As our systems have evolved to become more instrumented, interconnected, and
intelligent, we have become ever more dependent on these systems to protect the vast
amounts of information which they handle and services they provide. Modern
cybersecurity protects all of us by ensuring the security and privacy of our data and the
ability to these systems to properly function. This Symposium will emphasize the latest
research, solutions, and approaches for cybersecurity and privacy from Carnegie-
Mellon University's Heinz College, CyLab, and CERT Division, and IBM's Research and
Software teams. A common theme throughout the day is that to meet the threats, we
must continuously evolve the systems, technologies, policies and standards in both the
government and private sector. Please join us for this exciting and informative day. Full descriptions of the talks to be presented can be found below:
“Technical Metrics Aren’t Enough: 10 Strategic Cyber Security Measures”
Learn how 10 strategic security measures, tied to business objectives, are more effective than tactical operational measures (systems patched, incidents reported) to determine your current security state and improve your security posture. Understand key questions to ask and ways to communicate with business leaders in their language using measures defined by the CERT® Resilience Management Model.
“An Analytics-Driven Approach to Cyber Security Research and Other Advanced Topics”
This discussion will highlight how cutting edge analytics can enhance and organization's cybersecurity.
“Measuring The Online Crime Ecosystem”
A majority of security attacks are motivated by financial greed-- i.e., they occur because the attacker can find a way to monetize the compromises. In this talk, I will discuss how large-scale measurements are yielding interesting insights into the online criminal ecosystems.
“On the Security of Cyber-Physical Systems”
Cyber Physical Systems (CPS) refer to the embedding of widespread sensing, computation, communication, and control into physical spaces. Application areas are as diverse as aerospace, chemical processes, civil infrastructure, energy, manufacturing and transportation, most of which are safety-critical. As a result, security is of primary importance to guarantee safe operation of CPS. In this talk I will provide an introduction to CPS security along with directions for future work.
Greg Porpora and Dr. Charles Palmer
“Applying advanced machine learning techniques to APT and other emerging threats in the Cyber Domain”.
Signature-based detection offers enterprises limited protection against today's threats ranging from hidden APT's to broadly destructive malware. To address these threats, IBM is applying machine learning techniques to identify and predict malicious network behavior in real-time. These techniques can discover new or subtle changes in attack signatures and tradecraft, apply behavior modeling to characterize normal versus anomalous or malicious activity, provide finer analysis to reduce false alarms, and are highly adaptable to changing threat domains.
“Privacy in the Age of Augmented Reality”
I will present the results of a series of experiments connecting research on consumer privacy and research on privacy in online social networks. In particular, I will discuss the feasibility of combining publicly available Web 2.0 data with off-the-shelf face recognition software for the purpose of large-scale, automated individual re-identification. The experiments highlight the ability of identifying individuals online and offline using photos made publicly available on a social network site. I will illustrate the ability of inferring strangers' personal or sensitive information (their interests and Social Security numbers) from their faces, by combining face recognition, data mining algorithms, and statistical re-identification techniques. The results highlight the implications of the inevitable convergence of face recognition technology and increasing online self-disclosures, and the emergence of ``personally predictable'' information. They raise questions about the future of privacy in an "augmented" reality world in which online and offline data will seamlessly blend.
Scott Van Wart
“"Advanced Topics in Cybersecurity"
This talk will cover several initiatives in IBM's research division related to cybersecurity.
Summer Fowler's Presentation
Jeff Paddock's Presentation