The Security Innovation Network (SINET) 6th annual IT Security Entrepreneurs' Forum (ITSEF) takes place at Stanford University, March 20 & 21, 2012. ITSEF is the flagship event of the Security Innovation Network. ITSEF is designed to bridge the gap between the Federal Government, Silicon Valley and other centers of innovation, and they are highly regarded for the significant positive difference they are making in this domain.
ITSEF brings uniqueness to this community by providing a venue where entrepreneurs can interface directly with top government and industry executives in an intimate setting and informal conversation (See below partial list of speakers). The ITSEF objective is to facilitate public private collaboration that will advance innovation by connecting investors, builders, buyers and researchers in the Cybersecurity domain. Please visit http://www.security- innovation.org/ITSEF_2012-
From their website:
IT Security Entrepreneurs' Forum (ITSEF 2012)
Frances C. Arrillaga Alumni Center at Stanford University
Democratizing Security Innovation: Connecting Industry, Government & Academia
March 21, 2012 ITSEF Forum (Subject to Change)
7:30 AM - 8:30 AM Registration and Continental Breakfast
8:30 AM - 10:15 AM General Session
8:35 AM - 8:40 AM Master of Ceremonies
- Bob Bragdon, Publisher, CSO Magazine
8:40 AM - 8:45 AM Welcome Remarks: Stanford University Representative 8:45 AM - 9:00 AM Introductory Remarks
- Robert D. Rodriguez, Chairman & Managing Principal, Security Innovation Network
9:00 AM - 9:30 AM Opening Keynote 9:30 AM - 10:15 AM The Size of Economic Cyber Crime: Legacy Technologies and the Markets for Online Crime
- Richard Schaeffer, Principal, Security Innovation Network (Former Information Assurance Director, National Security Agency)
- Dr. Ward A. Hanson, Policy Forum Director & Research Fellow, Stanford Institute for Economic Policy Research
- A.T. Smith, Assistant Director, United States Secret Service
- Marc Goodman, Global Security Advisor/Faculty Member, Chair for Policy, Law & Ethics, Singularity University
- Bob McCullen, Chairman, CEO & President, Trustwave
As Thomas Schelling pointed out long ago, economically oriented crime fits into categories based on the criminals' roles. In the Schelling framework, two key functions of economic cybercriminals are organized burglary and extortion. While both of these are present online, in dollar value organized burglary dominates. Some of the most serious cyber weaknesses are due to legacy technologies that lack modern security features. A leading example is the U.S. credit card system. Insecure cards, terminals, and point-of-sale systems create a thriving market in stolen card numbers and active law enforcement crackdowns. Policy measures limiting the liability of consumers and hardware providers reinforce this weakness. Other countries, using more modern encrypted systems, have a much lower incidence of online credit card information theft. The credit card example illustrates a general point, about to become much more serious. Unless legacy systems are properly protected, or replaced with modern enhancements, the approaching "Internet of Things" creates many new markets for cybercrime. In essence, we are about to create an assortment of new legacy weaknesses. Governments at all levels - state, federal, and international - should work to minimize this collateral impact of ubiquitous networking. Chief among these actions are ensuring the proper incentives for the private sector.
10:15 AM - 10:40 AM BREAK
10:40 AM - 11:55 AM General Session
10:45 AM - 11:05 AM Why Wall Street is Interested in Cyber Security
- Ward Waltemath, Vice President, Head of IT Security Investment Banking, Goldman Sachs
The rise in organized crime and state sponsored cyber attacks has elevated the profile of IT security for both corporations and governments who have increased budgets associated with protecting against these threats. At the same time, capital is flowing to startups who are innovating new technologies to counter these threats. As these companies gain traction in the market and deliver sustained growth and returns, public market investors and large technology systems vendors have taken notice and are providing attractive liquidity opportunities for investors and entrepreneurs. As a result, IT security has become one of the most important sectors in the technology landscape today.
11:05 AM - 11:55 PM Has the Rapid Evolution of the Smart Grid Infrastructure Outpaced Policy, Security Applications and Interoperability Security Standards?
Smart Grid is rapidly advancing throughout North America at a rate that is seeing more IT infrastructure deployed in new and integrated ways than there are standards to establish appropriate security practices to protect this new and vital infrastructure. Traditional meter vendors, as well as new smart grid technology vendors are bringing products to market at a rapid pace that may be too fast to ensure appropriate security-by-design given the complex, interoperable and often public environment where these technologies will reside for many years to come. Industry analysts, security professionals, media and government agency leaders alike are expressing concerns over the pace of deployment and a lack of interoperability standards amongst other key concerns. As smart grid extends the electricity grid, a fundamental component of our critical infrastructure into the front lines of the cyber landscape, what trends relative to risk, threats and vulnerabilities are already evident. Where are solutions in critical infrastructure protection required? What roles do innovation and emerging technologies play in this? Have we already put our social and economic stability at risk by exposing the electricity grid to would-be hackers and foreign terrorists?
Moderator & Opening Remarks:
- Mark Weatherford, Deputy Under Secretary for Cybersecurity, Department of Homeland Security, National Protection and Programs Directorate (NPPD)
- Doug Powell, Chief Security Officer, BC Hydro
- Ernie Hayden, Managing Principal - Energy Security, Verizon Global Energy & Utilities
- James W. Sample, Chief Information Security Office, Pacific Gas & Electric (PG&E)
11:55 AM - 1:10 PM Networking Lunch/Information Sharing Hour
McCaw Hall Lawn
The ITSEF is providing the opportunity for attendees to sit down in an informal and intimate (8 - 10 per table) setting with security leaders from private industry, Federal Government and venture capital. This optional "Information Sharing Hour" is designed to promote awareness, education and learning opportunities on how solution providers can best shape their vision, roadmap and assess their current path to meet the market needs.
