Civil-Military Symposium
Symposium on 鈥淐ivil-Military Cooperation and International Collaboration in Cyber Operations鈥
The University of North Georgia Institute for Leadership and Strategic Studies, in collaboration with the Center for Cyber Operations Education and the College of Arts and Letters, invites academics, graduate and undergraduate students, international cadets from foreign military academies, and cadets from U.S. service academies and other senior military colleges, to present papers or posters addressing this topic at the second annual 国产自拍 Security Symposium. Through this symposium, 国产自拍 and the ILSS intend to contribute to the scholarly discussion of security and strategic issues in this increasingly complex domain.
Date
November 7-9, 2017
Location
国产自拍 Dahlonega Campus
Third Floor.
News
Civil-Military Symposium to focus on cyber operations Nov. 8-9 at 国产自拍Many of the major threats to U.S. national security are occurring in the cyber domain. In a , the former U.S. Chairman of the Joint Chiefs of Staff, General Martin Dempsey, noted that civilian infrastructure and businesses “present a significant vulnerability to our nation.” Some of the threats include adversaries that constantly seek “to infiltrate networks and degrade capabilities, disrupt operations, or steal information.” He added that “In cyber, we have competitors, and we have competitors who maybe aren’t as constrained by legal systems and freedoms as we are.”
However, the question of what entity has ultimate responsibility for defending U.S. interests in the cyber domain remains unanswered. The mission of the Department of Defense is to provide military forces needed to deter war and to protect the security of our country. The U.S Department of Homeland Security ensures a homeland that is safe, secure, and resilient against terrorism and other hazards. What is the role of the U.S. Department of State, and how does the U.S. plan to partner with foreign nations? To what extent are other entities, government or commercial, responsible? What is U.S. policy regarding this issue, and is it adequate to the task, now and in the future?
Major General Stephen G. Fogarty
Chief of Staff of the U.S. Cyber Command
Major General Stephen G. Fogarty, a native of Savannah, Georgia, was commissioned as a Second Lieutenant in Military Intelligence (MI) in May 1983, after earning his Bachelor of Arts in History at North Georgia College. He also holds a Master of Science in Administration from Central Michigan University, and a Master in Strategic Studies from the U.S. Army War College. His military education includes Airborne School, the Military Intelligence Officer Basic and Advanced Courses, Ranger School, Jumpmaster Course, Combined Arms & Services Staff School, Long Range Surveillance Leaders Course, U.S. Army Command and General Staff College, and the U.S. Army War College.
MG Fogarty’s command tours include the Long Range Surveillance Detachment, 125th MI Battalion, 25th Infantry Division (Light); the 732nd MI Battalion; the 116th MI Brigade and National Security Agency-Georgia; the U.S. Army Intelligence and Security Command; and, most recently, the U.S. Army Cyber Center of Excellence and Fort Gordon.
His Joint and Combined assignments include Chief, Integrated Survey Program, for the United States Special Operations Command; Director, Joint Intelligence Operations Center—Afghanistan; Director of Intelligence, J-2, United States Central Command; and Deputy Chief of Staff, Intelligence, CJ-2, for NATO’s International Security Assistance Force, Afghanistan. During his Joint and Combined assignments, he deployed to Afghanistan three times in support of OPERATION ENDURING FREEDOM.
His other Army assignments include S2, 2d Battalion, 327 Infantry Regiment, S-3, 311th MI Battalion, Chief, Plans and Exercises, Chief, Analysis and Control Element, and G-2 of the 101st Airborne Division (Air Assault); S-2, 2nd Battalion, 75th Ranger Regiment, to include OPERATION JUST CAUSE; S2, 2d Brigade and G2 Operations Officer 25th Infantry Division (Light); and S-2, 75th Ranger Regiment.
