2006 Workshop on The Trust Paradigm: Implementing Trusted Methods in Information Technology Management and Security
Program Chair: |
Mr. Richard C. Schaeffer, Information Assurance Director, NSA |
Workshop Chair |
Mr. Carlos Solari, VP, Security Solutions, Bell Labs |
Date and Time |
October 17, 2006, 8:00 am – 5:00 pm (reception to follow) |
Location |
Washington, DC |
Federal Information and Communication Technologies (ICT) managers face increasing challenges in meeting the intricate, diverse and often conflicting requirements for networking, security, system integration, and policy/regulatory compliance. There is a growing recognition across both government and industry that traditional approaches to solving these issues are both expensive and ineffective; stakeholders are increasingly motivated to look elsewhere for new and more effective methods of securing and managing critical information and communication assets. Workshop Goals: The workshop consisted of a highly interactive format where the nation’s key stakeholders engaged to collectively address these issues. Working sessions focused on clearly articulating the problem space and addressing existing, proposed, and developing standards and guidance, and defining future directions and solutions. The workshop agenda shown below show links to the appropriate presentations. The results of the experts voting can be obtained here: Trust Workshop Polling Results. |
|
|
7:30-8:00 |
Registration and Continental Breakfast |
8:00-8:10 |
Welcome: Program Chair, Richard C. Schaeffer, Information Assurance Director, NSA |
8:10-8:20 |
Introduction: Jeong Kim, President, Bell Labs |
8:20-9:00 |
Overview: The Trust Paradigm: Carlos Solari, VP, Security Solutions, Bell Labs |
Opportunities and Solutions |
|
9:00-9:10 |
Introduction: Chi-Ming Chen, AT&T Labs, Chair Elect, IEEE CQR |
9:10-9:30 |
E-voting: Mark Skall, NIST ITL |
9:30-9:50 |
Common Criteria: Audrey Dale, NSA |
9:50-10:10 |
The Bell Labs Security Standard: Carlos Solari, VP Security Solutions |
10:10-10:20 |
BREAK |
Trusted Platforms |
|
10:20-10:40 |
Intrinsic Vulnerabilities in ICT: Karl Rauscher, Chair IEEE CQR Advisory Board |
10:40-11:10 |
Trusted Computing Group: Mark Schiller, President, TCG |
11:10-11:30 |
MicroSoft: Steve Lipner, Director of Security Engineering Strategy |
11:30-11:50 |
Cisco: Greg Akers, SVP/CTO of Global Operations |
11:50-12:10 |
AT&T: John Nagangast, Director of Business Development and Information Assurance business unit, AT&T Government Solutions |
12:10-1:00 |
LUNCH |
1:00-1:20 |
HP: Mark Schiller, Director: Trusted Computing Strategy |
1:20-1:40 |
Sun: Glenn Brunette, Distinguished Engineer, Sun Microsystems |
1:40-2:00 |
Intel: Greg Clifton, Intel |
2:00- 3:00 |
|
How can trusted platforms support federal information security practices? |
|
How can federal policymakers capitalize on trusted platforms and solutions? |
|
How can we make trusted solutions ubiquitous to globally enhance the state of information technology? |
|
3:00-3:10 |
BREAK |
3:10-4:00 |
Breakout Group Reports and Discussion: Group Leaders |
To be led by breakout |
|
4:00-5:00 |
The Path Forward: Wyatt Starnes, President/CEO, SignaCert |
Closing Comments: Karl Rauscher, Executive Director – NRSO |
|
5:00-6:30 |
Networking Reception |