- Pat Muoio, Chief, Trusted Systems Research, National Security Agency, National Security Agency (NSA) - "Virtualization in the Secure Mobility Ecosystem"
- Mary Ann Davidson, Chief Security Officer, Oracle - "The Turn of the Security Screw: How to Raise the Bar, and When and How to Escalate"
- Michael Coomes, Director, International Information Assurance, DoD Chief Information Officer - "Building International Relationships: What are other countries' requirements, priorities and potential resources?"
- Reynold Schweickhardt, Committee on House Administration, Director of Technology Policy
- Nick Shevelyov, Chief Security Officer, Silicon Valley Bank - "How to Make the Most Out of Your 30 Minutes Presenting your Solution to a CSO"
11:55 PM - 1:10 PM Private Luncheon for Media Only: Cyber Security Investment Trends for 2012 and Beyond: What’s Hot/ What’s Not
Fisher Conference Center
SINET hosts its second annual private press luncheon with leading VCs to discuss the hottest cyber security investment trends for 2012 and beyond. This luncheon will bring federal government cyber security buyers to the Silicon Valley to discuss technology needs, requirements and trends - and opening new business opportunities for start-ups, emerging growth companies, investors and researchers.
- Bob Ackerman, Founder and Managing Director, Allegis Capital
1:10 PM - 2:50 PM General Session
1:10 PM - 2:00 PM What Technologies Don't Exist Today that can Help us Tomorrow
The dynamics of our IT, privacy & social environment is constantly changing and at warp speed. Our challenges to provide a trusted, safe and secure operating platform continue to become increasingly more difficult. What technologies are paramount in order to secure a trusted network for our employees, customers & adequately address our national security needs? What are the solutions needed to address tomorrow' most critical requirements? It is clear that innovation is one of many answers to meet our task at hand. What areas can the early stage (the innovators) and large companies best help the industry and government with their most challenging Cybersecurity problems. One of SINET's goals is to provide a forum so both large and small solution providers can better understand the user's concerns and priorities.
- Rob Mancini, Chief Technology Officer, Government of the District of Columbia
- Richard Hale, Deputy Chief Information Officer for Identity and Information Assurance, Department of Defense (DoD)
- Debora A. Plunkett, Information Assurance Director, National Security Agency (NSA)
- Joe Sullivan, Chief Security Officer, Facebook
2:00 PM - 2:50 PM Open World: Looking Beyond the Online Culture of Social Media, Virtual Interactions, Security and Privacy
What is next to come and what types of behavior, risks and change should we be anticipating? As the online community grows from 6 billion to an estimated 10 billion users within the next ten years, what are the security, privacy and social implications of this new reality? How will R&D, legal, regulatory and cultural differences influence the ebb and flow of domestic & international information exchange? Is the anonymity of us all at risk?
- Patrick Heim, Senior Vice President, Chief Trust Officer, Salesforce.com
- Professor Tino Cuellar, Co-Director, Center for International Security & Cooperation, Stanford University
- Dr. David Gutelius, Chief Social Scientist, Jive Inc
2:50 PM - 3:15 PM BREAK
3:15 PM - 5:30 PM General Session
3:20 PM - 4:10 PM What are the Key Attributes that Lead to Successful Technology Transfer
- Professor John Mitchell, Computer Science Department, Stanford University
- Dr. Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security, Science & Technology Directorate
- Mendel Rosenblum, Associate Professor, Computer Science and Electrical Engineering Computer Science Departments, Stanford University
- Ted Schlein, Managing Partner, Kleiner Perkins Caufield Byers
4:10 PM - 5:00 PM How the Intelligence Community is Integrating All Levels of Technology Readiness with Opening Remarks by Dawn Meyerriecks
"Innovating with the United States Government" (USG) Just as there are a variety of venture capital models, the USG has a number of ways to interact with innovators. This panel will bring together representatives from the National Science Foundation, In-Q-Tel, IARPA and a "consumer" of USG interactions to discuss how some of the Government's innovation engagement models, answer questions and collect solution providers feedback that leads to quicker integration of needed innovative technologies.
- Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology & Facilities, Office of the Director of National Intelligence (DNI)
- Dr. Lisa Porter, Director, Intelligence Advanced Research Projects Activity (IARPA) (Invited)
- Dr. Farnam Jahanian, Director, National Science Foundation, Computer Information Science & Engineering Directorate (Invited)
- Steve Bowsher, Managing Partner & Executive Vice President, In-Q-Tel, Strategic Investment Strategy
- Adrian Turner, Chief Executive Officer, Mocana
5:00 PM - 5:30 PM Closing Keynote
- Teri M. Takai, Chief Information Officer, Department of Defense
5:30 PM Closing Remarks
- Robert D. Rodriguez, Chairman & Managing Principal, Security Innovation Network
5:30 PM - 7:30 PM Networking Reception
Latest posts by Bob Gourley (see all)
- Cognitio and ThreatBrief in People Magazine: Security tips for the general public - September 16, 2016
- Cloud Communications Alliance and Cyber Threats in the Cloud - September 16, 2016
- Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure - September 14, 2016