CCCCatalyzing the computing research community and enabling the pursuit of innovative, high-impact research.
  • Twitter
  • Facebook
  • Youtube
  • Rss
  • About
    • About CCC
    • Council Members
    • Council Meetings
    • CCC Council Nominations
    • Governing Documents
    • FAQ
    • Contact
  • Visioning
    • RFP – Creating Visions for Computing Research
    • Blue Sky
    • Computing Visions 2025
    • Visioning Activities
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011 and Prior Years
    • Workshop Reports
  • Leadership Development
    • Call for Council Nominations
    • Big Data Regional Hubs
    • Leadership in Science Policy Institute
    • Postdoc Best Practices
      • Postdoc Best Practice Final Reports
      • Postdoc Best Practice Resources
    • CIFellows
      • CI Fellows 2014 Workshop
      • 2011 Class
      • 2010 Class
      • 2009 Class
      • Assessment
      • Success Stories
      • Diversity
  • Task Forces
    • AI Working Group
    • Industry Collaboration Working Group
    • Cybersecurity and Cybercrime
    • Health and Human Computer Interaction
    • Information Integrity and Provenance
    • Intelligent Infrastructure
    • Fairness and Accountability
    • Systems and Architecture
    • Past Task Forces
  • Resources
    • Workshop Reports
    • CCC-Led White Papers
    • Presentations
    • CCC Responds to the Community
    • Recent CCC Activities
    • Ongoing CCC Activities
    • Computing Research in Action
    • Computing Research Highlights
    • Great Innovative Ideas
    • Event Videos
  • Events
    • Upcoming Events
    • Special Events
    • Past Events
    • CCC at AAAS
      • CCC at AAAS 2019
      • CCC at AAAS 2018
      • CCC at AAAS 2017
      • CCC at AAAS 2016
      • CCC at AAAS 2013
  • Blog
  • CCC by CS Area
  • Podcast
  • Search
  • Menu

Sociotechnical Cybersecurity Workshop 2


August 8-9, 2017

San Diego
Scripps Seaside Forum, San Diego, CA, United States



Event Contact

Ann Drobnis
adrobnis@cra.org
2022662936


Event Type

2017 Events, 2017 Visioning Activities


Event Category

CCC


Tags

cybersecurity, sociotechnical security

Overview

Information and Communications Technology (ICT) has taken a central role in modern society. Unfortunately, malicious hackers and cybercrime have become a stubborn and expensive part of the ICT landscape. This has made providing cybersecurity a defining challenge for our era. Many strategic plans and National Academies of Sciences (NAS) studies have been written, and billions of dollars have been spent on the development and deployment of innovative cybersecurity solutions, but our network infrastructure, devices and organizations are increasingly insecure against threats.

In February 2016, the federal government released a new cybersecurity federal R&D strategic plan – this one mandated by Congress – that explicitly engaged the socio-technical nature of the systems that we are securing. The plan also emphasized the need for understanding the efficacy of different approaches, albeit empirically, economically, or mathematically. However, in order to make meaningful progress, using a socio-technical approach requires innovation driven by informational and experiential diversity.

A socio-technical approach to cybersecurity recognizes that the science and technology deployed to protect and defend our information and critical infrastructure must consider human, social, organizational, economic and technical factors, as well as the complex interaction among them, in the creation, maintenance, and operation of our systems and infrastructure.

Our goal is to advocate an evidence-based sociotechnical cybersecurity approach, integrating the best research evidence with diverse cybersecurity expertise and broadening the consideration of ICT user characteristics, through the exploration of potential grand challenge areas. Our intention is that the grand challenges will promote effective and appropriate consideration of the socio-technical factors and sound and effective principles of cybersecurity assessment, evaluation, and intervention. The five potential grand challenges we plan to explore during the workshop are:

  • How can organizations be structured to handle cybersecurity better?
  • How could one go about creating a Cybercrime Statistic Bureau?
  • How do we design and evaluate cyberinfrastructure that takes the behavior of all users, including adversaries, into account?
  • How do we preserving individual agency in cyberspace?
  • How do we design incentives to ensure security?

The resulting report will help illuminate the implications for cybersecurity researchers of taking a socio-technical approach identifying human, social, organizational, economic and technical factors that must be considered, techniques for understanding the interactions among them, and positive steps that can be taken to better protect and defend our information and critical infrastructure.

This workshop is the second workshop in the Sociotechnical Cybersecurity workshop series and will expand upon the discussions held in workshop 1.

