10 Oct - Human Behavior
|9:00-9:30 Opening Remarks||
Dr. Mary Ann Hoppa (Norfolk State University)
Dr. Stacey F. Jones (Provost, NSU)
Robert Hoppa (Rear Admiral, U.S. Navy (Ret.))
Charlotte Hurd (Commander, U.S. Navy (Ret.) & Military Liaison, Office of U.S. Senator Mark R. Warner)
Tim Kroecker (Air Force Research Lab/Rome)
Serge Da Deppo (Innovation Hub, NATO Transformation Command)
|9:30-12:30 Online-Onsite Sessions||
Sociocultural Behavior Influence in Cyberspace : Current Assessment Work and Research Frontiers
Mike Bernard (Sandia)
This talk will explore the development of a sociocultural/geopolitical computational modeling capability, called DYMATICA. DYMATICA is being used to assess the decision-making, human dynamics, and impacts underlying targeted, state-sponsored messaging within the cyber domain.
Dispositional Deception: Using the Dark Triad to detect cyber-attacks and vulnerabilities
Dan Jones (University of Texas at El Paso)
Little is known about dispositional predictors of cyber-attacks. From a personality perspective, manipulation and deception are prerequisites for engaging in cyber-attacks. However, manipulative personalities and approaches to deception come in (at least) three different forms. We will discuss the implications that different approaches to deception have on cyber-attacks and security-related issues.
The Role of Cultural Values in Cyber Security
Char Sample (ARL)
Cultural values inform and shape the human thought process, these values provide guidance that define acceptable norms of behavior in the physical world. The research being discussed extends the examination of cultural values into the cyber environment, in particular the cyber security realm. This discussion will briefly highlight some of the studies performed to date before opening up the discussion on the role of cultural values in cyber security and the next steps for this research.
|13:30-14:30 Online-Onsite Session||
Privacy and Trust in Online Environments
Grainne Kirwan (IADT, Ireland)
Why do we trust those who we have never met? The reasons for inappropriate disclosure online are considerable, and it is a difficult behaviour to alter. This talk considers some of these reasons, and in particular examines the role of trust in relation to privacy, cybercrime susceptibility, and the requirements of certain cybercrimes (e.g. ransomware) to engage the trust of the victim in order to be successful.
Modeling Humans in Cyber: theories, models, and challenges
Daniele Vernon-Bido (ODU)
While humans are an integral part of cybersecurity, research that considers their behavior and potential actions remains scarce. People play distinct roles in cyber systems: users, aggressors and defenders all while having an impact in organizations small and large. We report on current research efforts that seek to capture existing theories of crime and behavior in computer models and the challenges and limitations of these implementations.
|14:30-16:00||Onsite only Session|
11 Oct - Technology Aspects: Blockchain Solutions
|9:30-12:00 Online-Onsite Sessions||
A Blockchain-based Trusted Information Sharing Framework
Sachin Shetty (ODU) and Deepak Tosh(NSU)
Efforts supported by AFRL and DHS Center of Excellence Critical Infrastructure Resilience Institute (http://www.ciri.illinois.edu/) are aimed at producing a blockchain-based solution that will provide effective cyber security risk management through the sharing of cyber incidents. The presentation will explain how the proposed blockchain solution can facilitate anonymous and privacy-preserving sharing of cyber incidents and analysis via a repository that provides actionable threat intelligence for supporting prediction, trending and additional analysis by stakeholders. The discussion component will focus on strategies for ensuring that cyber incidents are shared in strict confidence. Issues include how to strike a balance between sharing.
Assessing the Attack Surface of Blockchain Systems
Aziz Mohasein (UCF) and Lt Val Red (AFRL)
This talk will cover basic questions surrounding the security of blockchain technology. As a distributed peer-to-peer system that relies in its operation on the behavior of peers, multiple security threats are outlined due to various fundamental realities, such as stale and orphan blocks, blockchain forks, selfish-mining, equivocation, and privacy-issues through blockchain ingestion. To that end, this talk will explore the attack surface of blockchain technology and propose several potential solutions to address those attacks to enable a reliable use of blockchain for provenance applications, specifically: the basic properties of the blockchain as a mathematical concept and a distributed system; how those properties can be violated using various intended (due to malicious behavior) and unintended (due to reliability constraints) behaviors; and finally how these attacks can be mitigated by enhancing the current protocols.
Lunch Break: Panel of Experts – Cybersecurity Challenges and Opportunities
This event is open to students and faculty
|13:00-14:30 Online-Onsite Session||
Hyperledger: A Permissioned Blockchain Platform
Michael Osias (IBM)
IBM is supporting an open source effort to realize blockchain technologies across several military, government and commercial sectors. (https://www.ibm.com/blockchain/hyperledger.html) The open source effort is hosted by the Linux Foundation. IBM currently is providing blockchain as a service through Hyperledger technologies that can be readily used. This talk will cover IBM’s point of view on Blockchain technology, related to foundational and disruptive transformational aspects, key use cases for industry applications and adoption, and IBM’s go to market technology, services, and solutions for today and the future as the technology ecosystem evolves and matures.
Onsite only Session