{{vm.result.Pagination.TotalResults}} ResultsResult

CyberSci Symposium 2017: The Battle for Cyberspace

Date: Sep 28, 2017
Time: 8:00 AM (Thu) - 5:00 PM (Thu)
Place: ICF Conference Center, 9300 Lee Highway, Fairfax, VA 22031

 Cybersci Banner

ICF is hosting the 5th annual CyberSci Symposium on September 28, 2017. This premier science and technology event allows for U.S. Government, academia and industry professionals to discuss emerging RD challenges, cybersecurity trends, emerging technologies, best practices and strategies around the toughest issues facing cybersecurity. The Symposium will focus on urgent threats impacting the whole of nation, commercial and network infrastructures and the security of cloud networks and providers.

Technical Tracks:

  • Cybersecurity, Vulnerability, and Threat Assessment
    Presentations on this topic will encompass a broad range of information security topics. Some of these topics include, but are not limited to, penetration testing, security and risk management, security engineering, identity and access management, testing, security operations, and security in software development. This theme also includes the tools and techniques to baseline military platforms and critical infrastructures. The development of presentations for this topic will demonstrate the need of security professionals to explore the full scope of assessments including the supply chain (hardware manufactures, equipment delivery, software authors, and software delivery) and assessment of operations (weapons and pods, sensors, maintenance, mission planning, and tactical communications).

  • Innovation for Information Services
    Experts believe 50 billion devices will be connected to the internet by 2020. Mobile technologies like smartphones, mobile computing platforms, autonomous systems, biometrics, and the explosion of interconnected space systems will change the world as we know it. Crowed sourcing will become the norm as the value of the knowledge of the whole is valued over the knowledge of the individual. We will see a growing need for security, advanced sensors, and systems which have inherent security mechanisms as communications between these devices becomes faster and more complex. This complexity will result in the realized growth of novel advancements in technologies like the block chain, autonomous systems, artificial intelligence, bio-inspired computation, evolvable systems, smart sensors, and technologies that are outside the bounds of current thought. This session will highlight groundbreaking ideas and technologies to help propel the state of the art in cybersecurity into the next decade.

  • Combating the Whole of Nation Cybersecurity Threat
    Countries are mounting whole-of-nation approaches to the exercise of power that include strengthening their cybersecurity defenses, while breaching that of others. They exploit sensitive data, combine it with false information, and endeavor to manipulate political, social, economic, and military outcomes. Their approach to cybersecurity may be integrated with their use of political, economic, and other military tools. What can we do to better understand these threats? How do we combat them? Should we adopt these tactics? If so, how?

  • Commercial Infrastructure and the New Cyber Battlefield
    Critical infrastructure and consumer systems are threatened increasingly by weapons-grade cyber exploits and attacks. These networks were not built to withstand threats of this sort. How can they be defended in a world in which adversaries do not distinguish between traditional national security targets and other targets? How can enterprises that are not protected by national security-grad defenses secure themselves from national security threats?

  • World of Cyber/Internet of Things
    More complex than ever, networks continue to advance as new devices are added and new topologies emerge. Increasingly, infrastructures will be supported by cloud providers, and cloud workload will be moved, or “orchestrated” as network needs and economics expand. How can we characterize these networks well enough to detect anomalous behavior? How will the security of such networks be managed? Who will manage infrastructure security, cloud security, or customer security in an increasingly interconnected environment?

Submit Your Abstract Below by June 19th.

Print this page
Created with sketchtool.
Your Information
Please enter an abstract for your presentation. Minimum: 500 characters including spaces. Maximum: 3,000 characters. Also, please ensure there are no HTML characters from your text such as: '<','>', and '&'.
Presentation Topic
Presentation Information
Please enter an abstract for your presentation. Minimum: 500 characters including spaces. Maximum: 3,000 characters. Also, please ensure there are no HTML characters from your text such as: '<','>', and '&'

Please note: *All fields are required.

Accepted abstracts, printed publications and accompanying presentations will be posted on the ICF website for 90 days following the event. By submitting, you agree to these terms.

For years, our team of top cybersecurity specialists help intelligence and military clients successfully defend the most aggressively attacked infrastructures on the planet. But the benefits of our work extend far beyond this complex challenge.

We adapt our proven strategies for organizations of all sizes across various industries. Collaborating with ICF's subject matter experts in specific markets, our cybersecurity teams design programs, advise on policies, and work on-site to implement custom, scalable solutions.

Whether securing an energy grid, transportation system, defense network, or private healthcare information, ICF helps clients mount a sophisticated defense.

Event Registration will open June 19th

Registration Cost:

Government: Free*

  • *Includes contractors with a government email and ID

Academia: Free


ICF Corporate Headquarters
9300 Lee Highway
Fairfax, VA 22031 USA