Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: FedCyber.com Cybersecurity Summit on Wednesday, September 28
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > FedCyber.com Cybersecurity Summit on Wednesday, September 28
Security

FedCyber.com Cybersecurity Summit on Wednesday, September 28

AlexOlesker
AlexOlesker
5 Min Read
SHARE

FedCyber.com‘s Cybersecurity Summit is almost here, and the entire CTOvision team will be there to engage with the community and capture key elements o

FedCyber.com‘s Cybersecurity Summit is almost here, and the entire CTOvision team will be there to engage with the community and capture key elements of the event. The purpose of this one-day conference is to advance the field of cybersecurity by bringing together key thought leaders from the community to work on an action-oriented agenda. Participants in this event are experienced cybersecurity practitioners who are seeking new approaches to collective action against emerging threats. The event will generate new models and approaches. Where applicable, the essence of those new approaches will be captured by our team for dissemination back to the community so we can all keep moving the ball forward.  CTOvision will be providing recaps and commentary on the panels, addresses, and themes of the conference.

The summit is co-chaired by Matt Devost, President & CEO of FusionX, LLC, advisor to the U.S. Department of Defense, Black Hat, adjunct professor of Information Warfare at Georgetown University, and Bob Gourley, former Director of Intelligence (J2) for the Joint Task Force- Computer Network Defense and current CTO at Crucial Point LLC.  Keynotes will be provided by  the Honorable James Miller, Deputy Undersecretary of Defense for Policy, Nitin Pradhan, CIO of Department of Transportation and Ms. Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology & Facilities. Thought leaders from throughout the cyber security community are engaging with the event on panels and as specially invited audience members.

The first panel will be Accurately Characterizing Cyber Adversaries, moderated by Tom Parker, the author of the CyberAdversary Characterization book and CTO of FusionX and will include Professor Rick Forno, Steven Chabinsky,  Deputy Assistant FBI Director, and Rich Pethia, Director of CERT at Carnegie Melon University. Next will be a panel on CTO Cyber Security Priorities and Technological Solutions moderated by Bob Flores, former CTO of the CIA and the current CEO of Applicology, featuring Bill Crowell, former Deputy Director of the NSA, Bob Bigman, the Chief Information Security Officer of the CIA, and Wayne Wheeles of Analytic Designs at Novii Design. There will then be a discussion on Cyber Security: Concepts for the Next Ten Years moderated by Matt Devost with Sherri Ramsay, Director of the NSA/CSS Threat Operations Center and the Department of Education’s Michele Iversen.

More Read

What does Wikileaks mean for open data initiatives?
3 Ways to Keep your Websites and Apps Stable and Scalable
5 Vital And Helpful Data-Driven Tips To Bolster Cybersecurity
How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
Locky Ransomware Statistics: Geos Targeted, Amounts Paid, Spread Volumes and Much More…

In the afternoon, another discussion, Attack-Defend: An Examination of the Modern Cyber Attack, Why It Happened and What Could Have Been Done About It will go provide enterprise defenders’ perspective on facing sophisticated, persistent attackers. The discussion will be led by John Asante, the Principle Architect of the NSG Cyber Security Team, Microsoft Consulting Services.  John will be joined by Sean Finnegan, senior security architect. Next is a panel on  One Wake-up Call Too Many: Models, Norms and US Policy on changing models, norms, and policy so that the US doesn’t have to be under attack to get leadership attention for cyber security. Bob Gourley will moderate panelists Richard Marshall, the DHS Cyber Security Director, cyber security practitioner Marc Sachs, the  former Director for Communication Infrastructure Protection in the White House Office of Cyberspace Security, and Bob Butler, former Deputy Assistant Secretary of Defense for Cyber and Space Policy. The last panel of the day will be Furthering the Ecosystem: Emerging Approaches and Solutions on sharing lessons learned and community-wide approaches to security, moderated by Matt Devost. The panel features Bobbie Stempfley, the highly regarded leader who established DoD’s most successful cybersecurity solutions who is now leading DHS operational and strategic cybersecurity activities,  and John Topp of Splunk.

In addition to blogging about the event, the CTOvision team will be live-tweeting as appropriate. 

TAGGED:conferenceevent
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

warehouse accidents
Data Analytics and the Future of Warehouse Safety
Analytics Commentary Exclusive
stock investing and data analytics
How Data Analytics Supports Smarter Stock Trading Strategies
Analytics Exclusive
qr codes for data-driven marketing
Role of QR Codes in Data-Driven Marketing
Big Data Exclusive
microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

SAP Users Crowd the Teradata Booth

3 Min Read

Twitter Roundup of Last Week’s TDWI Conference

4 Min Read

Report from Affecto Corporate IQ Oslo

5 Min Read

August 18 CFO.com Webcast on Performance Management Implementation Barriers

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?