Home   |   Contact
About Us Speakers Program Registration Venue Organizating Committee
Organizating Committee

 

Home - Program

 

NIKSUN Cyber Security and Mobility Conference Unites Industry and Government Leaders

Global industry leaders, security and mobility experts, government officials, and academia attended NIKSUN’s first World Wide Security & Mobility Conference (WWSMC) on July 25-27, 2011 to collaborate on new approaches to address today’s ever-growing cyber security threats. “The conference acted like a bridge, connecting the initiatives of industry, government, and academia,” said Dr. Parag Pruthi, Founder and CEO of NIKSUN. “With 300 of these key leaders and security/mobility experts in one room, discussing the challenges that face us all, our collective ability to resolve complex network problems has taken on a whole new level.”  Princeton University and CTIF helped sponsor this successful event.

In a packed room, participants listened to prestigious speakers such as former Secretary of Homeland Security Michael Chertoff, Prof. Henning Schulzrinee of Columbia University – the “father of internet telephony”, and NIKSUN’s  Dr. Parag Pruthi, to name just a few.

Speakers provided a “big picture” view of the cyber security and mobility challenges that lie ahead, while laying the groundwork for some serious problem-solving -- crossing boundaries, eliminating silos, and “connecting the dots” across the cyber security spectrum.

Common ground was established, with a consensus that:

•     Cyber security problems are serious, and rapidly expanding in terms of sophistication, overall damage, and frequency of attack

•     Current methods for detecting and preventing these “malware” attacks rely too heavily on signature files, blacklists, and other outdated methods that are constrained in their reliance on known problems – these methods are destined to fail

•     A new approach is needed, combining real time behavioral analysis with the ability to store incoming and outgoing packets for after-the-fact forensic analysis, in order to determine what really happened, and quickly isolate the threat

NIKSUN plans to make the World Wide Security and Mobility Conference (WWSMC) an annual event, and is already gearing up for 2012. “With the current state of cyber security, NIKSUN is clearly in the right place at the right time,” said Dr. Parag Pruthi. “Our products address a number of critical problems facing industry, government, and academia today, providing an over-arching solution to manage and eliminate escalating threats.”


Day 1 : July 25th 2011
Track A: General Session: CTIF, IEEE's Members, Guests, NIKSUN's Customers/Resellers/Employees
Time
Title Speaker
7:30am-8:30am Breakfast
Track A: General Session: CTIF, IEEE's Members, Guests, NIKSUN's Customers/Resellers/Employees
9:00am-9:25am Welcome Remarks Dr. Parag Pruthi, Founder, Chairman & CEO
9:25am-10:25am

Keynote: Past, Present, and Future: Understanding Where the Puck is Going

Abstract: If all of the hackers and cybercriminals were joined into a single company, it would be one of the largest, most profitable and fastest growing companies in the world! Unfortunately, this phenomenal growth of cybercrime is putting our national infrastructure, commerce engine, and physical & digital lives at risk.  Governments around the world have an even tougher job as they must continue critical missions affecting national security matters while constantly under cyber security fire from borderless enemies.

After touching upon a brief history of cyber security, this session will discuss the most notable and disturbing trends that we are witnessing today.  It will then gaze into a crystal ball to understand the issues we as a society and security industry must tackle to proactively secure our digital future.

Mr. Vimal Solanki, Senior Vice President, Corporate Strategy & Intel Office
McAfee, Inc.
10:25am-10:50am
Coffee & Networking Break
10:50am-11:50am

Securing the AF Internet

Abstract: The AF is in the midst of an unprecedented modernization of its 850,000-user, global, data and voice network.  The desired end-state is "One AF, One Network," which provides the backbone for networked operations and delivers mission assurance 24/7.  Though there has been much recent success, the road remains full of potholes and speedbumps.  Where does the AF stand today with this modernization effort and what lies ahead?  How should industry position themselves to provide network security for the AF in the future?

Col. Russell D. Fellers, Consultant

Click to view presentation

11:50am-12:30pm

Towards a theory of digital forensics

Dr. S. Raj Rajagopalan, Scientist, HP Labs

Click to view presentation

12:30pm-2:00pm
Lunch
2:00pm-2:45pm

Keynote: Strategic Challenges in Cybersecurity   
Speech will address emerging and evolving threats in cyberspace; consequences of those threats; range of public/private strategies to secure cyber domains. 

