Cybersecurity
TRACK 3
Cybersecurity: Threats to the Network of the Future
Stemmons B - 2nd Floor - Renaissance Hotel
There are constant large threats to the security and safety of businesses, individuals, government entities, institutions and countries, brought about by both obvious and elusive vulnerabilities in IT systems and networks. These threats affect all aspects of technology used in Internet of Things (IoT) devices, smart homes, intelligent vehicles, finance and banking, critical infrastructure, shopping, gaming and entertainment.
Learn about these cybersecurity issues at TIA 2016:
- Barriers with end-to-end network security
- Carrier competition in the network security space
- International cooperation for battling cybercrime
- Innovation frontiers in network security technologies
- Arming customers against crippling network disruption
- How cyberattackers leap over corporate defenses
- Impact of cyber attacks on the SMB market
- How malicious botnets are created
- Ransomware attacks on the rise
- How social networks enable cybercriminals
- Why the Internet of Things devices are more exposed than ever
- Nation state attacks on U.S. companies
- Exposing network vulnerabilities
MONDAY, JUNE 6 - TRACK 3 SESSIONS
The Cybersecurity Layer Cake
5G, IoT, Virtual Networks – each of these involves multiple layers of connectivity across networks that are licensed and unlicensed, public and private, and under continuing deployment. Each component in hardware and software along the line from antenna to the edge device will need to be protected. What are customers expecting? How are network operators and their partners using the NIST Cybersecurity Framework and other risk management approaches? How are engineers and developers thinking about the cybersecurity needs of the future? What is being developed now? And what is needed now to take the necessary steps forward?
-
Brian Finch
Partner, Public Policy PracticePillsbury Winthrop Shaw Pittman LLP
-
Herb Kelsey
Chief ArchitectGuardtime
-
Keith O'Brien
Distinguished Systems EngineerCisco Systems
-
Ian Hood
Chief Architect - Service ProviderRed Hat
-
Chad Pinson
Managing DirectorStroz Friedberg
-
Robert Mayer
Vice President, Industry and State AffairsUSTelecom
(Moderator)
Cloud, Fog, Mist – What's the Cybersecurity Forecast for IoT
As IoT products and services become increasingly sophisticated and granular, access points for cybersecurity breaches multiply. Edge and perimeter systems are particularly vulnerable, as mobile security is still underdeveloped. This session will look at the policy standards recommended by the U.S. government through NIST and foreign governments; carrier protection policies and related liabilities; and U.S. and international enterprise best practices for securing cloud infrastructure.
-
Mischel Kwon
President and Chief Executive OfficerMKA Cyber
(Moderator) -
Steve Johnson
Senior Project ManagerHNTB Corporation
-
Patrick Kerpan
Chief Executive OfficerCohesive Networks
-
Majid Bemanian
Co-Chair, Security Working Groupprpl Foundation
-
Joe Albaugh
Chief Security OfficerVivint
(Moderator)
The Next Waves of Cyber Threats in a Connected World
Money and control drive hackers to break, enter and steal. Waves 1 and 2 are the current norm, with impact on most corporations and government agencies being information-based (fraud, economic competition, strategic positioning, hactivism). Wave 3 targets critical physical industries – networks, electrical grids, oil and gas, manufacturing plants. The impact is physical not just information. This is already in play right now, just not overt and it exists at a low level of activity. Wave 4 is around the corner: overt cyber attacks against these same critical industries at a higher level of incidence. Today we say a system was breached. Information was lost. We will need different words for the impact of Waves 3 and 4. What will this mean for our connected networks, for the protection of data and life-sustaining infrastructure systems? Is there a way to protect protection? And how are companies and governments going to protect against such attacks? What needs to be done now to begin setting the groundwork for such protections?
