application security integration. Bret holds a B.S. in Computer Science & Engineering from MIT and an M.S. in Computer Science from the University of Maryland. About the WATCH series: Transforming today’s trusted but untrustworthy cyberinfrastructure into one that can meet society’s growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology. WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program. Talks will be recorded and made available over the Internet. Questions/comments about WATCH? Contact Jeremy Epstein Thursday, June 18, 2015