©2018 by 2019 2nd International Conference on Data Intelligence and Security. 

ICDIS 2019 Speakers
Paulo Shakarian.png

Paulo Shakarian is a Fulton Entrepreneurial Professor at Arizona State University.  He has written numerous articles in scientific journals and has authored several books, including Elsevier’s Introduction to Cyber-Warfare and Cambridge’s Darkweb Cyber Threat Intelligence Mining.  Recently, his work was featured in major news media including CNN, The Economist, and Business Insider.  He was named a “KDD Rising Star” by Microsoft Research Asia, was recipient of the Air Force Young Investigator award, FOSINT-SI Best Paper, and MIT Tech. Review “Best of 2013”. He also held fellowships with both DARPA and New America.  CYR3CON™, the ASU spin-out company for which Paulo co-founded and serves as CEO, was named a finalist in the Defense Innovation Technology Challenge (2017), won a National Science Foundation Innovation Corps award (2017), and was a semi-finalist in the Cisco Innovation Grand Challenge (2016).

Fulton Entrepreneurial Professor at Arizona State University,

CEO and Co-founder of CYR3CON

Paulo Shakarian,  PhD

Speech title:  Proactive Cybersecurity: The Case for Artificial Intelligence

Abstract:  The malicious hacker threat continues to surprise defenders with a variety of attacks while the complexity of information technology infrastructure is creating a larger attack surface.  Meanwhile the number of unfilled cybersecurity positions is expected to exceed 3.5 million in the next two years.  Meanwhile, traditional methods of prioritizing resources continue to fail to protect against large attacks. For example, 57% of chief security officers have stated they were breached due to known but unpatched vulnerabilities.  In this talk, we examine how various techniques such artificial intelligence methods, especially when combined with techniques from data mining and social network analysis, can lead to the ability to predict and avoid cyberattacks.  We examine a recent line of research that show promising results obtained by these methods can augment cybersecurity capabilities like vulnerability management, security operations, risk management, and endpoint security.  Additionally, we also discuss how such systems have been employed to real-world corporations.

Cliff Wang.jpg

Dr. Cliff Wang graduated from North Carolina State University with a PhD in computer engineering in 1996. He has been carrying out research in the area of computer vision, medical imaging, high speed networks, and most recently information security. He has authored over 40 technical papers and 3 Internet standards RFCs. Dr. Wang also authored/edited for 13 books in the area of information security and hold 3 US patents on information security system development. Since 2003, Dr. Wang has been managing extramural research portfolio on information assurance at US Army Research Office. In 2007 he was selected as the director of the computing sciences division at ARO while in the same time managing his program in cyber security. For the past ten years, Dr. Wang managed over $150M research funding which led to significant technology breakthroughs. Dr. Wang also holds adjunct faculty position at both Department of Computer Science and Department of Electrical and Computer Engineering at North Carolina State University. Dr. Wang is a Fellow of IEEE.

Division Chief,  Computing Sciences, 

U.S. Army Research Office

Cliff Wang, PhD

Speech title: Cyber Deception: an Emergent Research Area

Abstract: Deception has been used since early days of warfare. Until most recently deception techniques such as honeynet have also been adopted in the cyber space. However, most approaches are ad hoc at best. There are increasing interests in establishing a formal model that can be used to capture key characteristics of cyber deception and to evaluate the effectiveness of using deception as a proactive network defense tool. This talk will share some of initial thoughts in identifying new opportunities in cyber deception and exploring new research ideas in this space.

King 4x5_v3.jpg

Kyle King is a senior Data Scientist and currently the NSA Visiting Professor to the United States Military Academy at West Point. He attended the University of Idaho as a Scholarship for Service Fellow where he published papers on building computer laboratories suitable for teaching computer exploitation. He has a Bachelors’ in Math and Computer Science and a Master’s in Information Technology. Mr. King currently teaches Cyber Operations, Artificial Intelligence, and Intelligence Analysis at West Point.

Senior Data Scientist

Fellow, United States Military Academy at West Point

Kyle King

Speech title: What do you do with a 5GB CSV? 

Abstract: The benefits of Big Data, which have been realized at the strategic level for many businesses, do not trickle down to the tactical level where the majority of the workforce operates. Despite having access to some of the most powerful analytic technologies ever created, domain experts and analysts find themselves lacking the tools and resources needed to solve many of their most basic and immediate problems. This talk discusses the current state of “tactical” Big Data analysis and where it is going.