-
Thomas Brown
Managing DirectorBerkeley Research Group
-
Dante Martins
Enterprise Cybersecurity DirectorThe AES Corporation
-
Jason Truppi
Director, Technical Account ManagementTanium
-
Joe Weiss
Managing DirectorApplied Control Solutions, LLC and ISA99
-
Carlos Solari
Chief Information OfficerMission Secure
(Moderator)
TUESDAY, JUNE 7 - TRACK 3 SESSIONS
NIST Cybersecurity Framework - Progress and Challenges Ahead: A USTelecom Policy Forum Series Session
Presented by

With every new report of hackers cracking through cybersecurity defenses come demands that government and industry do more to assure Americans that their data is safe. For the past eight years, the White House, Commerce Department, regulatory agencies and industry have worked closely to improve efforts to stay ahead of bad actors. USTelecom has been on the forefront of these conversations with its National Cybersecurity Policy Forum series. The series brings together top government and industry officials to discuss their key policy initiatives. This panel will discuss the NIST Cybersecurity Framework, which provides a blueprint for best practices for the core critical infrastructure industries, including the communications sector. The experts will review progress on the Framework, feedback from corporations that have begun using the principles, the impact on their operations, and further plans by government agencies and regulators in the cyber risk management arena.
-
David Simpson
Bureau Chief, Public Safety and Homeland Security BureauFCC
-
Evelyn Remaley
Deputy Associate AdministratorU.S. Department of Commerce
-
Chris Boyer
Assistant Vice President of Global Public PolicyAT&T Services Inc.
-
Nneka Chiazor
Vice President Public Policy & Government AffairsVerizon Communications
-
Adam Sedgewick
Senior Information Technology Policy AdvisorNIST
-
Charlie Mitchell
EditorInsideCybersecurity.com
(Moderator)
HACKED, by Charlie Mitchell, reveals the innovative, occasionally brilliant, occasionally hapless government and industry response to cybersecurity threats that just keep coming! Book signing will be held at the TIA Conference.
Securing the Smart Grid and Other U.S. Infrastructure
In 2014, U.S. utility industrial control systems were cyber attacked 78 times in a 12-month period. Growing intricacy, interconnectivity and sophistication of U.S. and international smart grids, roadways, bridges, tunnels, waterways, reservoirs and dams also increase their vulnerability. This session will review the latest in infrastructure vulnerabilities and breaches, possibilities for protection, and the steps that need to be taken now to ready for the future. The sessions will also review proposed standards such as one by Subcommittee TR-51, which is developing a new cybersecurity focused smartgrid standard.
-
Judd Carothers
President and Co-FounderUSA Fiber
-
Robert Sutton
Director, Global Cyber-Security Advisory and Consulting ServicesUnisys
-
Norma Krayem
Senior Policy Advisor, Co-Chair Cybersecurity and Privacy TeamHolland & Knight
(Moderator)
Customer-Centric Big Data and Cybersecurity
Healthcare, farming, retail, energy, automotive, and banking are some of the verticals using big data to facilitate, streamline, and automate operations. However: How do we balance data security with accessibility? How can companies make consumers feel safe and stay engaged while sharing their data in this time of continual database breaches? How can machine based IoT platforms and applications securely share, capture, manage and utilize the data they access? Join industry experts as they explore the delicate balancing of cyber security, technology innovation, and end user experience surrounding big data.
-
Steven Bullitt
Vice President, Cyber Forensics and InvestigationSolutionary
-
Robert Katz
Executive DirectorInnovation Intelligence Institute
(Moderator) -
Howard Rosen
Chief Executive OfficerLifeWIRE Corp.
-
Sundeep Sanghavi
Co-FounderDataRPM
WEDNESDAY, JUNE 8 - TRACK 3 SESSIONS
What Will Privacy Look Like in the Big Data World of 2026?
Big data offers vast opportunities for businesses to streamline, optimize and interoperate with other companies within and across sectors, speak with consumers, understand market needs and develop targeted products and services. It allows consumers to be better informed and choose to act more intelligently. The capture of that data may overstep the comfort levels of consumers. It offers benefits, but invades privacy. And this is in 2016; what about 2026? This session will look at how industries are making use of big data, what is being done to protect consumers from overzealous data gathering, what steps government is taking to protect consumer data, and what will be the trends going forward for data capture, retention, sharing and protection.
-
Richard Jay Johnson
Of CounselJones Day
-
Bill Conner
President and Chief Executive OfficerSilent Circle
-
Vic Hyder
Co-Founder and Chief Strategy OfficerSilent Circle
-
Stuart Carlaw
Chief Research OfficerABI Research
(Moderator)