This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Print Page | Contact Us | Report Abuse | Sign In | Join
Just Trust Me 2019
Share |

Day 1


WELCOME - Dianna Blair

KEYNOTE – How human factors, group dynamics, and host-inspector relationships impact trust - John Gilbert

Trusted People: Steven Kadner

Reliability and the Little Things that Matter - Julian Atencio

Identifying Observables for Identifying Insider Threat - Shannon Abbott

Overview of tools for insider threat - Christy Ruggiero

Trusted Equipment: Sarah Sarnoski

Tamper-Indicating Enclosures with Visually Obvious Tamper Response - Heidi Smartt

Trusted and Secure Monitoring North Korea’s Nuclear Arsenal - Moritz Kütt

Industrial Irradiator Security by Design - Michelle Potter

The Trusted Radiation Identification System: Designed to Encourage Trust - Michael Hamel

Trusted Data: Lon Dawson

Trusting Machine Learning Algorithms for Safeguards Applications - Nathan Shoman

Distributed Ledger Technologies (DLT) for Nonproliferation and Safeguards - Michael Frank

Open-Source vs. Proprietary Virtual Private Network (VPN) Solutions - Keith Morgan


Day 2


OPENING REMARKS - Chris Ramos

ARMS CONTROL MENTORING PROGRAM - Peter Marleau/Morag Smith

Trusted People: Steve Mladineo

Human Cognition Indicator Applications for International Safeguards - Logan Scott

Nuclear security training for non-English speakers - Robert Finch

Don’t Believe Your Eyes: Lessons from the Cognitive Science Community on Inattentional Blindness and their Relevance for International Safeguards Verification - Zoe Gastelum

Export Compliance Challenges at an NNSA Laboratory - Karla Niemi

Trusted Equipment: Chris Pickett

Authentication of Electronics for Arms Control - Keith Tolk

8 Bits for Trust: Vintage Verification using 6502 Processors and Physical Storage Media - Moritz Kütt

Intrinsic and Applied Unique Identifiers - Keith Tolk

Trusted Methods: Chris Ramos

Multi-System Complex Nuclear and Radiological Material Protection Efforts Highlighting Human Factors - William Toth

Disorder-Based Approaches to Verification - Sébastien Philippe

Augmented Reality for Increasing Trust in Physical Security Systems - Jonathan Whetzel

Accrediting Safeguards Measurement Capability - Steven Kadner

LUNCH PROVIDED IN CGSC BISTRO

TABLE TOP EXERCISE

Closing Remarks

ADJOURN/POST WORKSHOP NETWORKING