Hack the Capitol 2.0
Hack the Capitol provides hands-on education and awareness to Congressional Staffers, Think Tanks, and Press. This event has a significant value in raising awareness of our Nation's challenges with critical infrastructure and constructively providing kinesthetic learning at multiple levels.
Overview
[[{"fid":"142781","view_mode":"default","fields":{"field_file_image_alt_text[und][0][value]":"Hack the Capitol Logos ICS Village Wilson Center NSI","field_file_image_title_text[und][0][value]":"","field_file_source[und][0][value]":"","field_file_caption[und][0][value]":""},"type":"media","attributes":{"alt":"Hack the Capitol Logos, ICS Village, Wilson Center, NSI","style":"height: 334px; width: 400px;","class":"media-element file-default"}}]]
Hack the Capitol provides hands-on education and awareness to Congressional Staffers, Think Tanks, and Press.
This event has a significant value in raising awareness of our Nation's challenges with critical infrastructure and constructively providing kinesthetic learning at multiple levels.
Selected Quotes
Representative Jim Langevin
“I look with some sense of concern at the new regimes that are being developed in the EU – regimes that may very well become the de facto standards without our input – and obviously, being an incredibly powerful economy [with] very powerful skills and capabilities in the cyber world, I think we need to be part of that policy discussion.”
“The problems of the internet [are] too great to be squandered by poor security that undermines people’s faith in their devices or their data. That may also be too bold and generous for us to achieve in the next six months, but I do believe our country needs a jolt in this arena.”
“We need dialogue with our partners in industry, academia and NGOs; and the kind of dialogue that Hack the Capitol really epitomizes.”
Keynote Speaker Jeanette Manfra
“When it comes to cyber security, we are getting overly focused on a sector or an industry and we are missing, potentially, what the adversary might be looking at, which is really about disrupting functions or services and the things our country depends upon. And by taking an industry-vertical approach, if you will, we’re missing these cross-connects and these dependencies; and ICS very much falls into this category.”
“We want the ICS community – and those are both the vendors and the operators of the system – to be able to be more empowered to defend themselves. And part of that empowerment means they have information that’s relevant to that defense. Part of that means conversations with vendors about how they are securing these systems both before and after they’ve deployed them.”
“We have the vendors. We’ve got the users. We’ve got the researchers and then, of course, we’ve got the regulators overall. So what are all these people doing to help empower those that are in that first line of defense to be able to defend against these threats?”
Agenda
(For more information on the panels and speakers, visit the ICS website.)
9:00 am-9:30 am Registration & Breakfast
9:30 am-9:45 am
Welcome & Opening Remarks
9:45 am-10:00 am
Keynote Speaker: Rep. Jim Langevin (RI-02)
10:00 am-11:00 am
Track 1: ICS Cybersecurity & Implications for National Security
10:00 am-10:30 am
Track 2: Security Like It’s 1996: Foundational Techniques for Assessing and Manipulating Embedded Devices
Speaker: Michael Schroeder
10:30 am-11:00 am
Track 2: Hacking Bureaucracy with Shared Services
Speaker: Rob Sheldon
11:00 am-12:00 pm
Track 1: ICS and the Investment Community
Panel
11:00 am-11:30 am
Track 2: The Army's ICS and Its Defense
Speaker: Raymond Blaine
11:30 am-12:00 pm
Track 2: Jack Voltaic: Researching Critical Infrastructure
Speaker: Andrew Hall
12:00 pm-12:30 pm
Track 1
Keynote Speaker: Jeanette Manfra, Assistant Director for Cybersecurity for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)
12:30 pm-1:30 pm
Lunch Break and Demonstrations
12:30 pm-12:45 pm
Track 3: ICS Range Overview
Speaker: Thomas VanNorman
12:45 pm-1:15 pm
Track 2: How to treat your "hacker" (a.k.a Independent Security Researcher.) and Responsible Vulnerability Disclosure
Speaker: Monta Elkins
12:45 pm-1:00 pm
Track 3: Analyzing the GreyEnergy Malware: From Maldoc to Backdoor
Speaker: Gehron “Ronny” Fredericks
1:00 pm-1:15 pm
Track 3: Howdy Neighbor: IoT Smart House
Speakers: Brian DeMuth, Daniel LaVoie
1:15 pm-2:00 pm
Track 2: It Can't Happen Here - Right? ICS Attack Motivation and Targeting
Speakers: Emily Crose, Joe Slowik
1:15 pm-1:30 pm
Track 3: Hidden Vulnerabilities in ICS & IIoT Networks
Speaker: Phil Neray
1:30 pm-2:30 pm
Track 1: DoD & DoE Perspectives on Emerging Threats to Critical Infrastructure
Panel
1:30 pm-1:45 pm
Track 3: Governance and Leadership of Emerging Bio-technologies in a World without Borders
Speaker: Todd Kuiken
1:45 pm-2:00 pm
Track 3: Rules of Engagement: Establishing Norms and Deterrence For Offensive-able Entities
Speaker: Adrian Webster
2:00 pm-2:30 pm
Track 2: A TRITON Perspective on IT/OT Convergence
Speaker: Daniel Kapellmann
2:30 pm-3:30 pm
Track 1: Press Perspectives on Critical Infrastructure Security
Panel
2:30 pm-3:00 pm
Track 2: Enhancing Capacity...via Trust
Speaker: Steve Luczynski
3:00 pm-3:30 pm
Track 2: Defining a Collective Defense and Response
Speaker: Evan D. Wolff
3:30 pm-4:30 pm
Track 1: An Overview of Aviation Cybersecurity
Panel
3:30 pm-4:00 pm
Track 2: At the moment of crisis: The danger of “use or lose” pressures in countering ICS targeted intrusion operations
Speaker: JD Work
4:00 pm-4:30 pm
Track 2: The Challenges of Mapping ICS Networks
Speakers: Darin Harris, Troy Leigers
4:30 pm
Track 1: Closing Remarks
Hosted By
Digital Futures Project
Less and less of life, war and business takes place offline. More and more, policy is transacted in a space poorly understood by traditional legal and political authorities. The Digital Futures Project is a map to constraints and opportunities generated by the innovations around the corner - a resource for policymakers navigating a world they didn’t build. Read more
Science and Technology Innovation Program
The Science and Technology Innovation Program (STIP) serves as the bridge between technologists, policymakers, industry, and global stakeholders. Read more
Thank you for your interest in this event. Please send any feedback or questions to our Events staff.