His awards and decorations include the Distinguished Service Medal (2 awards), Defense Superior Service Medal (3 awards), Legion of Merit, Bronze Star Medal (2 awards), Defense Meritorious Service Medal, Meritorious Service Medal (5 awards), Joint Service Commendation Medal, Army Commendation Medal (2 awards), Master Parachutist Badge (w/bronze star), Air Assault Badge, and the Ranger Tab.
Major General Fogarty has been married for the past 34 years to the former Sharon Zelasky of Atlanta, Georgia.
Bill Smullen
Director of National Security Studies at the Maxwell School of Citizenship and Public Affairs
Bill Smullen was appointed as the Director of National Security Studies at the Maxwell School of Citizenship and Public Affairs in June of 2003. He is also Maxwell’s Senior Fellow in National Security and a member of the faculty of Syracuse University’s S.I. Newhouse School of Public Communications as a Professor of Public Relations.
Prior to his appointment at Syracuse University, he was the Chief of Staff to Secretary of State Colin L. Powell and of the U.S. Department of State beginning in January 2001. As principal advisor to the Secretary, he was responsible for monitoring and evaluating the formulation and implementation of departmental policies. He was also involved in the planning and development of concept strategy associated with foreign policy matters.
A professional soldier for 30 years, he retired from the U.S. Army in 1993. His military career included a series of infantry and command and staff assignments at the platoon, company, battalion, brigade and division levels, as well as several public affairs positions including Media Relations Officer at West Point and Chief of Media Relations for the Department of the Army. Overseas Army tours took him to Korea, Panama and twice to Vietnam. His military schooling included the Army’s Command and General Staff College and the Army War College. His military citations include the Defense Superior Service Medal, the Legion of Merit, the Bronze Star Medal, the Army Meritorious Service Medal, the Air Medal, the Combat Infantryman’s Badge and the Parachutist’s Badge.
His last assignment on active duty was Special Assistant to the eleventh and twelfth Chairmen of the Joint Chiefs of Staff, Admiral William J. Crowe, Jr., and General Colin L. Powell. Upon leaving active duty, he became the Executive Assistant to General Powell, assisting with the writing and promotion of his best-selling autobiography, “My American Journey,” published in 1995. From 1993 to 2001 he had daily responsibility for managing the General’s private office and professional activities. Beginning in 1997 he doubled his responsibilities by becoming the Chief of Staff for America’s Promise—The Alliance for Youth, which General Powell chaired from May 1997 to January 2001.
Among his career accomplishments, he has been elected to Syracuse University’s S.I. Newhouse School of Public Communications Hall of Fame, the U.S. Army Public Affairs Hall of Fame, the University of Maine ROTC Hall of Fame, and was chosen as the recipient of the University of Maine 2007 Alumni Career Award, which is the highest honor presented by the University of Maine Alumni Association. He received the 2007 Public Relations Society of America’s Lloyd B. Dennis Distinguished Leadership Award.
He earned a Bachelor of Arts Degree in Business and Economics from the University of Maine in 1962 and a Master of Arts Degree in Public Relations from the S.I. Newhouse School of Public Communications at Syracuse University in 1974.
An accomplished speaker, he appears before audiences nationwide on subjects of contemporary and topical interest. Featured topics includes those from his book, “Ways and Means for Managing Up,” which was published in 2014 by McGraw-Hill. In addition, he has written two more books: “There’ll Never Be Another Beauregard” published in 2014 and “Prime Time Primer” published in 2016.
Colonel Jeffrey Collins
Director of Air Force CyberWorx
Colonel Jeffrey A. Collins directs Air Force CyberWorx, a new venture comprising a public-private design center at the Air Force Academy focused on cyber capabilities and melding military, academic, and industry expertise with state of the art technology and design thinking to solve operational problems. Before his assignment to CyberWorx, Colonel Collins was the Deputy Director for Air Force Cyberspace Strategy and Policy at the Pentagon and also served as the Director of Staff for the Air Force Chief of Information Dominance and Chief Information Officer.
