IACD Community Day
March 23, 2017

The latest IACD Community Day was held on March 23, 2017, and hosted 136 unique organizations. The full-day event featured an IACD Overview and IACD Framework brief as well as a Spiral 6 and 7 Implementation Findings brief presented by the JHU/APL IACD team. The next set of briefings were presented by Anomali, Symantec, and World Wide Technology (WWT), organizations supportive of the IACD framework. Finally, the event ended with a set of six breakout sessions that were jointly hosted by the JHU/APL team and selected organizations. The breakout sessions provided a forum for the cyber defense community to engage with the IACD team as well as other members of the community to discuss topics ranging from orchestration to advanced concepts. This IACD Community Day also offered the unique opportunity for organizations to participate in a poster session that was available throughout the day. The poster session provided another forum for organizations to share with one another how they are implementing and enhancing IACD concepts. See below for links to the main briefs, as well as the breakout sessions discussion starters.


8:30 a.m. – 9:00 a.m. Introductory Remarks and Administrative Announcements
9:00 a.m. – 10:00 a.m. IACD Update
10:00 a.m. – 10:20 a.m. Break
10:20 a.m. – 11:30 a.m. IACD Government, Industry, and Association Topics
11:30 a.m. – 12:00 p.m. Overview of Breakout Sessions
12:00 p.m. – 12:30 p.m. Box Lunch Pickup and Move to Breakout Locations
12:30 p.m. – 2:00 p.m. Breakout Sessions
2:00 p.m. – 2:30 p.m. Wrap-Up and Closing Remarks

Main Event Briefs

Breakout Session Overviews and Briefs

  • Cyber Threat Information Sharing and AIS
    • Industry and government are working to share cyber threat information. Hear about some of the ways to leverage these efforts, learn about how they relate to automation, and participate in a discussion on how to make sure the right information is being shared.
  • Orchestration Services Capability and Community
    • This session covers recent orchestration specification efforts, options for addressing open questions, and approaches for identifying and advancing a set of minimum specifications.
  • Cyber Defense of Bridging IT/OT
    • This session covers recent research and development activities related to the cyber defense of operational technology (OT), to include: the use of threat intelligence to invoke OT actions, identification of automated actions that can safely be performed on OT equipment, and gaps that exist in commercial technologies preventing the implementation of these concepts.
    • California Energy Systems (CES) for the 21st Century Brief
  • Rapid Interoperability via Open Interfaces
    • This session covers interoperability initiatives to establish or use open interfaces for cyber defense integration of existing capabilities, new capabilities, and the achievement capabilities that are greater than the sum of their parts. 
  • Partnership Opportunities for Integrators
    • This session covers products, content, and “branding” that could be provided to the integrator community to support deployment and piloting of IACD capabilities in customer organizations. The session will also include a discussion of what information integration partners are able to collect and how to provide that back to the IACD community to advance capabilities, provide business value propositions, and identify gaps or barriers to adoption that need to be addressed.
  • Advanced Concepts and Innovation
    • Through research presentations and follow-on discussion, this session identifies relevant current research projects that further the state of the art in security automation and integration.