際際滷

際際滷Share a Scribd company logo
Panelists: Chuck Brooks, Innovation, Technology, Homeland Security, Government Relations
Tim Evans, Senior Advisor, Cyber Strategy & Policy; Johns Hopkins University
Ira Hoffman, Law and Policy Expert, Offit Kurman Attorney at Law
R. Admiral (ret.) Norman Hayes, Former Director of Intelligence, EUCOM (J-2)
The panelists were opened to questions from the audience,and a moderator led the workshop exercise.The ability to
compromise ATC towers through cyber means is a reality, and this special workshop has the abilityto create the
dialogue needed to create awareness and educate cyber securityprofessionals interested in safeguarding critical
infrastructure.
Chuck Brooks, Innovation, Technology, Homeland Security, Government Relations
Richard Nelson, Chief Software Systems Engineer, SAIC
EVENT GOLD SPONSOR
Workshop HOST
Defensive Cyberspace Operations & Intelligence Conference & Exhibition
Defensive Cyber Operation & Intelligence conference
DCOI ATC (Air Traffic Control) Cyber Security Workshop - "GHOST ATTACK"

More Related Content

Viewers also liked (20)

Washington D.C.
Washington D.C.Washington D.C.
Washington D.C.
Yuri Rovinets
Tarea 3 atividad 1 Sergio LealTarea 3 atividad 1 Sergio Leal
Tarea 3 atividad 1 Sergio Leal
Ministry of Education
Coursework ADDENDUM
Coursework ADDENDUMCoursework ADDENDUM
Coursework ADDENDUM
Margaret Degroote
sistemas digitalessistemas digitales
sistemas digitales
Guille Scar
ET聴K DEERLER VE GIDA ET聴聴
ET聴K DEERLER VE GIDA ET聴聴ET聴K DEERLER VE GIDA ET聴聴
ET聴K DEERLER VE GIDA ET聴聴
Vural Yigit
MOHD. RASHID
MOHD. RASHIDMOHD. RASHID
MOHD. RASHID
Mohammad Rashid
EVR聴M FELSEFES聴
EVR聴M FELSEFES聴EVR聴M FELSEFES聴
EVR聴M FELSEFES聴
Vural Yigit
Infografia cruz maribelInfografia cruz maribel
Infografia cruz maribel
Radiolopa Rivas
Esquema de seguridad escolarEsquema de seguridad escolar
Esquema de seguridad escolar
Claudia Pe単a
Phong sinh chuy棚味n nho kho lam
Phong sinh chuy棚味n nho kho lamPhong sinh chuy棚味n nho kho lam
Phong sinh chuy棚味n nho kho lam
canhbao
Trabajo de sistemasTrabajo de sistemas
Trabajo de sistemas
Daniela Ospina
CRECEMYPE - exportacionCRECEMYPE - exportacion
CRECEMYPE - exportacion
Hernani Larrea
There are no active watches, warnings or advisories
There are no active watches, warnings or advisoriesThere are no active watches, warnings or advisories
There are no active watches, warnings or advisories
dallasnewsmedia
The Deprived | Focus group
The Deprived | Focus groupThe Deprived | Focus group
The Deprived | Focus group
TheTobyHowell
KMATPPT2
KMATPPT2KMATPPT2
KMATPPT2
KMATSAIL
Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015
Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015
Jos辿 Gracia Cervera
Planificaci坦 19a setmana 14 15
Planificaci坦 19a setmana 14 15Planificaci坦 19a setmana 14 15
Planificaci坦 19a setmana 14 15
6sise
What does it mean to grow in Christ?
What does it mean to grow in Christ?What does it mean to grow in Christ?
What does it mean to grow in Christ?
Bill Faris
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTSKeynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Yog Shrusti Ranjan
Enfermedad CerebrovascularEnfermedad Cerebrovascular
Enfermedad Cerebrovascular
Karina Obreg坦n Jim辿nez
Tarea 3 atividad 1 Sergio LealTarea 3 atividad 1 Sergio Leal
Tarea 3 atividad 1 Sergio Leal
Ministry of Education
sistemas digitalessistemas digitales
sistemas digitales
Guille Scar
ET聴K DEERLER VE GIDA ET聴聴
ET聴K DEERLER VE GIDA ET聴聴ET聴K DEERLER VE GIDA ET聴聴
ET聴K DEERLER VE GIDA ET聴聴
Vural Yigit
EVR聴M FELSEFES聴
EVR聴M FELSEFES聴EVR聴M FELSEFES聴
EVR聴M FELSEFES聴
Vural Yigit
Infografia cruz maribelInfografia cruz maribel
Infografia cruz maribel
Radiolopa Rivas
Esquema de seguridad escolarEsquema de seguridad escolar
Esquema de seguridad escolar
Claudia Pe単a
Phong sinh chuy棚味n nho kho lam
Phong sinh chuy棚味n nho kho lamPhong sinh chuy棚味n nho kho lam
Phong sinh chuy棚味n nho kho lam
canhbao
Trabajo de sistemasTrabajo de sistemas
Trabajo de sistemas
Daniela Ospina
CRECEMYPE - exportacionCRECEMYPE - exportacion
CRECEMYPE - exportacion
Hernani Larrea
There are no active watches, warnings or advisories
There are no active watches, warnings or advisoriesThere are no active watches, warnings or advisories
There are no active watches, warnings or advisories
dallasnewsmedia
The Deprived | Focus group
The Deprived | Focus groupThe Deprived | Focus group
The Deprived | Focus group
TheTobyHowell
KMATPPT2
KMATPPT2KMATPPT2
KMATPPT2
KMATSAIL
Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015
Secretaria scor fallecimiento del padre marco antonio alanoca 6 dic 2015
Jos辿 Gracia Cervera
Planificaci坦 19a setmana 14 15
Planificaci坦 19a setmana 14 15Planificaci坦 19a setmana 14 15
Planificaci坦 19a setmana 14 15
6sise
What does it mean to grow in Christ?
What does it mean to grow in Christ?What does it mean to grow in Christ?
What does it mean to grow in Christ?
Bill Faris
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTSKeynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Keynote CET 2015 by Srusti Ranjan, Co-Founder, 4SPOTS
Yog Shrusti Ranjan
Enfermedad CerebrovascularEnfermedad Cerebrovascular
Enfermedad Cerebrovascular
Karina Obreg坦n Jim辿nez

