Security Solutions Conference 2012
April 16-19 Tampa Florida, Tampa Marriott Waterside
Security Solutions 2012 Highlights
Government and military cybersecurity experts gathered once again in Tampa for Security Solutions 2012, held April 16-19, 2012.

Here's a recap:

Five Key Takeaways

  Download the takeaways document
Download an analysis of these Five Key Takeways from Security Solutions 2012. (PDF; 2pp)

A number of high-level themes grew out of the keynote presentations, panel discussions and track sessions at this year's conference:

Greater efficiency, greater effectiveness
  • Shrinking budgets will drive better solutions
A secure Joint Information Environment is critical to
mission success
  • Cyber is an inherently joint domain; without a joint network, there is no joint warfighting capability
A seamless network from HQ to the field — including cybersecurity
  • Consistent capabilities from the garrison to the field, supporting all applications, modalities, and devices
Collaboration with industry
  • The partnership between government and industry will make the difference in mission success
Training and culture: the human element
  • More venues like Security Solutions are needed for exchanging ideas to ensure best cyber practices 

Daily Recap

Monday, April 16

Telos TAPS golf outingIt was a gorgeous day for a "good walk spoiled" as more than 100 attendees took part in our annual charity golf match at the Westchase Golf Club in Tampa.  This year's outing once again benefited the Tragedy Assistance Program for Survivors (TAPS), with $5,000 raised to support families grieving the loss of a loved one serving our country.

Icebreaker reception by the marina at the Tampa Marriott WatersideDining, dancing and music by the marina were part of the festive environment at the Icebreaker Reception that evening, sponsored by Aruba. It was a great way for colleagues in government and industry to get caught up on news and trends in their fields. The day's achievements on the links were noted, with prizes going to first, second and third place teams, with Col Dave Babyak getting closest to the pin and Col Dave Stickley making the longest drive. 


Tuesday, April 17

L to R: Don and Michele Carey for TAPS; Charisse Stokes; Maj Gen John Maluda (USAF, Ret.); and LTG Charles S. Mahan, Jr. (USA, Ret.)Day 2 started with an engaging conference introduction by Charisse Stokes, Telos vice president for Cyber Operations and Defense.  Ms. Stokes and Telos board members Maj Gen John Maluda (USAF, Ret.) and LTG Charles S. Mahan, Jr. (USA, Ret.) also presented the check from the golf outing to Michele and Don Carey on behalf of TAPS; her son, Marine Cpl Barton R. Humlhanz, was killed in action in 2004 in Operation Iraqi Freedom.

LTG Susan S. Lawrence gives the keynote address at Security Solutions 2012Gen. Maluda then offered a hearty welcome to the attendees and introduced the week's keynote speaker, LTG Susan S. Lawrence, Chief Information Officer/G-6, United States Army. Her message focused on the critical need for a unified joint network protected by advanced cybersecurity.

Her remarks were followed by a panel discussion that picked up where last year's closing panel left off:  "Exploiting Cyber in Joint DoD Operations," addressing how multiple services interact and work in a "purple" cyber domain.  The session was moderated by Brig Gen Greg Brundidge, former Director of Command, Control, Communications and Warfighting Integration, USEUCOM.  Panelists included Brig Gen Gregory J. Touhill, Director, C4 Systems, USTRANSCOM; Col Thomas "Tank" Byrge, Director, J6, SOCOM; Col David W. Stickley, Mobilization Assistant to the Director, DISA; and Col David S. Babyak, AFSPC 3 CCG/CC. 

After the general session, attendees moved on to sessions in the four conference tracks.

The Information Assurance track opened with a two-part presentation on "Continuous Monitoring: A Risk Managed Approach," offered by Mr. Lance Dubsky, deputy director/IA, Chief Information Office, National Reconnaissance Office, and Ms. Jean Schaffer,  designated accreditation authority director, National Security Agency/Central Security Service.  Dubsky emphasized defining your continuous monitoring strategy and program up front, automating as much as possible, and focusing on security rather than compliance and paperwork.   Schaffer stressed the importance of a proactive approach rather than waiting for an alarm to go off after an incident occurs.

