Past Presentations

Strategies for Protecting Critical Infrastructures From Cyberattack & Making Them More Resilient

Strategies for Protecting Critical Infrastructures From Cyberattack & Making Them More Resilient

  • Identifying weaknesses in the system to inform improvement decisions
  • Acquiring the tools to increase protection
  • Incorporating cybersecurity in the planning phase of new infrastructure projects

Fred Ruonavar, Chief Contingency Operations, DISA

Post-Quantum Cryptography and Standardization

Post-Quantum Cryptography and Standardization

  • Quantum key distribution (QKD) promises to provide perfect encryption
  • Hacking attempts of QKD transmission cannot go unnoticed by the administrator
  • The technology is using mostly commercially available technology to protect data

Dr. Lily Chen, Mathematician, Manager of Cryptographic Technology Group, National Institute of Standards and Technology

Russia’s Approach to Cyber Warfare

Russia’s Approach to Cyber Warfare

  • The role of cyber in Russian and Iranian doctrine and strategy
  • How Moscow and Tehran use cyber to achieve their objectives
  • Cyber capabilities and trends

Dr. Michael Connell, Principal Research Scientist, Center for Naval Analyses