Welcome!

Artificial Intelligence Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan, Zakia Bouachraoui

Blog Feed Post

Please join us at the 2012 FedCyber Summit: Amazing presentations and interactive cross-agency/sector panels

By

We look forward to seeing you at the 2012 FedCyber Summit on 15 Nov 2012. An amazing group of cyber security professionals from all three branches of the federal government have signed up to attend. They are being joined by other world-class-best cyber security professionals from industry and academia, including some of the greatest at incident response and cyber forensics.

The morning keynote features DoD’s lead for all cybersecurity policy, Eric Rosenbach, Deputy Assistant Secretary of Defense for Cyber Policy.  Following a full day of interactive sessions designed to examine best practices and emerging concepts, we will have a closing keynote by one of the most highly respected practitioners in our field, General Harry Raduege (USAF ret).  General Raduege will provide insights on the state of cybersecurity globally  and will also give us his views on the FedCyber summit, highlighting his key takeaways from the event.

Technology will also be examined during the day, with panels on emerging tech and a series of ignite-style presentations from firms like Safenet, HP, Fireeye, Certes Networks, Cyber-Ark and an exciting update on the new open source project by Cloudera called Impala.  This Impala session may be the first chance many of us have to see this new capability.

The event will also feature a presentation by Jason Healey of thee Atlantic Council on the history of cyber conflict. This is the result of a formal study extracting lessons learned from our collective history. Conclusions will be action-oriented and inform your security decisions today.

This day-long FedCyber event is designed to help us all examine our defensive concepts and should help make a positive difference in our collective approach to emerging and dynamic threats. Please register now at: http://events.carahsoft.com/event-detail/1697/fedcyber/

Full agenda is below:

FedCyber.com Cyber Security Summit
Confronting the Next Generation of Cyber Security Challenges and Opportunities

Date: Thursday, November 15, 2012
Time: 7:30am – 4:30pm
Location: Atrium Ballroom
Ronald Reagan Building
1300 Pennsylvania Ave. NW
Washington, DC 20004

Announcing our closing keynote: General Harry Raduege, USAF (ret)

General Harry Raduege led DoD activities from enterprise IT support to operational military missions in numerous positions, including serving as the Director of the Defense Information Systems Agency and the Commander of the Joint Task Force for Global Network Operations. His activities in global cyber defense and coordination keep him in almost constant contact with not only U.S. and foreign leaders, but also technologists as he continues to work on these issues of national significance. His closing remarks will provide us with an instantaneous review of the entire FedCyber summit, including key take aways and suggestions for continued FedCyber community action.

Morning Keynote: Eric Rosenbach, Deputy Assistant Secretary of Defense, Cyber Policy

Join us for the Second Annual FedCyber.com Cyber Security Summit, a venue for our nation’s most seasoned cyber security practitioners to come together to discuss issues of common concern. Matt DevostPresident and CEO at FusionX, and Bob GourleyEditor at CTOvision.com, will moderate panels along with top security experts;Bill CheswickBob Flores, formerly CIA; Jason Healey, Atlantic Council; Roger Hockenberry, CIA; Nick LantuhCyber PractitionerTom Parker, FusionX; Retired Lt. Gen. Harry Raduege, USAF; Gal Shpantzer, Energy Sector Security Consortium; Richard StiennonIndustry Analyst;Bob StrattonInternet Security Pioneer and Technology EntrepreneurMichael Tanji, Kyrus-Tech; and Joshua Work, Symantec.

Government and industry speakers will discuss how policy-makers can accurately characterize cyber adversaries and learn to appreciate the nature of the threat through fact-based assessments and threat briefings; the state of cross-organizational information sharing; and the impact of emerging technologies on the state of cyber security, including Big Data, Cloud Computing, mobility, wireless communications, and embedded computing. Afterwards, seven firms with promising technology selected by FedCyber subscribers will be asked to deliver fast-paced ignite-style presentations on their capabilities in the Ignite-Style Tech Review.

Space is limited, so register now to attend.

Working Agenda

07:30am – 08:00am Registration and Breakfast
08:00am – 08:10am Welcome
08:10am – 09:00am Morning Keynote: Addressing Cyber Workforce Challenges for a New Domain of Conflict
09:00am – 10:30am Threat Intelligence and Adversary Characterization: Driving Action Through Fact-Based Assessments
10:30am – 11:00am Networking Break and Exhibits
11:00am – 11:45am Cyber Workforce Challenges: Recruiting and Retaining the Best
11:45am – 12:30pm Lunch
12:30pm – 02:00pm Emerging Technologies and Their Impact on Cyber Security
02:00pm – 02:15pm Networking Break
02:15pm – 03:15pm Ignite-Style Tech Review: 7-Minute Speed Presentation on High Interest Technologies and Concepts
03:15pm – 04:00pm Lessons Learned From the History of Cyber Conflict
04:00pm – 04:30pm Closing Keynote and Takeaways

Registration is from 7:30am to 8:00am. Discussion will start promptly at 8:00am. We look forward to seeing you there!

Please register now at: http://events.carahsoft.com/event-detail/1697/fedcyber/

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...