They were followed by an overview of mission assurance across a heterogeneous environment presented by Mr. James McDaniel, director of mission assurance, Air Force Personnel Operations Agency, and Mr. Andrew "Jake" Jacobs, acting chief of cyber infrastructure engineering, MHS Cyberinfrastructure Services (MCiS). Finally, Mr. Justin Furniss, director of Xacta development for Telos Corporation, led an overview of Xacta Flux's ability to satisfy continuous monitoring requirements through integration with CyberScope. 

The Secure Networks track kicked off with "DISA's Role in Cloud Computing," presented by Col David Stickley, mobilization assistant to the Director, DISA. He outlined key issues in cloud security, including defensibility, redundancy, and resiliency, and emphasized cloud computing and security in the context of the Joint Information Environment and the bring-your-own-device (BYOD) culture. 

Col Richard F. JanosoFollowing was Mr. Jon Green with Aruba Networks presenting on the role of Suite B – NSA's open set of crypto algorithms -- in delivering classified communications over commercial networks.  Col Keith Kane, AFSPC/A6, and Col Bill Polakowski, program director for CITS, covered "Cyber Integration: State of Lead Command and Acquisition."  Finally, Mr. Tim LeMaster, Juniper's vice president, systems engineering for the DoD Sector presented on security considerations for wired and wireless networks.

The Secure Communications track began with Mr. Mike Masters, Telos vice president of secure messaging, providing an overview of the Telos Automated Message Handling System (AMHS) in 2012. Two "day in the life" presentations followed: Mr. Milt Gregory, Telos AMHS Site Manager, on Bahrain J.A.C.C., and Mr. Jerry Keilsohn, Telos AMHS senior systems engineer, on the Pentagon Communications Center.  Mr. Tim Gilmore at the Pentagon Telecommunications Center gave an update on the Army and National Gateway. 

The Identity Management track featured two compelling presentations.  "Bringing New Identity Technologies to Physical and Logical Security" was moderated by Mr. Robert Brandewie, Telos ID senior VP, Identity and Security Solutions, and featured Mr. Mark Breckenridge, deputy director, DMDC, and 2012 Federal 100 Award recipient LTC Richard A. Faulkner, OSD AT&L.  They stressed that identity management is the foundation of all the other security solutions discussed at the conference; Faulkner in particular gave a sobering case study from Afghanistan of the importance of sound identity assurance. 

"NeCasino Nightw Trends in Airport Screening and Security" was moderated by Mr. Justin Oberman and featured Mr. Breckenridge and Mr. Brandewie. A particular focus was on the TSA's Designated Aviation Channeler (DAC) program, which is bringing new flexibility and responsiveness to the difficult tasks of credentialing airport and aviation employees.

Tuesday evening, attendees enjoyed the Casino Night gala, sponsored by Autonomy. Attendees tried their hands at roulette, blackjack, and other games of chance, danced to the tunes of a DJ, and were entertained by karaoke singers. The crowd was also astounded again this year by the feats of sleight-of-hand magician Lance Laska.

Wednesday, April 18

The day began with a panel discussion on "Supporting and Securing the Tactical Mobile Warfighter," moderated by Col Joseph Scherrer, commander, 689th Combat Comm Wing, with panelists Col Mark Langenderfer, commander, 435th Air Communications Group, Ramstein AB, GE; Col Art Wunder, director of communications and chief information officer, Air National Guard; Lt Col Karen Bosko, commander, 23d Combat Communication Squadron, USAFR; and Col Von Gardiner, director, C4, AFSOC. A key observation from their panel: "Without joint C4, there is no joint warfighting capability."

COL John Diaz

In the Information Assurance track, COL John Diaz, commander, Army Reserve Information Operations Command, provided an overview of "A Citizen Soldier's Future Role in Cyber."  He highlighted that the Army's cyber warriors are elite, trusted, and disciplined, and stressed the value of the reservists' civilian industry experience.