Agenda

August 7, 2017 (Monday)

06:30 PM Welcome Reception | Hotel La Jolla - Hiatus Lounge

August 8, 2017 (Tuesday)

07:15 AM Breakfast | Hotel La Jolla – Starling
08:45 AM Welcome | Samuel H. Scripps Auditorium
09:10 AM Lightning Introductions | Samuel H. Scripps Auditorium
09:30 AM Review of the Five Areas | Samuel H. Scripps Auditorium
  • Framework of Organization to Map the Culture of Cyber Risk – Susan Squires
  • Preserving Individual Agency in Cyberspace – Shuyuan Mary Ho
  • Incentives – Tim Summers
  • Cybercrime Statistics – Tyler Moore and Tom Holt
  • Design for Behavior – Deanna Caputo
10:30 AM Break | Scripps Seaside Forum – Auditorium Foyer
11:00 AM What Do We Want from a Grand Challenge? | Samuel H. Scripps Auditorium
12:00 PM Working Lunch: Some Suggestions on Grand Challenges | Scripps Seaside Forum – Patio
01:00 PM Discussion | Samuel H. Scripps Auditorium
01:30 PM Individual and Group Work on Developing Grand Challenge Ideas | Samuel H. Scripps Auditorium
03:30 PM Break | Scripps Seaside Forum – Auditorium Foyer
04:00 PM Review of Ideas | Samuel H. Scripps Auditorium
  • Cybercrime Statistics Breakout
  • Incentives Breakout
  • Organization and Cyberinfrastructure Breakout
  • Enabling Agency in a Cyber Mediated World Breakout
05:30 PM Conclude Day 1 | Samuel H. Scripps Auditorium
06:00 PM Dinner | Scripps Seaside Forum – Patio

August 9, 2017 (Wednesday)

07:15 AM Breakfast | Hotel La Jolla – Starling
08:45 AM Recap of the First Day | Samuel H. Scripps Auditorium
09:30 AM Individual and Group Work on Refining Grand Challenge Ideas | Samuel H. Scripps Auditorium
10:45 AM Break | Scripps Seaside Forum – Auditorium Foyer
11:00 AM Continue Group Work on Refining Grand Challenge Ideas | Samuel H. Scripps Auditorium
11:30 AM Report out on first grand challenge idea and discussion | Samuel H. Scripps Auditorium
  • Cybersecurity seen through a chaotic lens
12:00 PM Lunch | Scripps Seaside Forum - Pation
01:00 PM Report out on second grand challenge idea and discussion | Samuel H. Scripps Auditorium
  • Enabling Agency
01:30 PM Report out on third grand challenge idea and discussion | Samuel H. Scripps Auditorium
  • Design
02:00 PM Report out on fourth grand challenge idea and discussion | Samuel H. Scripps Auditorium
  • Cybercrime Data
02:30 PM Break | Scripps Seaside Forum – Auditorium Foyer
02:45 PM Building Teams | Samuel H. Scripps Auditorium
03:00 PM Team Meeting | Samuel H. Scripps Auditorium
04:00 PM Team Report Out | Samuel H. Scripps Auditorium
04:40 PM Wrap-up and Conclude Workshop | Samuel H. Scripps Auditorium
Organizers

Deanna Caputo, MITRE Corporation

Stephanie Forrest, University of New Mexico

Qing Hu, City University of New York

Brian LaMacchia, Microsoft Research

Oded Nov, New York University

Sasha Romanosky, RAND Corporation

Stefan Savage, University of California, San Diego

Timothy Summers, University of Maryland, College Park

Susan Winter, University of Maryland, College Park

Heng Xu, Pennsylvania State University

With Support From

Lorenzo Alvisi, University of Texas at Austin

Ann Drobnis, CCC

Keith Marzullo, University of Maryland, College Park

Logistics

The Computing Community Consortium (CCC) will cover travel expenses for all participants who desire it. Participants are asked to make their own travel arrangements to get to the workshop, including purchasing airline tickets. Following the symposium, CCC will circulate a reimbursement form that participants will need to complete and submit, along with copies of receipts for amounts exceeding $75.

In general, standard Federal travel policies apply: CCC will reimburse for non-refundable economy airfare on U.S. Flag carriers; and no alcohol will be covered.

For more information, please see the Guidelines for Participant Reimbursements from CCC.

Additional questions about the reimbursement policy should be directed to Ann Drobnis, CCC Director (adrobnis [at] cra.org).

CRA - Uniting Industry, Academia and Government to Advance Computing Research and Change the World.
CCC - Catalyzing the computing research community and enabling the pursuit of innovative, high-impact research.
CRA-W - Increasing the success and participation of women in computing research.
CRA-E - Addressing society’s need for a continuous supply of talented and well-educated computing researchers.
CERP - Promoting diversity in computing through evaluation and research.
CRA Home | Contact Us | Unsubscribe/Removal of Information | Terms of Use         © Copyright 2019 - CRA
AAAI Symposium on AI for Social Good Leadership in Science Policy Institute
Scroll to top