FedCyber.com Cybersecurity Summit on Wednesday, September 28

FedCyber.com‘s Cybersecurity Summit is almost here, and the entire CTOvision team will be there to engage with the community and capture key elements of the event. The purpose of this one-day conference is to advance the field of cybersecurity by bringing together key thought leaders from the community to work on an action-oriented agenda. Participants in this event are experienced cybersecurity practitioners who are seeking new approaches to collective action against emerging threats. The event will generate new models and approaches. Where applicable, the essence of those new approaches will be captured by our team for dissemination back to the community so we can all keep moving the ball forward.  CTOvision will be providing recaps and commentary on the panels, addresses, and themes of the conference.

The summit is co-chaired by Matt Devost, President & CEO of FusionX, LLC, advisor to the U.S. Department of Defense, Black Hat, adjunct professor of Information Warfare at Georgetown University, and Bob Gourley, former Director of Intelligence (J2) for the Joint Task Force- Computer Network Defense and current CTO at Crucial Point LLC.  Keynotes will be provided by  the Honorable James Miller, Deputy Undersecretary of Defense for Policy, Nitin Pradhan, CIO of Department of Transportation and Ms. Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology & Facilities. Thought leaders from throughout the cyber security community are engaging with the event on panels and as specially invited audience members.

The first panel will be Accurately Characterizing Cyber Adversaries, moderated by Tom Parker, the author of the CyberAdversary Characterization book and CTO of FusionX and will include Professor Rick Forno, Steven Chabinsky,  Deputy Assistant FBI Director, and Rich Pethia, Director of CERT at Carnegie Melon University. Next will be a panel on CTO Cyber Security Priorities and Technological Solutions moderated by Bob Flores, former CTO of the CIA and the current CEO of Applicology, featuring Bill Crowell, former Deputy Director of the NSA, Bob Bigman, the Chief Information Security Officer of the CIA, and Wayne Wheeles of Analytic Designs at Novii Design. There will then be a discussion on Cyber Security: Concepts for the Next Ten Years moderated by Matt Devost with Sherri Ramsay, Director of the NSA/CSS Threat Operations Center and the Department of Education’s Michele Iversen.

In the afternoon, another discussion, Attack-Defend: An Examination of the Modern Cyber Attack, Why It Happened and What Could Have Been Done About It will go provide enterprise defenders’ perspective on facing sophisticated, persistent attackers. The discussion will be led by John Asante, the Principle Architect of the NSG Cyber Security Team, Microsoft Consulting Services.  John will be joined by Sean Finnegan, senior security architect. Next is a panel on  One Wake-up Call Too Many: Models, Norms and US Policy on changing models, norms, and policy so that the US doesn’t have to be under attack to get leadership attention for cyber security. Bob Gourley will moderate panelists Richard Marshall, the DHS Cyber Security Director, cyber security practitioner Marc Sachs, the  former Director for Communication Infrastructure Protection in the White House Office of Cyberspace Security, and Bob Butler, former Deputy Assistant Secretary of Defense for Cyber and Space Policy. The last panel of the day will be Furthering the Ecosystem: Emerging Approaches and Solutions on sharing lessons learned and community-wide approaches to security, moderated by Matt Devost. The panel features Bobbie Stempfley, the highly regarded leader who established DoD’s most successful cybersecurity solutions who is now leading DHS operational and strategic cybersecurity activities,  and John Topp of Splunk.

In addition to blogging about the event, the CTOvision team will be live-tweeting as appropriate. Please follow us at:

http://twitter.com/bobgourley
http://twitter.com/mattdevost
http://twitter.com/fedcyber
http://twitter.com/simlaughter
http://twitter.com/crypt0s
http://twitter.com/chrisbarnesCP
http://twitter.com/Ryan_Kamauff
http://twitter.com/AlexOlesker
http://twitter.com/dbehr24 

Related articles

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

solid

Trackbacks

  1. [...] Cyber Security: Missions, Initiatives, Opportunities and RisksFedCyber.com Cybersecurity Summit on Wednesday, September 28PNNL Seeks Chief Cyber Security Research ScientistContinued Evolution of DoD Cyber PolicyThe most [...]

  2. [...] to the Rest of UsTechnology Firms at the DoDIIS WorldwideThe Insider Threat Worst-Case ScenarioFedCyber.com Cybersecurity Summit on Wednesday, September 28Splunk Is Going PublicCrucialPointLLCSplunk to Provide Integration with Apache [...]