Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Calling All Federal Cybersecurity Practitioners: Contribute ideas and actions to enhance the community
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > Calling All Federal Cybersecurity Practitioners: Contribute ideas and actions to enhance the community
Best PracticesSecurity

Calling All Federal Cybersecurity Practitioners: Contribute ideas and actions to enhance the community

BobGourley
BobGourley
4 Min Read
SHARE

On 28 September 2011, FedCyber.com will facilitate a one-day Government-Industry Cyber Security Summit to be held at the Newseum in Washingto

On 28 September 2011, FedCyber.com will facilitate a one-day Government-Industry Cyber Security Summit to be held at the Newseum in Washington DC.

This event is free for government cybersecurity practitioners.

The FedCyber.com Government-Industry Summit will bring together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges, and leverage the nation’s greatest technologies to enhance our defense in depth. This summit is being co-chaired by cyber practitioners Matt Devost and Bob Gourley, who are working with the community to craft an action-oriented event. This summit will help the community shape models for the next decade of national cyber defense.

More Read

big data security protocols
3 Essential Big Data Security Protocols To Be Aware Of
End User Data Threats Businesses Can’t Ignore
Citizens Look to Big Data to Protect Against Draconian Government Oversight
What Lessons Can IT and Analysts Learn from the Cinema Industry?
Changing Your Mind About Big Data Isn’t Dumb

We have confirmed speakers like the Honorable James Miller, Deputy Undersecretary of Defense for Policy and Ms. Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology & Facilities, Scott Culp, Principal Cybersecurity Architect, and Nitin Pradhan, CIO of Department of Transportation. We have also confirmed the attendance of some of the nation’s most capable cyber defenders.

We are attracting a no-nonsense cadre of professionals always on the lookout for virtuous solutions and if that describes you we would like you at this event.

For our current agenda and other details, including registration info, see: http://fedcyber.eventbrite.com

Agenda 

0730- 0800 Registration and Coffee

0800-0810 Devost and Gourley welcome remarks, overview of day and keynote introduction

0810-0900 Morning Keynote – The Honorable Dr. James Miller, DUSD(P)

0900-0945 Panel 1: Accurately Characterizing Cyber Adversaries Moderator – Tom Parker – Author of CyberAdversary Characterization Book

0945 -1015 Networking Break

1015 -1100 Panel 2: CTO Cyber Security Priorities Moderator – Bob Flores – Former CTO of CIA

1100-1130 Cyber Security: 10 Concepts for the Next Ten Years Moderator – Matt Devost – Professor, Georgetown University and FusionX CEO

1130-1230: Lunch and Networking

1230-1315: Afternoon Discussion – Attack-Defend: An examination of the modern cyber attack, why it happened and what could have been done about it – Scott Culp and Sean Finnegan

1315-1400: Panel 3: Furthering the ecosystem: Emerging approaches and solutions

1400-1430: Panel 4: One Wake-up Call Too Many: Models, Norms and US Policy Moderator – Bob Gourley, Former J2 of JTF-CND and former CTO of DIA

1430-1445: Stretch Break

1445-1530: CIO Views: Mitigating Risk to Functionality – Nitin Pradhan, CIO of Department of Transportation

1530-1630: Closing Keynote Ms. Dawn Meyerriecks, ODNI A&T

1630: Wrap up: How to receive conference proceedings and word of the next event.

 

Other panelists/thought leaders/planners involved in this event include:

  • Sherri Ramsay (NSA/NTOC)
  • Steven Chabinsky (FBI)
  • Richard Marshall (DHS)
  • Bobby Stempfley (DHS)
  • Michele Iverson (Department of Education)
  • Rich Pethia (CMU CERT)
  • Bill Crowell (Former Deputy Director of NSA)
  • Marc Sachs (Cyber practitioner, former Director for Communication Infrastructure Protection in the White House Office of Cyberspace Security)
  • Rick Forno (Cyber practitioner and professor)
  • Dawn Meyerriecks, ODNI
  • Scott Culp, Microsoft
  • Nitin Pradhan, DoT
  • Bob Flores, Applicology
  • The Honorable Dr. James Miller, DUSDP
  • Tom Parker, FusionX
  • Plus many highly regarded technologists from industry, academia and government

For more information see: http://events.fedcyber.com/ 

Find us on twitter at: http://twitter.com/fedcyber

Note: we have a limited number of tickets reserved at a special IA/CS student discount rate. We are also able to offer a limited number of scholarships to IA/CS students. Contact us for more information.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data security issues with annotation outsourcing
Data Annotation Outsourcing and Risk Mitigation Strategies
Big Data Exclusive Security
NO-CODE
Breaking down SPARC Emulation Technology: Zero Code Re-write
Exclusive News Software
online business using analytics
Why Some Businesses Seem to Win Online Without Ever Feeling Like They Are Trying
Exclusive News
edi compliance with AI
AI Is Transforming EDI Compliance Services
Exclusive News

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Data accountancy
Best PracticesBig DataCulture/LeadershipData ManagementPolicy and Governance

Big Data Accountability (Part 1)

4 Min Read

Integrating Big Data and More with Your Data Warehouse

4 Min Read
Image
ITSecurity

Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them

4 Min Read
backing up oracle data
Data Management

Ways for Data-Driven Organizations to Backup Oracle With 3rd Party Tools

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?