PROGRAM AGENDA
| SESSION 1: Opening Session | |
|---|---|
| 0830 | Welcome: NSF Charge and Brief Introductions, SaTC Program Officers |
| 0845 | Opening Remarks, CISE Director, NSF Director, and/or Legislative Branch Representative |
| 0915 | Plenary Keynote: Angela Sasse (University College, London) |
| 1000 | Break |
| SESSION 2: Crossing the Line: Cool Results That Stradle Disciplines | |
| 1030 | Trustworthy Computing and Human Factors: Michael Byrne (ORGANIZATION) Topic: Voting Machines and Human Behavior |
| 1045 | Signal Processing, Cryptography, Speech: Fabian Monrose (UNC Chapel Hill Topic: Understanding Encrypted Speech |
| 1100 | Economics and Security: Vern Paxon (UC Berkeley) Topic: Spam Economics |
| 1115 | Security and Neuroscience: Dan Boneh (Stanford University) Topic: Implicity Learned Passwords |
| 1130 | Q&A/Discussion |
| 1200 | Box Lunch Pickup |
| SESSION 3: Other Government Programs | |
| 1215 | Lunch Panel (DARPA, DHS, DoE Cyber PMs or office chief on related actitivies/discussion. Brief surveys of related current programs/activities in other (non-NSF) agencies) |
| 1315 | Break |
| SESSION 4: Update on National Strategy for Federal Cybersecurity R&D | |
| 1330 | Panel: Overview of the National Strategy and Review of Activities in Pursuit of it (with Audience Interaction) Panelists: Lauren Van Wazer (OSTP), Keith Marzullo (NSF), Brad Martin (ODNI) |
| 1500 | Break |
| SESSION 5: Cross-Disciplinary Conversations | |
| 1530 | Cross-Disciplinary Conversations (One-on-one conversations to acquaint people with others in different disciplines). |
| 1730 | Dinner on your own |
| SESSION 6: Posters/Rumps/BoFs | |
| 1930 | Posters Available Poster Session Chair: Micah Sherr (Georgetown University) |
| 2100 | Adjourn for the day |
| 0830 | Opening Announcements, SaTC Program Officers |
|---|---|
| SESSION 7A: Massively Open Online Courses (MOOCs) & Cybersecurity | |
| 0845 | Education Keynotes, Presenter(s) TBD Topic: Addressing Massively Open Online Courses (MOOCs) from broad perspective, including security issues |
| 0915 | Moderated Discussion |
| SESSION 7B: Competitions & SaTC | |
| 0945 | Competitions & SaTC Topic: Address interaction of competitions, education, research Speaker/Panel/Discussion TBD |
| 1030 | Break |
| SESSION 8: Transition to Practice | |
| 1100 | Transition to Practice Keynote, Speaker TBD Topic: Address alternative paths from research to practice |
| 1145 | TTP: Moderated Discussion, Panelists TBD |
| 1215 | Pickup Box Lunches |
| SESSION 9: Breakout Discussion Sessions | |
| 1245 | Discussion Sessions Intro (Charges to workshop groups, coordination, announcements) |
| 1315 | Parallel Discussion Sessions (15 topics, possibly with 5 most popular topics doubled) |
| 1445 | Break |
| SESSION 10: Breakout Discussion Sessions Continue | |
| 1515 | Discussion Sessions continue, produce report-out materials |
| 1715 | Dinner (on your own) |
| SESSION 11: Rumps/BOFs | |
| 1930 | Rumps/BOFs Sessions |
| 2100 | Adjourn for the day |
| 0830 | Opening Announcements, SaTC Program Officers |
|---|---|
| SESSION 12: Workshop Report-Outs | |
| 0845 | Coordinated report-outs, discussion session chairs |
| 1015 | Break |
| SESSION 13: Concluding Plenary | |
| 1100 | Plenary Keynote: Stuart Firestein (Columbia University) Author of "Ignorance: How It Drives Science" Q&A |
| 1200 | Box Lunch Pickup |
| Secure ad Trustworthy Computing PI Meeting Adjourned | |
Session Descriptions:
Session 1: Opening 1A and 1B: Introductions and Congressional / NSF senior management talks. Content of NSF senior management talk could include a brief history of the NSF programs in this area, to help set the context for new PIs. 1C. Opening talk by Angela Sasse (University College London) addressing SaTC themes from an interdisciplinary perspective.
Session 2: Cross-disciplinary cool results. Four short talks presenting interesting results that will be new to most of the audience and represent work that crosses disciplinary boundaries.
Session 3: Other Government Programs. Provide the researchers with a broad view of the government research programs outside of NSF in the area.
Session 4: Update on National Strategy for Federal Cybersecurity R&D Program. Presentations by OSTP, ODNI, NSF on the national strategy (what it is) and what progress has been made since it was released (just about a year ago).
Session 5: Cross-Disciplinary Conversations and Posters. Help PIs establish contacts with researchers working in other disciplines relatively early in the meeting. Each participant will be scheduled for eight 15-minute one-one conversations according to information provided on background and interests.
Posters will also be available during this period and in the evening. PIs will be invited to prepare posters; they will be submitted electronically and produced local to the conference. A template poster has been developed; the posters can also be placed on a website. Micah Sherr (Georgetown University) has agreed to organize the poster session.
Session 6: Posters/Rump/BoF. Evening session available for those who wish to self-organize meetings on topics of mutual interest. Not explicitly scheduled in order to avoid overloading. Posters can actually be up all day.
Session 7A: MOOCs & Cybersecurity. Massively Open Online Courses are here, and the past year has already seen some offered in the area of cybersecurity. A speaker will be sought who has experience in teaching such courses and can give an interesting perspective on how such courses might evolve and whether they can provide an effective path to increasing the pool of well-trained researchers and developers.
Session 7B: Competitions & SaTC. How might competitions be used to educate students to build more secure systems? What are the pluses and minuses of such an approach to education in SaTC? What can we learn from the competitions that are currently running (upwards of 75, apparently).
Session 8: Transition to Practice Plenary Startup companies provide one path for successful research ideas to move from the laboratory to the cyberinfrastructure. but there are others. Speakers with diverse, successful experiences in moving cybersecurity-related research to practice will give short talks on their experiences and engage with the audience in discussion.
Sessions 9, 10: Discussion sessions. The balance of the second day will be conducted as a set of parallel discussion sessions. Fifteen topics have been developed, formulated as questions to be discussed / answered in the sessions. The total number of discussion groups could be more (or less) than the fifteen indicated if facilities and interests dictate; space to hold as many as 20 sessions is planned, in order to keep the groups small enough to encourage discussion. Chairs for about 10 of the groups are confirmed. Detailed content and structure of each discussion session is delegated to the session chair. Report-outs will be coordinated in the evening by the chairs and delivered the following morning.
Session 11: Rump/BoF. See Session 6 above.
Session 12: Workshop Report-Outs. Discussion chairs provide coordinated reports on the results of the previous afternoon’s work.
Session 13: Concluding Plenary Stuart Firestein (Columbia University) on Ignorance as a motivator for science.