Colonel Collins is the former Research & Technology Director of the Air Force Command and Control (C2) Battlelab and commanded the 766th and 966th Air Expeditionary Squadrons in Afghanistan. He also previously commanded the 19th Services Squadron, Little Rock Air Force Base, Arkansas, where he executed all programs promoting unit cohesion, individual and family resiliency, physical fitness and the quality of life for 5,200 military and civilians and 49,000 retirees.
Colonel Collins was commissioned through the Air Force Reserve Officer Training Corps at Purdue University. He earned graduate and management degrees from Rensselaer Polytechnic, Troy University, and his Ph.D. from Carnegie Mellon University in Pittsburgh. He most recently completed the CIO certificate program at the National Defense University, Washington, D.C. He was honored as the Air Force Field Grade Officer of the Year in 2005 by the Air Force’s Warfighter Integration and Chief Information Officer and won the United States Air Forces in Europe’s Leo Marquez Award for outstanding communications-electronics maintenance in 2004.
Leo Scanlon
Deputy Chief Information Security Officer
Leo Scanlon is the HHS Senior Advisor for Healthcare and Public Health (HPH) Sector Cybersecurity and the Deputy Chief Information Security Officer for the Department of Health and Human Services. He serves as chairman of the HHS Cyber Security Working Group, which coordinates cybersecurity collaboration between HHS Operating Divisions and their partners in the private sector. He is the executive sponsor of the HHS Healthcare Cybersecurity Communications and Integration Center (HCCIC). The HCCIC supports cyber threat and indicator sharing across HHS Operating Divisions, DoD and civilian agency partners, and healthcare cybersecurity stakeholders in the intelligence and law enforcement communities, and the National Health Information Sharing and Analysis Center (NHISAC).
Leo has worked at the interagency level as a co-chair of the Identity Credential and Access Management sub-committee of the Information Security and Identify Management Committee (ISIMC), and as a tri-chair of the ISIMC. He is co-chair of the Government Advisory Council of the International Information System Security Certification Consortium (ISC2), and government chair of the ACT-IACT Cybersecurity Community of Interest.
Prior to joining HHS, Leo served as the CISO for the National Archives and Records Administration (NARA) from 2005 to 2015. While at NARA, he put in place and matured the agency IT Security Program and the Insider Threat program. He came to federal service from the private sector where he developed cybersecurity programs as a federal contractor and in the telecommunications industry.
Colonel Laszlo Kovacs
Professor at the National University of Public Service
Colonel Laszlo Kovacs is a professor at the National University of Public Service (NUPS). He graduated from the Military Technical College as an electronic warfare officer in the Hungarian Army in 1991. During his military career, he served in various positions in different electronic warfare units. He earned his master's degree at NUPS in Budapest in 1999, and his Ph.D. in the field of military technical science in 2004. He has been working in military higher education since 2002.
Colonel Kovacs is a full-time professor in the Department of Electronic Warfare at NUPS, Hungary. He engages in scientific research in cyber warfare, cyber terrorism, information warfare and critical information infrastructure protection. He won the Research Scholarship for the Hungarian Academy of Sciences with cyber terrorism research themes in 2005 and 2009. He leads Ph.D. students as a scientific adviser in the fields aforementioned. He also serves as the head of the NUPS Cybersecurity Research Team.
Dr. Janice Wethington
Chief, National Security Agency - Georgia College of Cyber
Dr. Wethington holds a Ph.D. in mathematics from the University of Georgia and has been working for the Department of Defense since 2005. Her current occupational responsibilities are in cyber-related education and training for intelligence community personnel.