George Reeves is a Cybersecurity Advisor with the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. As a Cyber Security Advisor, Mr. Reeves works to foster collaboration and coordination on cyber preparedness, risk mitigation and incident response, and to provide cyber security resources, including training, exercises, and assessments, in support of the nation's Critical Infrastructure Key Resource sectors and with state and local governments.

Mr. Reeves is a retired Special Agent for the Air Force Office of Special Investigations and was responsible for conducting cyber investigations and operations to detect, mitigate and neutralize adversarial threats targeting the Air Force network and assets. Prior to joining the DHS, Mr. Reeves held several positions within the private sector where he was responsible for identifying and monitoring advanced cyber threats, discovery of cyber vulnerabilities, and investigating global cyber security incidents.

Cybersecurity Advisor,  Cybersecurity and Infrastructure Security Agency,

U.S. Department of Homeland Security

George Reeves

Speech title: Public-Private Partnerships: A Key Component of Cyber Risk Management 

Abstract: The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the heart of mobilizing a collective defense as we lead the Nation’s efforts to understand and manage risk to our critical infrastructure. Considering a large majority of our critical infrastructure is owned and operated by the private sector, collaboration is imperative to secure and allow us to address the systemic risks facing U.S. critical infrastructure. This talk discusses how CISA is working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future.

ICDIS 2018 Speakers

Dr. Chaitan Baru is Senior Advisor for Data Science in the Computer and Information Science & Engineering Directorate at the National Science Foundation, Alexandria, VA. He co-chairs the NSF working group for the Harnessing the Data Revolution Big Idea, and has responsibility for the cross-Foundation BIGDATA research program. He is advisor to the NSF Big Data Regional Innovation Hubs and Spokes program (BD Hubs/Spokes) and was engaged in the development of the NSF Transdisciplinary Research in Principles of Data Science (TRIPODS) program. He co-chairs the Big Data Interagency Working Group—which is part of the Networking and IT R&D program of the National Coordination Office, White House Office of Science and Technology Policy—and is a primary co-author of the Federal Big Data R&D Strategic Plan (released May 2016). 


He is on assignment at NSF from the San Diego Supercomputer Center (SDSC), University of California San Diego, where he is a Distinguished Scientist and Director of the Advanced Cyberinfrastructure Development Group (acid.sdsc.edu) and the Center for Large-scale Data Systems Research (CLDS).

Speech title: Harnessing the Data Revolution


Dr. C.-C. Jay Kuo received his Ph.D. degree from the Massachusetts Institute of Technology in 1987. He is now with the University of Southern California (USC) as Director of the Media Communications Laboratory and Dean’s Professor in Electrical Engineering-Systems. His research interests are in the areas of digital media processing, compression, communication and networking technologies. Dr. Kuo was the Editor-in-Chief for the IEEE Trans. on Information Forensics and Security in 2012-2014. He was the Editor-in-Chief for the Journal of Visual Communication and Image Representation in 1997-2011, and served as Editor for 10 other international journals. Dr. Kuo received the 1992 National Science Foundation Young Investigator (NYI) Award, the 1993 National Science Foundation Presidential Faculty Fellow (PFF) Award, the 2010 Electronic Imaging Scientist of the Year Award, the 2010-11 Fulbright-Nokia Distinguished Chair in Information and Communications Technologies, the 2011 Pan Wen-Yuan Outstanding Research Award, the 2014 USC Northrop Grumman Excellence in Teaching Award, the 2016 USC Associates Award for Excellence in Teaching, the 2016 IEEE Computer Society Taylor L. Booth Education Award, the 2016 IEEE Circuits and Systems Society John Choma Education Award, the 2016 IS&T Raymond C. Bowman Award, and the 2017 IEEE Leon K. Kirchmayer Graduate Teaching Award. Dr. Kuo is a Fellow of AAAS, IEEE and SPIE. He has guided 140 students to their Ph.D. degrees and supervised 25 postdoctoral research fellows. Dr. Kuo is a co-author of 260 journal papers, 900 conference papers, 30 patents and 14 books.

Speech title:  Why and Why Not Convolutional Neural Networks (CNNs)?