Computational Cybersecurity in Compromised Environments Workshop
page
Submitted by Katie Dey on Tue, 08/07/2012 - 1:52pm
After you register for the C3E Workshop please follow the instructions below with regards to travel. Please note that indivudals will not be reimbursed for travel made on their own. All travel must go through our travel coordinator.
Travel Instructions
Each participant is responsible for submitting their preferred means of travel to the travel coordinator. Please Fill out the forms below and send them to Nekeia Butler at butler@nitrd.gov
page
Submitted by Katie Dey on Fri, 08/03/2012 - 2:17pm
You must be logged in and a member of the C3E group for full funtionality.
page
Submitted by Katie Dey on Wed, 07/11/2012 - 11:50am
The Thayer Hotel at West Point
page
Submitted by Katie Dey on Mon, 07/02/2012 - 2:41pm
page
Submitted by Anonymous on Mon, 07/02/2012 - 2:10pm

C3E 2022 was held virtually Monday, October 27 Through Wednesday, October 19 and explored the theme of Cybersecurity and Software in the Supply Chain. The tracks looked at cybersecurity in compromised environments focusing on the role of AI and ML in critical systems and the human element, and at impacts on their resilience through the lens of system risk and mitigation.
file
Melissa Hathaway, Cybersecurity Chief at the National Security Council
A report on Assuring a Trusted and Resilient Information and Communications Infrastructure.
http://www.whitehouse.gov/CyberReview/