Wednesday, 8 November, 0930 Panel
Topic 1: Building a Civil-Military Framework for Cyber Deterrence
Topic 2: Designing A Military Cyber Strategy for South Africa
Dr. Bryson R. Payne | Victor C. Parker | Dr. Edward L. Mienie | Noelle Cowling, South Africa | Moderator: Dr. Robin Dorff |
University of North Georgia (国产自拍) Department of Computer Science | 国产自拍 Mike Cottrell College of Business | 国产自拍 Department of Political Science and International Affairs | Chair, School for Geospatial Studies and Information Systems. Faculty of Military Science, Stellenbosch University | Kennesaw State University, Dean for College of Humanities and Social Sciences |
Wednesday, 8 November, 1330 Panel
Topic 1: Cybersecurity as a Horizontal Issue in Public Service
Topic 2: Cyber-Resilience Strategies for Small Countries
Topic 3: A Taxonomy of National Challenges in Cyber Defense
COL Lazlo Kovacs | Dr. Csaba Kraznay | Lech Jenczewski, New Zealand | Dr. Bruce W. Watson | Given Shingange, South Africa | Moderator: Matthew (Matt) Stern |
Ph.D., Professor, Department of Electronic Warfare, National University of Public Service, Hungary | Assistant Professor and Director of Cybersecurity Academy, National University of Public Service, Hungary | Associate Professor, University of Auckland, Department of Information Science and Operations Management |
Chief Scientist at IP Blox Professor, Centre for Al Research, Stellenbosch University, South Africa Visiting Professor, Computer Science, King's College London |
Director, Connecting the Dots Training and Consulting Services | Vice President, Cyber for Intelligent Waves, LLC. |
Thursday, 9 November, 1000 Panel
Topic 1: Classification of Web Service-based Attacks and Mitigation Techniques
Topic 2: Hybrid Wars: The 21st Century's New Threats to Global Peace and Security
Topic 3: Is Cyber Shape Shifting
Mr. William T Bond | Dr. Sascha Bachmann, Sweden | Dr. Bruce W. Watson | Mr. Neal Kushwaha, Canada | Moderator: Alfred S. Barker, MSIS |
Master of Information Technology Graduate Student, Department of Information Technology, College of Computing and Software Engineering, Kennesaw State University, Georgia, USA | The Media School: Swedish Defence University (FHS): Bournemouth University, Interview on Hybrid Warfare |
Chief Scientist at IP Blox Professor, Centre for Al Research, Stellenbosch University, South Africa Visiting Professor, Computer Science, King's College London |
Founder and CEO, Impendo Inc. | Assistant Vice Chancellor/CISO, Cybersecurity, Board of Regents, 国产自拍 |
Poster Presentations
Cadet Shintaro Shiga, National Defense Academy of Japan
|
Iuri Khijakadze, Davit Aghmashenebeli National Defence Academy of Georgia | Cadet Vinícius Chitolina, Argulhas Negras Military Academy, Brazil | 2nd. Lt. Federico Lagrasta, Army Institute for Applied Military Studies (Scuola di Applicazione), Turin, Italy | Bradford T. Regeski, University of North Georgia |
Title: "Challenges and Advantages in Civil-Military Partnerships for Cyber Operations" | Title: "Civil-military cooperation and international collaboration in cyber operations" | Title: “Use of force in cyberspace under Article 2(4) of the UN Charter: an analysis of Stuxnet virus based on “Schmitt Criteria” in cyber-attacks.” | Title: "At War with TOR" | Title: "Cyber Mercenaries: Private Entities’ Offensive Intrusions and Militaristic Surveillance Capabilities" |
Delia Deaconescu, Romania
|
Marek Olšan, University of Defense, Czech Republic | Jacob C. Malimban, University of North Georgia | Cadet Roger Causey, Virginia Military Institute | Lieutenant Andrew Tye, Naval ROTC, The Citadel |
Title: "Applying the Kill-Chain Model on an Attack against Military Networks" | Title: "Corrupted Certificates" | Title: "On the Viability of Open Source in Cyber Security" | Title: "VMI Cyber Club" | Title: "Efficient Insider Threat Detection System with Proactive Testing" |
Discussion Forum
We are excited for you to be a part of the Civil-Military Symposium on November 7-9! In order to help facilitate discussion before and after the symposium, we have created a discussion forum for participants to use.
