Industry Track

IEEE CNS Industry Track – October 9, 2017

 
IEEE CNS 2017 organizes the first CNS Industry Track with the goal of inviting leading security researchers and practitioners from the industry to share their thoughts and experiences with scientists from the academics and research labs so as to jointly develop an understanding and appreciation of pressing cyber security challenges that require our joint efforts. In keeping with the focus of the 2017 conference – More Connection, Better Protection – the theme for the Industry Track is “Security In Evolution – Radical Advances Addressing Changing Threats.” 

Panel Title Panel Details
Ecosystems of Connected Devices
Panel Chair: Dr. Wesley K. Kaplow
CTO, Tenica / Polar Star
 
With the dramatic and highly publicized Mirai attacks in the fall of 2016, IoT security has come to the forefront of all network security concerns. The lack of sufficient device security on typically deployed devices has become quite clear. Yet, there are industry groups seeking to provide strong and scalable solutions to secure devices. However, IoT devices are often part of a service that involves more than just the device. This session will review current trends and practices in the context of security ecosystems of connected devices.
 
Wes Kaplow is a thought leader in a wide range of telecommunications and information technologies.  In his position at Tenica/Polar Star, he is responsible for using his over 25 years of experience of building high-performance computing and networking systems to create and plan effective Enterprise Architectures and roadmaps for their realization.  Supporting the Federal government, these systems must provide services with the highest levels of Information Assurance and Resiliency.  Projects include Optical Transport and Data Network integration, Cloud Computing integrated into end-to-end capabilities, and issues related to space-to-ground communications.
 
Wes currently serves on the AFCEA Cyber Committee, where his is a co-author of the January 2014 report titled “The Future of Internet Governance” and The Security Implications of the Internet of Things in February 2015.
 
Previously, he was a co-founder of Qwest Government Services and served as Chief Technology Officer.  At Qwest, he was responsible for technology and product leadership, sales engineering, and customer service support.
 
Author of several refereed journal articles, Wes holds two patents in optical communications and received his Doctorate in Computer Science at Rensselaer Polytechnic Institute in Troy, New York.
 
Open distributed architectures
Panel Chair: Dr. Igor Faynberg
ETSI NFV Security WG Chair

Enterprises and service providers continue to rapidly advance cloud infrastructures to cost effectively provide highly connected services. The entire supply chain and infrastructure of information and communications technology is being reinvented. This transformation presents both new challenges and opportunities to security engineers. This session will review why open distributed architectures require new approaches to security and cover key advances.
 
Igor Faynberg, a 2011 Bell Labs Fellow, is an industry consultant and an Adjunct Professor of Computer Science in Stevens Institute of Technology. He represents Cable Television Laboratories in the ETSI NFV ISG, where he has been chairing the Security Working Group for the past four years.
 
Prior to founding the Stargazers Consulting LLC in 2015, Dr. Faynberg had had various staff and management positions in Bell Labs and Alcatel-Lucent business units where he had contributed to various R&D projects, starting from the development of variants of Karmarkar algorithm for supercomputers, Intelligent Network and its interworking with the Internet, to Cloud Computing and Network Functions Virtualization. Most recently he directed a group that researched solutions for security and identity management problems and led their standardization in the ATIS, IETF, ITU-T, ISO/IEC, ETSI, and INCITS Cyber Security Committee.
 
Prior to joining Bell Labs in 1986, Dr Faynberg had contributed to design and development of operating systems and a hypervisor as well as a network management suite for the Sperry Distributed Communications Architecture and designed the Local Area Networking architecture and protocols for the Borroughs Network Architecture.
 
Dr. Faynberg holds over 50 U.S. and international patents for inventions relevant to converged services, data communications, and security, and he has over 30 refereed publications in application of computers science to communications and network security. He has co-authored three books entitled, respectively, Intelligent Network Standards, Their Applications to Services (McGraw-Hill, 1997), Converged Networks and Services: Internetworking IP With PSTN (John Wiley & Sons, 2000), and Cloud Computing—Business, Trends, and Technologies (John Wiley & Sons, 2016). 
 
He holds an M.A. in mathematics from Kharkov University, Ukraine, and M.S. and Ph.D. degrees in Computer and Information Science from the University of Pennsylvania, Philadelphia.
 
Securing healthcare
Panel Chair: Ed Miller
CTO, Center for Medical Interoperability

Connected health care is essential to achieving critical improvements in quality and cost of care. Networked health devices are imbedded in our bodies, worn, used at home, used in doctor’s offices, and of course, hospitals. Each environment faces different threats, but clearly the personal risks of insecure devices and services are severe. Yet, no clear best practices or solutions for securing healthcare have become evident. This session will review industry efforts and highlight technologies addressing unique security needs of the healthcare industry.

Ed Miller is Chief Technology Officer for the Center for Medical Interoperability.  He leads the Center’s efforts to drive technical consensus across the healthcare industry for the creation of a next generation interoperability platform that enables data liquidity through real-time one-to-many communication, two-way data exchange, plug-and-play integration of devices and systems, the use of standards, and the highest level of security. Miller is responsible for all technical activities, including research and development, interoperability testing, and certification.
 
Before joining the Center, Miller was Senior Vice President of Application and Security Technologies for Cable Television Laboratories, Inc. (CableLabs).  He led the development of technologies to enhance interoperability, functionality, and scale for the cable industry’s evolving Video businesses, emerging Internet of Things growth opportunities, and Cybersecurity needs.  Prior to that role, Miller led the Cable 3.0 program for next generation IP video and also headed the DOCSIS® High Speed Data and PacketCable™ Voice over IP projects.
 
Previously, Miller was Vice President of Voice Solutions for Terayon Communication Systems, Inc., where he was responsible for the company’s product and architectural strategy for cable voice over IP and next generation multimedia systems.  He also held several engineering and management positions with Westinghouse Electric Corporation, including a one-year stint in Japan. Miller holds a BS degree, Magna-Cum-Laude, in Electrical Engineering from the University of Pittsburgh and an MS degree in Electrical and Computer Engineering from Carnegie-Mellon University.
 
Defense against the dark arts
Panel Chair: David Freeman
Head of Anti-Abuse and Anomaly Detection Relevance, LinkedIn

Today's large consumer-facing web services such as Google, Facebook, and LinkedIn allow people and businesses to be more connected and productive than ever before.  However, any platform that grows to massive scale also becomes a prime target for spam, phishing, impersonation, and many other forms of fraud and abuse.  Indeed, the same properties that make these services so successful also allow bad guys to scale their attacks to reach a broad audience.
 
In this panel we will discuss the threats that face large-scale web services and core principles that have been used to successfully protect their users. We will also discuss emerging threats and the panelists' visions for the next generation of abuse-fighting technology.

David Freeman leads Anti-Abuse and Anomaly Detection Relevance at LinkedIn. His team of machine learning engineers builds statistical models to detect fraud, abuse, and unusual activity across the LinkedIn site and ecosystem. He has worked with the larger machine learning community at LinkedIn to build scalable modeling and scoring infrastructure. He is an author, presenter, and organizer at international conferences on machine learning and security, such as NDSS, WWW and AISec. He holds a Ph.D. in mathematics from UC Berkeley and did postdoctoral research in cryptography and security at CWI and Stanford University.