Program Manager, Cyber Security Division, Science and Technology Directorate
Department of Homeland Security
Special Assistant to the President and Cybersecurity Coordinator
Executive Office of the President
Note: Seats are filling up, reserve yours today. Simply select DNSSEC as one of your FREE educational options during your conference registration. Click here to register.
Location: Room 152A
Nearly 50 percent of U.S. Federal domains and a significant number of worldwide governmental, commercial, nonprofit and business domains are now secured with DNSSEC, the Domain Name System Security Extensions. Yet large-scale domain name attacks and vulnerabilities continue, not just to the DNS, but to other applications that rely on the DNS to store information. DNSSEC provides the means to protect application information stored in the DNS, in effect, making DNS a trust infrastructure that other applications can utilize.
In the quest to make DNSSEC a useful trust infrastructure for Internet applications, this session will look at the remaining challenges and emerging trends in U.S. Federal DNSSEC deployment; share new DNSSEC-aware applications; and conduct a wide-ranging discussion of the future of domain-name security with leading Federal and private-sector DNS experts.
- Understand where U.S. Federal DNSSEC deployments stand, and the impact of reductions in Federal data centers and domain names on .gov deployment.
- Learn about new DNSSEC-aware apps that can help speed or ease deployment.
- Learn where DNSSEC will lead Federal and worldwide Internet security next, in the face of large-scale domain-name attacks and other challenges.
- Hear from DNSSEC & Infrastructure Providers
Who Should Attend:
- Policy Makers
- Directors of Networking
- Directors of Security
- Systems Administrators
- Network Engineers
- Information Assurance Professionals
10:00 AM: Welcome and Introductions
DNSSEC, The Federal Government, and Where We Go From Here
- Honorable Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator (Invited Guest)
- W. Douglas Maughan, Cyber Security Division Director, Science and Technology Directorate, U.S Department of Homeland Security
10:15 AM: Trends and Challenges in Federal DNSSEC Deployment
- Scott Rose (Moderator), National Institute of Standards and Technology
- Update on .gov - The uptake of DNSSEC in the .gov zone - Valeri Stoyanov Reporting and Analysis Program Manager, Cyber Security Division, Science and Technology Directorate, U.S Department of Homeland Security
- VeriSign on the services they offer to and through .gov - Matt Larson, Vice president, DNS Research, VeriSign
- FCC and DNSSEC – Jeffery M. Goldthorp, Associate Chief – Cybersecurity and Communications Reliability, Public Safety and Homeland Security Bureau, Federal Communications Commission
- FISMA, with emphasis on mobile requirements - Scott Rose, National Institute of Standards and Technology
11:00 AM: Break
11:15 AM: Trends and New Developments in DNSSEC-aware Apps
- Applications and Dane - Russ Mundy, Principal Networking Scientist, Sparta, Inc.
- Report on NLNet Labs DNSSEC Trigger – Robert G. Novas, Member, Senior Technical Staff, Shinkuro, Inc.
- Chrome and Mozilla DNSSEC plug-ins Developed by .cz - Ondrej Sury, Head of R&D for CZ.NIC Laboratories
- Reengineering Trust: Towards The Domain Key Infrastructure - Dan Kaminsky, Chief Scientist, DKH
- National Strategy for Trusted Identity in Cyberspace – Jeremy Grant, National Institute of Standards and Technology
12:00 PM – 12:30 PM: Vendor Panel (Steve Crocker Moderator)
- Secure 64 (Mark Beckett, VP Marketing and Product Management)
- Afilias (Jim Galvin, Director, Strategic Relationships and Technical Standards)
- Nominum (Srini Avirneni, VP of Customer Advocacy and Innovation)
- Infoblox (Victor Danevich, Sr. Director Pre-Sales System Engineer & Professional Services, Americas)
- F5 (Jonathan George, Product Marketing Manager)
- ISC (Suzanne Woolf)
12:30 PM: Break for Lunch and Exhibits
2:00 PM: DNSSEC and Infrastructure Providers
- Akamai – David Lawrence, Principal Software Engineer at Akamai Technologies
- Comcast - Chris Griffiths, National Engineering and Technical Operations
- Go Daddy – Wayne Thayer, Chief Technology Officer
2:30 PM: Roundtable: Where does DNSSEC lead us next? (Ed Rhyne is Moderator)
- Doug Montgomery - National Institute of Standards and Technology
- Scott Rose - National Institute of Standards and Technology
- W. Douglas Maughan - Cyber Security Division Director, Science and Technology Directorate, U.S Department of Homeland Security
- Jeffery M. Goldthorp - Associate Chief – Cybersecurity and Communications Reliability, Public Safety and Homeland Security Bureau, Federal Communications Commission
- Chris Griffiths – National Engineering and Technical Operations, Comcast
- Jim Galvin - Director, Strategic Relationships and Technical Standard, Afilias
- Adam Langley - Google
- Dan Kaminsky – Chief Scientist, DKH
Discussing these questions:
- What happens when we have a chain of trust that’s complete?
- What happens to DNSSEC if we migrate to a cloud solution? How do more secure protocols affect cloud architecture?
- What role do DANE protocols play as we transition to the future of DNSSEC?
- What’s the killer app that will drive end-to-end trust?
- What else needs to happen to make DNSSEC the trust anchor?
3:45 PM: Roundtable Continues with Audience Questions
4:00 PM: Conclusion