Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: FedCyber.com Cybersecurity Summit on Wednesday, September 28
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > FedCyber.com Cybersecurity Summit on Wednesday, September 28
Security

FedCyber.com Cybersecurity Summit on Wednesday, September 28

AlexOlesker
AlexOlesker
5 Min Read
SHARE

FedCyber.com‘s Cybersecurity Summit is almost here, and the entire CTOvision team will be there to engage with the community and capture key elements o

FedCyber.com‘s Cybersecurity Summit is almost here, and the entire CTOvision team will be there to engage with the community and capture key elements of the event. The purpose of this one-day conference is to advance the field of cybersecurity by bringing together key thought leaders from the community to work on an action-oriented agenda. Participants in this event are experienced cybersecurity practitioners who are seeking new approaches to collective action against emerging threats. The event will generate new models and approaches. Where applicable, the essence of those new approaches will be captured by our team for dissemination back to the community so we can all keep moving the ball forward.  CTOvision will be providing recaps and commentary on the panels, addresses, and themes of the conference.

The summit is co-chaired by Matt Devost, President & CEO of FusionX, LLC, advisor to the U.S. Department of Defense, Black Hat, adjunct professor of Information Warfare at Georgetown University, and Bob Gourley, former Director of Intelligence (J2) for the Joint Task Force- Computer Network Defense and current CTO at Crucial Point LLC.  Keynotes will be provided by  the Honorable James Miller, Deputy Undersecretary of Defense for Policy, Nitin Pradhan, CIO of Department of Transportation and Ms. Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology & Facilities. Thought leaders from throughout the cyber security community are engaging with the event on panels and as specially invited audience members.

The first panel will be Accurately Characterizing Cyber Adversaries, moderated by Tom Parker, the author of the CyberAdversary Characterization book and CTO of FusionX and will include Professor Rick Forno, Steven Chabinsky,  Deputy Assistant FBI Director, and Rich Pethia, Director of CERT at Carnegie Melon University. Next will be a panel on CTO Cyber Security Priorities and Technological Solutions moderated by Bob Flores, former CTO of the CIA and the current CEO of Applicology, featuring Bill Crowell, former Deputy Director of the NSA, Bob Bigman, the Chief Information Security Officer of the CIA, and Wayne Wheeles of Analytic Designs at Novii Design. There will then be a discussion on Cyber Security: Concepts for the Next Ten Years moderated by Matt Devost with Sherri Ramsay, Director of the NSA/CSS Threat Operations Center and the Department of Education’s Michele Iversen.

More Read

Walking Through The Front Door: SQL Injections
Cryptography Is Fun, But Your Business Calls for Encryption
How to Protect Data Within an App With RASP Security
Is Shadow IT Still Lurking Inside Your Organization?
What Skills Are Needed for a Career in Data-Driven Cybersecurity?

In the afternoon, another discussion, Attack-Defend: An Examination of the Modern Cyber Attack, Why It Happened and What Could Have Been Done About It will go provide enterprise defenders’ perspective on facing sophisticated, persistent attackers. The discussion will be led by John Asante, the Principle Architect of the NSG Cyber Security Team, Microsoft Consulting Services.  John will be joined by Sean Finnegan, senior security architect. Next is a panel on  One Wake-up Call Too Many: Models, Norms and US Policy on changing models, norms, and policy so that the US doesn’t have to be under attack to get leadership attention for cyber security. Bob Gourley will moderate panelists Richard Marshall, the DHS Cyber Security Director, cyber security practitioner Marc Sachs, the  former Director for Communication Infrastructure Protection in the White House Office of Cyberspace Security, and Bob Butler, former Deputy Assistant Secretary of Defense for Cyber and Space Policy. The last panel of the day will be Furthering the Ecosystem: Emerging Approaches and Solutions on sharing lessons learned and community-wide approaches to security, moderated by Matt Devost. The panel features Bobbie Stempfley, the highly regarded leader who established DoD’s most successful cybersecurity solutions who is now leading DHS operational and strategic cybersecurity activities,  and John Topp of Splunk.

In addition to blogging about the event, the CTOvision team will be live-tweeting as appropriate. 

TAGGED:conferenceevent
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

ai driven task management
Reducing “Work About Work” with AI Task Managers
Artificial Intelligence Exclusive
data center uptime
Why Rodent-Resistant Conduits Are Critical for Data Center Uptime
Big Data Data Management Exclusive Risk Management
big data and AI
The Intersection of Big Data and AI in Project Management
Artificial Intelligence Big Data Exclusive
data migration risk prevention
Best Approach to Risk Management for Data Migration in Data-Driven Businesses
Big Data Data Management Exclusive Risk Management

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

MIT Information Quality Symposium

2 Min Read

Predictive Analytics World New York City Conference Announces Speaker Line-Up

5 Min Read

Hands-On Text Analytics Workshop, TAW NYC – Early Bird Pricing Ends Soon

4 Min Read

Some CTO Vision: Is the future still the same?

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?