Please follow the link below, click "Register" in the top-right corner of the page, and then create an account for this discussion board. A message will be displayed that your account is pending approval. Once approved, you can access the board and begin your conversation. We look forward to everyone's posts!
Date | Time | Event |
Nov. 7 (Tuesday) | 6:00 p.m. | Dinner by invitation with presenters, speakers, symposium organizing group |
Nov. 8 (Wednesday) | 7:30 a.m. | Registration |
8:30 a.m. | Welcome, administrative remarks and introduce guests and presenters | |
8:45 a.m. | Speaker - Dr. Wethington, Chief of the National Security Agency - Georgia College of Cyber Introduced by Dr. Bryson Payne, Director of 国产自拍’s Center for Cyber Operations Education and Professor of Computer Science |
|
9:15 a.m. | Discussion and Q & A | |
9:30 a.m. | Panel Discussion:
Panel Moderator: Dr. Robin Dorff, Kennesaw State University, Dean for College of Humanities and Social Sciences |
|
10:30 a.m. | Discussion and Q & A | |
10:45 a.m. | Break - Poster Sessions | |
11:00 a.m. | Keynote Speaker, Major General Fogarty, Chief of Staff, U.S. Cyber Command Introduced by Dr. Bonita Jacobs, President of the University of North Georgia |
|
11:45 a.m. | Discussion and Q & A | |
12:00 p.m. | Lunch Break - No Host | |
1:30 p.m. | Panel Discussion:
Panel Moderator: Matthew (Matt) Stern, Vice President, Cyber for Intelligent Waves, LLC. |
|
2:30 p.m. | Discussion and Q & A | |
2:45 p.m. | Break - Poster Sessions | |
3:00 p.m. | Speaker, Leo Scanlon, Deputy Chief Information Security Officer for U.S. Department of Health and Human Services Introduced by Dr. Conner-Kerr, Dean and Professor of the 国产自拍 College of Health Sciences and Professions |
|
3:30 p.m. | Discussion and Q & A | |
3:45 p.m. | Break | |
4:00 p.m. | Speaker, COL (Ret) Bill Smullen, Director of National Security Studies at Syracuse University Introduced by Dr. Edward Mienie, 国产自拍 Executive Director, Strategic Studies & Partnerships, Associate Professor of Strategic & Security Studies |
|
4:30 p.m. | Discussion and Q & A | |
4:45 p.m. | Break | |
6:30 p.m. | Symposium Social and Poster Session | |
8:00 p.m. | End of Day One | |
Nov. 9 (Thursday) | 8:00 a.m. | Registration |
8:45 a.m. | Welcome, administrative remarks and introduce guests and presenters | |
9:00 a.m. | Speaker, COL Collins, Director of Air Force CyberWorx, U.S. Air Force Academy Introduced by Keith Antonia, 国产自拍 Associate Vice President for Military Programs |
|
9:30 a.m. | Discussion and Q & A | |
9:45 a.m. | Break - Poster Sessions | |
10:00 a.m. | Panel Discussion:
Panel Moderator: Alfred S. Barker, MSIS, Assistant Vice Chancellor/CISO, Cybersecurity, Board of Regents, 国产自拍 |
|
11:00 a.m. | Discussion and Q & A | |
11:15 a.m. | Break | |
11:30 a.m. | Speaker - Colonel Kovacs, Director of the National University of Public Service Cybersecurity Research Team, Hungary Introduced by Dr. Billy Wells, Senior Vice President for Leadership and Global Engagement |
|
12:00 p.m. | Discussion and Q & A | |
12:15 p.m. | Recognitions | |
12:30 p.m. | Closing Remarks, Dr. Billy Wells, Senior Vice President for Leadership and Global Engagement | |
12:45 p.m. | End of Conference |
We invite scholars to submit abstracts for papers or posters on topics related to Civil-Military Cooperation and International Collaboration in Cyber Operations. Possible topics include:
- Identify the entity that has ultimate responsibility for defending U.S. interests in the cyber domain. Is it the U.S. Department of Defense, the U.S. Department of Homeland Security, or other entity, government or commercial?
