{"id":686,"date":"2021-09-21T14:58:13","date_gmt":"2021-09-21T05:58:13","guid":{"rendered":"https:\/\/ik1-131-72255.vs.sakura.ne.jp\/?page_id=686"},"modified":"2021-10-04T14:01:08","modified_gmt":"2021-10-04T05:01:08","slug":"agenda_05apr18","status":"publish","type":"page","link":"https:\/\/cydef.net\/en\/events\/cydef2018\/agenda_05apr18\/","title":{"rendered":"CYDEF2018 Agenda 05APR18"},"content":{"rendered":"\n<h1 class=\"has-text-align-center wp-block-heading\">CYDEF2018 Agenda 05APR18<\/h1>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track<\/th><th>Speakers<\/th><th>Title<\/th><\/tr><\/thead><tbody><tr><td>KNS<\/td><td>Mason<\/td><td>\u201cCyber Defense Approach in U.S. PACOM\u201d<\/td><\/tr><tr><td>KNS<\/td><td>Alatalu<\/td><td>\u201cDealing with the evolvement of cyber threats ? a European perspective\u201d<\/td><\/tr><tr><td>KNS<\/td><td>Maxwell<\/td><td>\u201cThe Army Cyber Institute, an Experiment in Building Cyber Capacity in the U.S.\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 21<\/th><th>HR Management<\/th><th>How to develop and Retain Cyber Defense Personnel<\/th><\/tr><\/thead><tbody><tr><td>Tr.21: L<\/td><td>Carvalho<\/td><td>\u201cEducation and Training towards Innovation and Capability\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 21<\/th><th>HRM<\/th><th>Group Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.21: GM<\/td><td>Yuasa<\/td><td>\u201cIssues on Developing Cyber Security Experts in Japan\u201d<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Tezuka<\/td><td>&#8220;InterNational Cyber Security Center of Excellence(INCS-CoE)&#8221;<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Shimizu<\/td><td>\u201cCapability for supporting human resource development for cybercrime unit\u201d<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Norifusa<\/td><td>\u201cCybersecurity Human Assets Development, Reality in Japanese Industries\u201d<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Kostopoulos<\/td><td>\u201cCyber Military Education in an Era of Change\u201d<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Antunes<\/td><td>\u201cChallenges and thoughts to maintain a skilled Cyber workforce\u201d<\/td><\/tr><tr><td>Tr.21: GD<\/td><td>Lee<\/td><td>\u201cEducational System for the Department of Cyber Defense at Korea University\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 22<\/th><th>Strategy &amp; Policy<\/th><th>How to build Strategies for Cyber Risk Management<\/th><\/tr><\/thead><tbody><tr><td>Tr.22: L<\/td><td>Hayashi<\/td><td>&#8220;Japanese Challenge for Cybersecurity Strategy &amp; Policy Development and in the Japan-ASEAN Cybersecurity Policy Meeting\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 22<\/th><th>S &amp; P<\/th><th>Group Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.22: GM<\/td><td>Kostopoulos<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.22: GD<\/td><td>Demchak<\/td><td>\u201cSystemic Collective Cyber Defense\u201d<\/td><\/tr><tr><td>Tr.22: GD<\/td><td>Hathaway<\/td><td>\u201cManaging National Cyber Risk<\/td><\/tr><tr><td>Tr.22: GD<\/td><td>Widmann<\/td><td>\u201cCCDCOE\u201d<\/td><\/tr><tr><td>Tr.22: GD<\/td><td>Matsuoka<\/td><td>\u201cThe Data-Centric Defense-in-Depth approach in the Cyberspace Operations\u201d<\/td><\/tr><tr><td>Tr.22: GD<\/td><td>Fujii,H.<\/td><td>\u201cCyber Resilience and Security Culture\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 23<\/th><th>Operation<\/th><th>How to conduct Cyber Defense Operation<\/th><\/tr><\/thead><tbody><tr><td>Tr.23: L<\/td><td>Akdogan<\/td><td>&#8220;NATO Approach to Cyber Security\u201d<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 23<\/th><th>Ops<\/th><th>Group Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.23: GM<\/td><td>Chianello<\/td><td>\u201cMILITARY ACTIVITIES IN CYBERSPACE: CLASSIFICATION, ANALYSIS, ORGANIZATION, CONDUCT\u201c<\/td><\/tr><tr><td>Tr.23: GD<\/td><td>Akdogan<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.23: GD<\/td><td>Aitel<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.23: GD<\/td><td>Takakura<\/td><td>\u201cCyber Security to Support Mission Continuity\u201d<\/td><\/tr><tr><td>Tr.23: GD<\/td><td>Nakama<\/td><td>No Slide<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 24<\/th><th>Technology, R&amp;D<\/th><th>Identifying Technologies for Advanced Cyber Defense<\/th><\/tr><\/thead><tbody><tr><td>Tr.24: L<\/td><td>Klipstein<\/td><td>\u201cIntegrating Man and Machine to Increase Cyber Defenses\u201c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-table-type02\"><table><thead><tr><th>Track 24<\/th><th>T, R&amp;D<\/th><th>Group Discussion<\/th><\/tr><\/thead><tbody><tr><td>Tr.24: GM<\/td><td>Takeda<\/td><td>\u201dFuture Technologies in Cyber Defense and Offense\u201d<\/td><\/tr><tr><td>Tr.24: GD<\/td><td>Mitsunaga<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.24: GD<\/td><td>Maxwell<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.24: GD<\/td><td>Rohozinski<\/td><td>No Slide<\/td><\/tr><tr><td>Tr.24: GD<\/td><td>Gaycken<\/td><td>No Slide<\/td><\/tr><\/tbody><\/table><figcaption>Abbreviations: Key Note Speech(KNS), Track(Tr.), Lecture(L), Panel discussion Moderator(PM), Panel discussion Panelist(PP), Group discussion Moderator(GM), Group discussion Discussant(GD)<\/figcaption><\/figure>\n\n\n\n<p>Note:1. Titles omitted.<br>2. Many panelists already lectured before discussion.<br>Presentations of discussants were under control of moderators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYDEF2018 Agenda 05APR18 Track Speakers Title KNS Mason \u201cCyber Defense Approach in U.S. PACOM\u201d KNS Alatalu \u201cDealing with the evolvement of cyber threats ? a European perspective\u201d KNS Maxwell \u201cThe Army Cyber Institute, an Experiment in Building Cyber Capacity in the U.S.\u201d Track 21 HR Management How to develop and Retain Cyber Defense Personnel Tr.21: &#8230;<\/p>\n","protected":false},"author":3,"featured_media":149,"parent":651,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"en_US","_original_post":"https:\/\/ik1-131-72255.vs.sakura.ne.jp\/?page_id=230","footnotes":""},"class_list":["post-686","page","type-page","status-publish","has-post-thumbnail","hentry","en-US"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/comments?post=686"}],"version-history":[{"count":5,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/686\/revisions"}],"predecessor-version":[{"id":929,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/686\/revisions\/929"}],"up":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/pages\/651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/media\/149"}],"wp:attachment":[{"href":"https:\/\/cydef.net\/wp-json\/wp\/v2\/media?parent=686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}