Cybersecurity Lecture Series with David Jakob Fritz
Friday, April 13, 2018
12:00pm - 1:00pm
For More Information
The Cybersecurity Lecture Series at Georgia Techis a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.
"I made the very model, but the model was too general: Modeling every cyber vegetable, animal, and mineral."
The Sandia Emulytics capability aims to model all domains of the cyber and cyber-physical landscape, at scale, in order to better understand cybersecurity threats against government networks and critical infrastructure. Whereas physical testbeds are costly to maintain and scale, and simulators fail to represent cyber misbehavior adequately, Sandia Emulytics blends Virtual Machine based testbeds, hardware in the loop, and simulators as needed to maximize fidelity and scale. Now a 10-year program, Sandia Emulytics supports heterogeneous modeling of IT, electric power, telephony, IoT, cyber-physical phenomena, and user behavior, and scales to millions of endpoints. The core toolset is open source and publicly available. This talk will cover the capability today, how attempting to model everything is a necessary but ultimately lost endeavor, and current and future research challenges.
David Jakob Fritz, Ph.D., is a principle member of the technical staff at Sandia National Laboratories in Albuquerque, NM. He graduated with a Ph.D. in electrical engineering in 2012 and has been working at Sandia since 2010. He currently leads Sandia's Emulytics program, which aims to advance the state of the art in experimental cybersecurity through large-scale network and cyber-physical emulation. Most recently, he helped expand Emulytics capabilities for IoT and automated threat modeling.
Last revised May 23, 2018