National Academies Press: OpenBook
« Previous: Appendix A: On the National Academies
Suggested Citation:"Appendix B: List of Participants." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
×

Meeting of November 1–2, 2000 on Cyber-Security and the Insider Threat to Classified Information

Appendix B
Planning Meeting on Cyber-Security and the Insider Threat to Classified Information—November 1–2, 2000 List of Participants

James Anderson

Independent Contractor

Edward Appel

Level 3 Communications

Mitchell Baxter

LegalNet Works Incorporated

Terry Benzel

Network Associates

Earl Boebert

Sandia National Laboratories

Thomas Bozek

Office of Secretary of Defense

Richard Brackney

National Security Agency

Michael Caloyannides

Mitretek Systems, Inc.

David “Beau” Davis

DISA/GC

John Davis

Mitretek Systems, Inc.

Anita Jones

University of Virginia

David Keene

Department of Defense

Terrence Kelly

White House Office of Science and Technology Policy

Stephen Kent

BBN Technologies

Ronald Knecht

SAIC

Sandra Lambert

Lambert & Associates

Carl Landwehr

Mitretek Systems, Inc.

Karl Levitt

University of California, Davis

Gary McGraw

Cigital

Timothy Nagle

TRW

Robert Rosenthal

National Institute of Standards and Technology

Roman Sloniewsky

Critical Infrastructure Assurance Office U.S. Department of Commerce

Nicholas Trio

IBM T.J.Watson Research Center

Chenxi Wang

University of Virginia

Bradley Wood

SRI International

Michael Woods

Federal Bureau of Investigation

Bradley Woodworth

Pacific Northwest National Lab

Suggested Citation:"Appendix B: List of Participants." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
×
Page 13
Next: Appendix C: Meeting Agenda »
Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information Get This Book
×
 Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information
MyNAP members save 10% online.
Login or Register to save!

This is a summary of discussions at a planning meeting held November 1-2, 2000 to examine the prospects of initiating an NRC study on cyber-security and the insider threat to classified information. The meeting's focus was on the threat to classified systems and information because the political and organizational issues that often arise with protection policies and practices (e.g., rights to privacy) are considerably fewer and less intense than if sensitive unclassified information (especially non-governmental information) is involved. The meeting also addressed threats other than insider threats as well as non-classified computer systems.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!