National Academies Press: OpenBook

Recoverability as a First-Class Security Objective: Proceedings of a Workshop (2018)

Chapter: Appendix A: Workshop Agenda and Participants List

« Previous: Appendixes
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2018. Recoverability as a First-Class Security Objective: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25240.
×

A Workshop Agenda and Participants List

WORKSHOP ON RECOVERABILITY AS A FIRST-CLASS SECURITY OBJECTIVE

February 8, 2018
Keck Center of the National Academies of Sciences, Engineering, and Medicine
Washington, D.C.

AGENDA

12:30 p.m. Welcome and Overview
Fred B. Schneider, Forum Chair
12:35 Framing Keynote
Butler W. Lampson, Microsoft Research
1:25 Heather Adkins, Google, Inc.
2:15 David Edelman, Citigroup
3:00 Break
3:15 Stephen Schmidt, Amazon
4:00 Timothy E. Roxey, North American Electric Reliability Corporation
4:45 Stephen Cauffman and Matthew Barrett, National Institute of Standards and Technology
5:30 Wrap-up Discussion, Reactions, and Continued Q&A
Richard Danzig, Moderator
6:00 Adjourn Workshop

Reception for Members, Speakers, and Attendees

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2018. Recoverability as a First-Class Security Objective: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25240.
×

PARTICIPANTS LIST

Heather Adkins, Google, Inc.

Anita L. Allen, University of Pennsylvania

Robert Axelrod, University of Michigan

Matthew Barrett, National Institute of Standards and Technology

Paul Beaton, National Academies of Sciences, Engineering, and Medicine

Cherrie Black, Idaho National Laboratory

Bob Blakley, Citigroup

Travis Breaux

Yousaf Butt, U.S. Department of State

Fred Cate, Indiana University

Lonnie Carey, Jr., Office of the Director of National Intelligence

Stephen Cauffman, National Institute of Standards and Technology

Fred Chang, Southern Methodist University

Dean Checknita, National Protection and Programs Directorate, Department of Homeland Security

Steve Crocker, Shinkuro, Inc.

Richard J. Danzig, Johns Hopkins University Applied Physics Laboratory

Antonio DeSimone, Johns Hopkins University Applied Physics Laboratory

Donna Dodson, National Institute of Standards and Technology

Ann Drobnis, Computing Community Consortium

David Edelman, Citigroup

Eric Grosse, Independent Consultant

David Hoffman, Intel Corporation

Bonnie Hong, Idaho National Laboratory

Paul Kocher, Independent Researcher

Tadayoshi Kohno, University of Washington

Jim Kurose, National Science Foundation

Butler W. Lampson, Microsoft Research

Susan Landau, Tufts University

Carl Landwehr, George Washington University

Steven Lipner, SAFECode

John Manferdelli, Northeastern University

Brad Martin, National Security Agency

Kevin Reifsteck, National Security Council

Timothy E. Roxey, North American Electric Reliability Corporation

William Sanders, University of Illinois, Urbana-Champaign

Fred B. Schneider, Cornell University

Stephen Schmidt, Amazon

Alan Shaw, National Academies of Sciences, Engineering, and Medicine

Kay Smith, Massachusetts Institute of Technology Alumni / Organization of the Petroleum Exporting Countries

Peter Swire, Georgia Institute of Technology

David Vladeck, Georgetown University Law Center

Mary Ellen Zurko, Massachusetts Institute of Technology Lincoln Laboratory

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2018. Recoverability as a First-Class Security Objective: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25240.
×
Page 38
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2018. Recoverability as a First-Class Security Objective: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25240.
×
Page 39
Next: Appendix B: Steering Committee Biographies »
Recoverability as a First-Class Security Objective: Proceedings of a Workshop Get This Book
×
 Recoverability as a First-Class Security Objective: Proceedings of a Workshop
Buy Paperback | $40.00 Buy Ebook | $32.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverability—that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!