Skip to main content

Hack the Capitol 2.0

Hack the Capitol provides hands-on education and awareness to Congressional Staffers, Think Tanks, and Press.‍ This event has a significant value in raising awareness of our Nation's challenges with critical infrastructure and constructively providing kinesthetic learning at multiple levels.

Date & Time

May. 15, 2019
9:00am – 5:00pm
Get Directions

Hack the Capitol 2.0

[[{"fid":"142781","view_mode":"default","fields":{"field_file_image_alt_text[und][0][value]":"Hack the Capitol Logos ICS Village Wilson Center NSI","field_file_image_title_text[und][0][value]":"","field_file_source[und][0][value]":"","field_file_caption[und][0][value]":""},"type":"media","attributes":{"alt":"Hack the Capitol Logos, ICS Village, Wilson Center, NSI","style":"height: 334px; width: 400px;","class":"media-element file-default"}}]]

Hack the Capitol provides hands-on education and awareness to Congressional Staffers, Think Tanks, and Press.

This event has a significant value in raising awareness of our Nation's challenges with critical infrastructure and constructively providing kinesthetic learning at multiple levels.

Selected Quotes

Representative Jim Langevin

“I look with some sense of concern at the new regimes that are being developed in the EU – regimes that may very well become the de facto standards without our input – and obviously, being an incredibly powerful economy [with] very powerful skills and capabilities in the cyber world, I think we need to be part of that policy discussion.”

“The problems of the internet [are] too great to be squandered by poor security that undermines people’s faith in their devices or their data. That may also be too bold and generous for us to achieve in the next six months, but I do believe our country needs a jolt in this arena.”

“We need dialogue with our partners in industry, academia and NGOs; and the kind of dialogue that Hack the Capitol really epitomizes.”

Keynote Speaker Jeanette Manfra

“When it comes to cyber security, we are getting overly focused on a sector or an industry and we are missing, potentially, what the adversary might be looking at, which is really about disrupting functions or services and the things our country depends upon. And by taking an industry-vertical approach, if you will, we’re missing these cross-connects and these dependencies; and ICS very much falls into this category.”

“We want the ICS community – and those are both the vendors and the operators of the system – to be able to be more empowered to defend themselves. And part of that empowerment means they have information that’s relevant to that defense. Part of that means conversations with vendors about how they are securing these systems both before and after they’ve deployed them.”

“We have the vendors. We’ve got the users. We’ve got the researchers and then, of course, we’ve got the regulators overall. So what are all these people doing to help empower those that are in that first line of defense to be able to defend against these threats?”


(For more information on the panels and speakers, visit the ICS website.)

9:00 am-9:30 am Registration & Breakfast

9:30 am-9:45 am

Welcome & Opening Remarks

9:45 am-10:00 am

Keynote Speaker: Rep. Jim Langevin (RI-02)

10:00 am-11:00 am

Track 1: ICS Cybersecurity & Implications for National Security   

10:00 am-10:30 am

Track 2: Security Like It’s 1996: Foundational Techniques for Assessing and Manipulating Embedded Devices

Speaker: Michael Schroeder

10:30 am-11:00 am

Track 2: Hacking Bureaucracy with Shared Services

Speaker: Rob Sheldon

11:00 am-12:00 pm

Track 1: ICS and the Investment Community


11:00 am-11:30 am

Track 2: The Army's ICS and Its Defense

Speaker: Raymond Blaine

11:30 am-12:00 pm

Track 2: Jack Voltaic: Researching Critical Infrastructure

Speaker: Andrew Hall

12:00 pm-12:30 pm

Track 1

Keynote Speaker: Jeanette Manfra, Assistant Director for Cybersecurity for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)

12:30 pm-1:30 pm

Lunch Break and Demonstrations

12:30 pm-12:45 pm

Track 3: ICS Range Overview

Speaker: Thomas VanNorman

12:45 pm-1:15 pm

Track 2: How to treat your "hacker" (a.k.a Independent Security Researcher.) and Responsible Vulnerability Disclosure

Speaker: Monta Elkins

12:45 pm-1:00 pm

Track 3: Analyzing the GreyEnergy Malware: From Maldoc to Backdoor

Speaker: Gehron “Ronny” Fredericks

1:00 pm-1:15 pm

Track 3: Howdy Neighbor: IoT Smart House

Speakers: Brian DeMuth, Daniel LaVoie

1:15 pm-2:00 pm

Track 2: It Can't Happen Here - Right? ICS Attack Motivation and Targeting

Speakers: Emily Crose, Joe Slowik

1:15 pm-1:30 pm

Track 3: Hidden Vulnerabilities in ICS & IIoT Networks

Speaker: Phil Neray

1:30 pm-2:30 pm

Track 1: DoD & DoE Perspectives on Emerging Threats to Critical Infrastructure


1:30 pm-1:45 pm

Track 3: Governance and Leadership of Emerging Bio-technologies in a World without Borders

Speaker: Todd Kuiken

1:45 pm-2:00 pm

Track 3: Rules of Engagement: Establishing Norms and Deterrence For Offensive-able Entities

Speaker: Adrian Webster

2:00 pm-2:30 pm

Track 2: A TRITON Perspective on IT/OT Convergence

Speaker: Daniel Kapellmann

2:30 pm-3:30 pm

Track 1: Press Perspectives on Critical Infrastructure Security


2:30 pm-3:00 pm

Track 2: Enhancing Capacity...via Trust

Speaker: Steve Luczynski

3:00 pm-3:30 pm

Track 2: Defining a Collective Defense and Response

Speaker: Evan D. Wolff

3:30 pm-4:30 pm

Track 1: An Overview of Aviation Cybersecurity


3:30 pm-4:00 pm

Track 2: At the moment of crisis: The danger of “use or lose” pressures in countering ICS targeted intrusion operations

Speaker: JD Work

4:00 pm-4:30 pm

Track 2: The Challenges of Mapping ICS Networks

Speakers: Darin Harris, Troy Leigers

4:30 pm

Track 1: Closing Remarks

Hosted By

Digital Futures Project

Less and less of life, war and business takes place offline. More and more, policy is transacted in a space poorly understood by traditional legal and political authorities. The Digital Futures Project is a map to constraints and opportunities generated by the innovations around the corner - a resource for policymakers navigating a world they didn’t build.  Read more

Science and Technology Innovation Program

The Science and Technology Innovation Program (STIP) brings foresight to the frontier. Our experts explore emerging technologies through vital conversations, making science policy accessible to everyone.  Read more

Event Feedback