The 2014 Cybersecurity Innovation Forum, to be held January 28-30, 2014, at the Baltimore Convention Center in Baltimore, Md., will focus on the existing threat landscape and provide presentations and keynotes on current and emerging practices, technologies and standards to protect the nation’s infrastructure, citizens and economic interests from cyberattack.
The goal of the forum—sponsored by the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence—is to identify a roadmap for active cyber defense through integrating trusted computing, information sharing and security automation technologies. Meeting organizers are bringing together expertise from the Trusted Computing and Security Automation conferences and discussions on information sharing into a single event. Merging several cybersecurity conferences takes advantage of the synergy of a broader audience of public- and private-sector cybersecurity employees.
Keynote speakers include Goldman Sachs Managing Director and Chief Information Risk Officer Phil Venables, Special Assistant to the President and Cybersecurity Coordinator Michael Daniels, and Chief Information Security Officer for the County of Los Angeles Robert Pittman. Other keynotes will cover industry views of the security threat, the Presidential Policy Directive on Critical Infrastructure Security and Resilience (PPD 21), impacts of PPD 21 and Executive Order 13636 on improving the cybersecurity of critical infrastructure, and the U.S. government’s collaboration with industry to secure our nation’s cybersecurity.
The forum offers four tracks—Trusted Computing, Security Automation, Information Sharing, and Research—where attendees will hear from government and industry experts and have opportunities for collaboration and networking.
The Department of Homeland Security, the National Security Agency and NIST are organizing the event. More information about the event and how to register can be found at www.nist.gov/itl/csd/2014-cybersecurity-innovation-forum.cfm.