A wide-ranging panel discussion on software assurance in the DoD followed, featuring Mr. James Woodworth, chief, Application Software Assurance Center of Excellence, USAF; Mr. Sean Barnum, Cybersecurity Principal, Mitre Corporation; Mr. Kris Britton, director, NSA Center for Assured Software; Mr. William Tooke, ASACoE superindendent for AFPEO EIS; and SSgt Terel Hayes from ASACoE.  They agreed on the need for common disciplines in software development and training developers to understand security. 

Dr. Ron Ross, senior computer scientist at NIST, gave an overview of the recently released NIST SP 800-53 Rev 4, which reflects an active cyber defense vision that includes risk-aware mission and business processes, enterprise architectures with embedded information security, and robust continuous monitoring. The day wrapped up with an Xacta IA Manager User Group Meeting.

The Secure Networks track opened with an AFNIC mission overview and AF CoN process update, delivered by Col Richard F. Janoso, AFSPC AFNIC/CV.  He was followed by Col Arthur G. Hatcher, Jr., PACAF/A6, who presented on the PACAF mission and C4ISR challenges."Organizing Cyber for the Current and Future JTF" was the theme of the next presentation, given by Col Stephen Corcoran, JCSE/CC.  Their day concluded with a demo of the SE7EN Mission Planning and Command and Control collaborative applications given by Mr. Jeff Schneider, Telos director of emerging technologies.

John QuadererOver in the Secure Communications track, Mr. John Quaderer, Telos' AMHS program manager, gave an overview of Telos secure messaging solutions' support of the intelligence community's Information Transport System (ITS).  Mr. Andrew Ferguson with eNitiatives presented on Telos Secure Directory solution, followed by an overview of advanced video analytics given by Mr. Sam Kalbag, vice president of global accounts for Autonomy. Finally, the Telos Secure Information Exchange Development Team gave a demo of Telos collaboration tools and their interaction with Official Information Exchange (OIX).  

The day concluded with an after-hours ceremony for Telos employees and the presentation of the Telos 2011 Core Values Awards.  Telos CEO Mr. John Wood presented the award for individual achievement to Ms. Charisse Stokes and for team achievement to the Bahrain J.A.C.C. AMHS team, represented at the conference by Mr. Milt Gregory.


Thursday, April 19

Brig Gen Greg Brundidge was the closing speaker for Security Solutions 2012Thursday began with an outstanding presentation by Brig Gen Greg Brundidge on "Transforming to Enable Integrated Cyberspace Operations," focusing on the importance of a Joint Information Environment and joint cyber operations and including an overview of suggested "laws and principles" for the cyber domain. 

Following was a compelling panel discussion on "Enabling/Equipping the Joint Warfighter to Operate in Tomorrow's Fight."  The moderator was Brig Gen (Sel) Kevin Wooton, Commander, 67th Network Warfare Wing, with panelists Mr. William Marion, ACC/A6 chief technology officer; COL Randy Bland, USSOCOM/J63; Col Arthur G. Hatcher, Jr., HQ PACAF/A6; and Col Eric Pierce, AFISRA/A6. A resonating conclusion was that "cyber is everyone's business now," and the hopeful (if perhaps paradoxical) observation that "shrinking budgets are going to drive us to develop better solutions." 


 


We surveyed attendees after previous Security Solutions conferences about their experiences at the event.
Here are just a few of their responses:
.............................................
"Great information presented, valuable exchange, great opportunities to meet vendors and peers."
.............................................
"Of all the conferences I've attended in my career with the government, this is by far the finest, best-orchestrated, productive, and informative one I've ever been to."
.............................................
"Without a doubt the most informative, educational, thought provoking and beneficial conference that I attend."
.............................................
"This is the best conference for Security/IT."
.............................................
"Best forum I’ve attended... the optimum atmosphere for interchange... I got more meaningful work done here than I would have if I was at the office."
.............................................
"Speakers did an oustanding job of providing the real picture of IT needs in today's military."
.............................................
"The speakers were all subject matter experts in their fields. I'll be back next year!"
.............................................
"The conference, facilities, and location were excellent."
.............................................
"Perfect combination of group sessions and one-on-one access to the experts."
.............................................