- The extent to which the U.S. military should collaborate through training and education with military allies, U.S. government, and private entities in cyber operations.
- Determine U.S. policy related to U.S. national security in the cyber domain, including the role of the U.S. Department of State and partnering with foreign nations. Is U.S. policy adequate to the task now and in the future?
- Define and identify examples of “hostile acts” or “acts of war” involving engagements in cyberspace. Are cyber engagements acts of war when there is no imminent threat to human life? Are cyber-physical attacks (cyber-based attacks with kinetic effects, like shutting down a power grid, sabotaging traffic lights in a busy city, shutting down hospital systems, opening a dam) that threaten human life considered acts of war? How does the right to self-defense change in cyberspace?
- The application of the Just War Theory to acts of cyber aggression and cyber espionage.
- Attribution (determining who launched an attack) in cyber. How certain must a nation be that an attack came from a particular source before taking retaliatory action? Do cyber attacks from a rogue entity inside a sovereign state justify the use of force (cyber and/or kinetic) against that state?
- Cyber attacks against U.S. and allied economic interests. Do massive cyber attacks against private sector entities constitute acts of war? What civil-military response/use of force is appropriate to protect the economic security interests of the U.S. and our allies?
Extended papers from selected abstracts will be published by the University of North Georgia Press in a peer-reviewed and edited Symposium Monograph.
The November 7-9, 2017 Symposium will consist of
- Panel Presentations (15-20 minute individual papers),
- Roundtable discussions/Q&A sessions, and
- Poster Sessions
Submission Guidelines
For Panel Sessions: Please submit abstracts (500 words) and short bio (150 words) by Aug 22, 2017 to christopher.jespersen@ung.edu and Bryson.payne@ung.edu OR keith.antonia@ung.edu and bj.robinson@ung.edu. Papers will be a maximum 20 minutes in length. Participants will be notified of acceptance by September 1, 2017
For Poster Sessions: Undergraduate and graduate students and cadets are invited to submit poster proposals (250 words) and short bio (150 words) by Aug 22, 2017 to [see above]. Bios should include Name, Phone, Email, University, Location, and Poster Title. Posters should be 36 inches x 48 inches in landscape or portrait layout orientation. Participants will be notified of acceptance by September 1, 2017
Aug. 2 | Close call for abstracts |
Aug. 16 | Notify authors of abstracts accepted for publication and symposium presentation |
Nov. 7 | Dinner for speakers, presenters and symposium papers due to the 国产自拍 Press |
Nov. 8-9 | Symposium |
2018 | |
Jan. 31 | Presenters: Symposium papers due to the 国产自拍 Press |
Feb. 28 | Presenters: Organizing Group editors' single blind peer review reports on completed papers due |
March 15 | Presenters: Author revisions of papers due |
March 30 | Presenters: Editorial approval of revisions due |
April 16 | Presenters: Layout and design due |
April 23 | Presenters: Proofing notes from authors and editors due |
April 30 | Presenters: Final proof due. Send to LS for printing. |
May 23 | Presenters: Symposium Monograph release digitally and in print |
About the Area
The University of North Georgia is located in the foothills of the Blue Ridge Mountains in Dahlonega, Georgia. Site of the first major gold rush in the United States, 国产自拍 is also home to the Army’s 5th Ranger Training Battalion, the mountain phase of the elite Ranger School.
Information about lodging and things to do is at the .
Where to Park
There are 50 spaces reserved for symposium participants who are not 国产自拍 faculty, staff or students in parking lot 49 behind the . The walk from the parking area to the symposium location on the 3rd floor of the Library Technology Center is about 5 minutes.