Loading…
Suits and Spooks: Innovative Problem-Solving On National Security Issues

“What we are creating now is a monster whose influence is going to change history, provided there is any history left.” (John von Neumann)

 When John von Neumann said those words in 1952, he didn’t mean the Atomic bomb that he helped create as a scientist with the Manhattan Project. He was referring to his revolutionary work in high speed computing. Over sixty years later, the computer has revolutionized every aspect of our life – from currency to medicine to warfare. Our almost total reliance upon insecure software and hardware has made the world less safe, and has fundamentally changed the power equations between State and Non-State actors. 

Suits and Spooks 2017 will focus on identifying the world’s most valuable new technologies, who the threat actors are that are looking to acquire them, and what can be done to stop them.

Admission is $549 for industry, and $375 for full-time government, military, or academia employees. Visit SuitsandSpooks.com to register.

Nation States [clear filter]
Wednesday, January 11
 

3:45pm EST

4:15pm EST

Shadowbrokers, Attribution, and Responsible Disclosure
Who are the ShadowBrokers? Their disclosure of stolen NSA documents on Pastebin assisted in assigning responsibility of the Equation Group threat actors to the NSA. This panel, moderated by Anup Ghosh, will explore the complexities of attribution and responsible disclosure as well as the problem of proliferation of malicious code including Zero days. Panelists to be named soon.

Moderators
avatar for Anup Ghosh

Anup Ghosh

Founder and CEO, Invincea
Anup Ghosh, Ph.D., is Founder and CEO at Invincea. Prior to founding Invincea, he was a Program Manager at the Defense Advanced Research Projects Agency (DARPA) where he created and managed an extensive portfolio of cyber security programs. He has previously held roles as Chief... Read More →

Speakers
avatar for Paul Kurtz

Paul Kurtz

CEO, TruSTAR Technology
Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years... Read More →
avatar for Andrey Nikishin

Andrey Nikishin

Kaspersky Lab
Special Projects Director, Kaspersky Lab In a career that stretches back to the early days of Kaspersky Lab, Andrey Nikishin worked as a Senior Software Engineer and Architect before moving to the Strategic Marketing Department as a Product Strategy Manager. Prior to his present... Read More →
avatar for Gunter Ollmann

Gunter Ollmann

Chief Security Officer, Vectra Networks, Inc.
Gunter Ollmann is a seasoned veteran of the Information Security world - successfully defining and trail-blazing new security markets, inventing revolutionary classes of technology, building and leading globally recognized research teams, revitalizing and constructing high margin... Read More →


Wednesday January 11, 2017 4:15pm - 5:00pm EST
CEB Waterview Conference Center 1919 N. Lynn Street, Arlington VA 22209
 
Thursday, January 12
 

11:45am EST

Conception of State Responsibility and Spatiality: Militarizing Cyberspace from Chinese Perspective

Through human’s military history, with technology innovation, military activities expand to new space seemly to happen, for example, navy and maritime, air force and sky. Hence, the author assumes militarizing cyberspace is irreversible trends. The process of militarized space includes the established legislation, institution and principle. The international legislation and regime-building towards militarized cyberspace is effective measure to prevent inter-state strategic rivalry similar as the nuclear balance of terror in Cold War, global terrorism network, and unnecessary collateral damage from abusing of force in practice and potential.   

China has been increasingly important player in the international regime-building of cyber security. Since 2013, cyber security has been significant content within the framework of China-US Strategic and Economic Dialogues (S&EDs). China holds its understanding on establishing international order of cyber space, attaching importance of state responsibility and sovereign. It can be understood that China insists territory principle under international law. Security is fundamental to sovereign. At the same time, the concept of boundary is key to Chinese traditional political and military philosophy. State responsibility and boundary is in direct contradiction to cyberspace characterized with open. 

In this paper, the author explores the influence of China’s concept of state responsibility and spatiality on policy-making communities in Beijing within theoretical framework of strategic culture. The following sections constitute this paper:

  • Theoretical framework: the interaction between political philosophy and strategic culture and political making-decision; 
  • Conception of state responsibility and spatiality in Chinese traditional political/military philosophy; 
  • China’s policy-making community of cyber security 
  • Conclusion and suggestions

Speakers
avatar for Peiran Wang

Peiran Wang

Peiran Wang, doctoral fellowship, the Faculty of Law and Criminology, Vrije Universiteit Brussel (Free University of Brussels) Belgium. International engagement of cyber space is and will be his permanent research interest. In the past 5 years, Peiran Wang published several articles... Read More →


Thursday January 12, 2017 11:45am - 12:15pm EST
CEB Waterview Conference Center 1919 N. Lynn Street, Arlington VA 22209

2:00pm EST

Will the World Be Safer Or More Dangerous Under A Trump Presidency?
Over fifty GOP national security officials signed a letter saying that "Donald Trump would be a dangerous president and put at risk our nation's security and well-being." The mission of Suits and Spooks has been to tackle tough questions and none is more timely or important than this one. This panel of military and intelligence experts from the U.S., Britain, and Israel will discuss how the global security paradigm will change under the presidency of Donald Trump and his Cabinet. 

Speakers
avatar for Allan Dykman

Allan Dykman

Director of Business Development and International Liason, Ametos
Allan Dykman serves as Director of Business Development and International Liaison for the global strategic solutions firm Ametos.  He is a skilled and highly regarded security expert with years of training in an elite Special Forces Unit of the IDF, Counterterrorism Units, and several... Read More →
FF

Fred Finan

Fred is a former member of both the British Military Intelligence and MI5 (the Security Service).  He started his Intelligence career as the youngest person to be successfully undergo the training and selection process to join a sensitive British Army Covert Intelligence unit operating... Read More →
avatar for John Robb

John Robb

Hi, I’m John Robb. I spent last year working for the Chairman of the US Joint Chiefs of Staff on his vision for how AGI and robotics would transform how the Joint Force fights in 2035. Here are some details on my background: USAF Academy: Honors Program. BS in Astronautical Engineering... Read More →
avatar for Erin Simpson

Erin Simpson

Founder & CEO, Archer Avenue Consulting
Erin is the founder and CEO of Archer Avenue Consulting, working at the intersection of data science, intelligence, and national security, with a particular interest in helping organizations stand up new data science teams and translate existing data streams into new products. She... Read More →


Thursday January 12, 2017 2:00pm - 2:45pm EST
CEB Waterview Conference Center 1919 N. Lynn Street, Arlington VA 22209
 
Filter sessions
Apply filters to sessions.