The Honorable Michael Chertoff, Co-founder and Managing Principal, Chertoff Group
2:45pm-3:45pm

Applying a Holistic Defense-in-Depth Approach to The Cloud (with a Dash of Application Security Thrown In)

Abstract: Lyons will present how to secure the Cloud, regardless of Cloud type.  It will feature the Northrop Grumman Cyber Security architecture model “The FAN™”, a layered cybersecurity defensive technology reference model along with “CyCape™” a cyber capability reference model. These reference models serve as a baseline for customers to build a secure architecture in the cloud that will keep data safe.  Lyons will outline how applying the cybersecurity “FAN™” to a Hybrid cloud architecture provides a much stronger security environment than would otherwise be possible. The approach is based on years of cybersecurity experience with government customers within the Department of Defense, intelligence community and federal marketplace.  Lyons will also discuss how to secure applications in the cloud/data center, using Commercial-Off-The-Shelf solutions (coupled with the right procedures) that will transform once vulnerable applications into bastions of safe, secure IT services.

Mr. Barry Lyons, CISSP, Cyber Architect for Northrop Grumman Information Systems

Click to view presentation

3:45pm-4:05pm
Coffee & Networking Break
4:05pm-4:50pm Live Attack & Defend Session Dr. Peter Stephenson, Director, Norwich University Advanced Computing Center Chief Information Security Officer, also technology editor for SC Magazine
4:50pm-5:35pm

Threat intelligence for proactive network security - State-of-the-art and upcoming novel techniques

Abstract: Threat intelligence based on network analytics has emerged to become the proactive security layer complimenting signature-based systems.  Predictably, there are a variety of different approaches to gathering and distributing threat intelligence, and plenty of functional gaps. Tyson will speak about threat intelligence as it exists now and future techniques real-time information sharing and distribution.  This talk will touch on multiple level of detail, from ISO standard efforts in this area to new, novel technical solutions.

Mr. Tyson Macaulay, Director, Security Liaison Office, Bell Canada

Click to view presentation

5:35pm-5:45pm CEO Remarks Dr. Parag Pruthi, Founder, Chairman & CEO
5:45pm-6:35pm

A Computer Forensics View of P2P and File Sharing

Abstract: Although access to digital data is ubiquitous to everyday business life, P2P and file sharing applications can pose serious problems from a risks and information security standpoint. Often, when a legal issue arises where such information transfer modalities are involved, the lines between simple possession, knowledgeable possession, and intent to possess may become blurred, leaving companies and their employees open to serious and costly liabilities. This talk will also overview some of the caveats that IT and computer security professionals should keep in mind when they are dealing with computers that could contain potential evidence material. Managers and IT staff will benefit from learning about the ways that computer forensics involves much more than simply recovering and reviewing files found on electronic media. Issues related to triage processes, chain-of-custody, and the Federal Rules of Evidence will be described in detail, using illustrative examples from actual casework.

Dr. Rebecca Mercuri, President and Lead Forensic Expert, Notable Software, Inc
7:00pm-10:00pm
Reception and Dinner
.

Day 2 : July 26th 2011
Track B - Wireless Summit
Time Title Speaker
7:30am-8:30am Breakfast
  Track B - Wireless Summit
8:30am-8:45am Welcome Remarks Dr. Ashutosh Dutta, Prof. Ruby Lee
8:45am- 9:00am NCSC Remarks Dr. Parag Pruthi, Founder, Chairman & CEO
9:00am-9:45am

Keynote: A Robust and Trustworthy Mobility-Centric Architecture for the Future Internet

Prof. Dipankar Raychaudhuri, Rutgers University

Click to view presentation

 

9:45am-10:15am

On security-energy tradeoffs and cooperation for wireless ad hoc networks

Dr. Cristina Comaniciu, Stevens Institute of Technology

Click to view presentation

10:15am-10:45am Coffee & Networking Break
10:45am-11:00am Princeton University Remarks Prof. H. Vincent Poor, Dean, School of Engineering and Applied Science, Princeton University
11:00am-11:30am

Opportunities Landscape in the Digital world

Mr. Debasis Bandyopadhyay, Vice President – CTO, TCS, India

Click to view presentation

11:30am-12:00pm

M Payments-Security Risks and Mitigation Measures

Mr. T.R. Dua, GISFI

12:00pm-1:00pm Lunch
1:00pm-1:15pm CTIF  Remarks Prof. Ramjee Prasad, CTIF
1:15pm-2:00pm