Similar to Panelists (20)

Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
wremes
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
Love Steven
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
Richard Stiennon
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
Priyanka Aash
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
RohitGhulanavar2
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
Russell Publishing
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
ssuser4db968
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptx
ssuser4db968
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
Chris Hammond-Thrasher
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
Joe McCarthy
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
Sarath K Sukumar
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
}{it -Boy
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
wremes
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
Love Steven
Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
Richard Stiennon
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
Priyanka Aash
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
Cyber-Physical_Systems_yber Physical system (CPS) is a new generation of digi...
RohitGhulanavar2
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
Russell Publishing
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
ssuser4db968
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptx
ssuser4db968
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
Joe McCarthy
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
Sarath K Sukumar
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
}{it -Boy
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma

More from Chuck Brooks (20)

Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Chuck Brooks
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Chuck Brooks
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Chuck Brooks
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Chuck Brooks
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
Chuck Brooks
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
Chuck Brooks
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
Chuck Brooks
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck Brooks
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
Chuck Brooks
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck Brooks
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Chuck Brooks
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Chuck Brooks
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Chuck Brooks
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Chuck Brooks
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
Chuck Brooks
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
Chuck Brooks
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
Chuck Brooks
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck Brooks
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
Chuck Brooks
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck Brooks

Panelists

  • 1. Panelists: Chuck Brooks, Innovation, Technology, Homeland Security, Government Relations Tim Evans, Senior Advisor, Cyber Strategy & Policy; Johns Hopkins University Ira Hoffman, Law and Policy Expert, Offit Kurman Attorney at Law R. Admiral (ret.) Norman Hayes, Former Director of Intelligence, EUCOM (J-2) The panelists were opened to questions from the audience,and a moderator led the workshop exercise.The ability to compromise ATC towers through cyber means is a reality, and this special workshop has the abilityto create the dialogue needed to create awareness and educate cyber securityprofessionals interested in safeguarding critical infrastructure. Chuck Brooks, Innovation, Technology, Homeland Security, Government Relations Richard Nelson, Chief Software Systems Engineer, SAIC
  • 2. EVENT GOLD SPONSOR Workshop HOST Defensive Cyberspace Operations & Intelligence Conference & Exhibition Defensive Cyber Operation & Intelligence conference DCOI ATC (Air Traffic Control) Cyber Security Workshop - "GHOST ATTACK"