Keynote : 3GPP SAE/LTE Security

 

Dr. Anand R. Prasad, Senior Expert at NEC Corporation, Japan

Click to view presentation

 

2:00pm-2:30pm

Dynamic Trust Management for Mitigation of Malware in P2P Networks

Dr. Roberto Rojas-Cessa , Associate Professor of Electrical and Computer Engineering, NJIT University

Click to view presentation

 

2:30pm-3:00pm

A Theory of Privacy and Utility for Data Sources

Dr. Lalitha Sankar, Research Scholar at Princeton University

Click to view presentation

3:00pm-3:30pm Coffee & Networking Break
3:30pm-4:00pm

Optimal Service Delivery in Mobile Networks

Dr. Ashutosh Dutta, Senior Scientist, NIKSUN

Click to view presentation

4:00pm-4:30pm

Security Implications and Considerations for Femtocells

Mr. Marcus Wong, Wireless Advanced Research & Standards organization of the Huawei North America R&D center

Click to view presentation

4:30pm-5:00pm

Security issues with a Situational Awareness Service

Mr. Phiroz Madon, Telcordia Technologies

Click to view presentation

5:00pm-5:30pm

A Short History of Radio

Prof. Fredric J Harris, Signal Processing Chair Professor of Electrical and Computer Engineering, San Diego State University

Click to view presentation

5:30 pm-5:45pm Closing Remarks Prof. Ruby Lee, Professor of Electrical Engineering at Princeton University
5:45pm-7:00pm Reception
7:00pm Dinner
 
Day 3 : July 27th 2011
Track B - Wireless Summit
Time Title Speaker
7:30am-8:30am Breakfast
  Track B - Wireless Summit
8:45am-9:00am Welcome Remarks Dr. Neeli Rashmi Prasad, IEEE Senior Member, Director of CTIF-USA, Princeton
9:00am-9:45am

Keynote: A tale of two networks (2020)

Abstract: Computer networks have become indispensable parts of the infrastructure, which means that people only notice them when they do not work. However, the next few years are likely to bring a number of fundamental changes to deployed networks: For example, after 150 years, the circuit-switched telephone system will largely fade into the far edges of the network, along with over-the-air TV. Two visions of IP networks are likely to struggle for supremacy: on the one hand, the network assumed by most researchers - open, IPv6, application-neutral, subject to provider competition and offering ample capacity. However, we may see instead IP networks with dedicated functionality, with charges depending on the content carried and controlled by a very small number of vertically-integrated providers that own all components, from the fiber and spectrum, to the entertainment video content carried on the network. The talk will also reflect on the Open Internet debate and the challenges of severely limited spectrum in most urban areas.

Prof. Henning Schulzrinne, Columbia University

Click to view presentation

9:45am-10:15am

E-Health - Chances and Challenges of Distributed Service oriented Architectures

Dr. Christoph Thuemmler, E-Health at Edinburgh Napier University in Edinburgh Scotland

Click to view presentation

10:15am-10:25am TBD Mr. Rajan Mathews, director general of COAI
10:25am-10:45am Coffee & Networking Break
10:45am-11:15am

Self-Protecting Communications

Dr. Anjur Krishnakumar, Director of Networked Systems Research at Avaya Labs

Click to view presentation

11:15am-11:45am

Alice, Bob, and Eve get Physical: Perspectives on Introducing Physical Contexts into Securing the Future Internet

Abstract: Although traditional security solutions, i.e. cryptographic protocols that work in isolation, are an essential step to understanding how to secure networks, they do not represent a holistic approach. Just as there are significant performance gains to be achieved when combining information from multiple layers to build improved MAC and routing functions, so too is there the potential to significantly improve the security of the future Internet by considering cross-layer approaches to security. The network modality that promises the most opportunities for cross-layer design is wireless. Physical properties, outside the normal purview of the network, such as the device itself, or the location of communicating entities, or even the physical properties of the signals being transmitted, can serve as cross-layer information for enhanced security. In this talk, we will examine the use of cross-layer mechanisms that pull information from the device, from location, and from the physical layer itself to open up a new frontier for security design.

Prof. Wade Trappe, Associate Professor in the Electrical and Computer Engineering Department at Rutgers University

Click to view presentation