Schedule

Earn CEU credits

As approved by the CompTIA program, attendees can earn continuing education credit(s) by attending the following sessions:

Breakout Session 1.1 | Exploiting Big Data to Enhance Cybersecurity, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.1 | The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology, 1 credit: Net+
Breakout Session 1.2 | Beyond Incident Response: Creating Your Own Cyber Intelligence Capability, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.2 | Cloud as a Transformation Engine, 1 credit: A+, Net+
Breakout Session 1.3 | Finding the Signal: The State of the Crowded Security Tools Marketplace, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.3 | Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge, 1 credit: Net+
Breakout Session 1.4 | Start at the Beginning: Developing a Cyber Strategy and Governance Model, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.4 | Leveraging Machine Intelligence and Autonomous Systems to Deliver Results, 1 credit: Net+

October 4, 2016

Opening Keynote  |  The Future of Business in the IoT
08:00  -  08:30
Opening Keynote  |  The Future of Business in the IoT
r

Opening Keynote | The Future of Business in the IoT

Cognitio CEO Roger Hockenberry, former innovation officer for the Central Intelligence Agency and Chief Technology Officer for the CIA’s National Clandestine Service, will invite attendees to reconsider what they think they know about the role of compute in any organization. Once upon a time, a company’s business was in a vertical market, enabled by technology; […]

Click for more information on 'Opening Keynote | The Future of Business in the IoT'

Keynote 1 |  Driving Innovation to Enable Mission
08:30  -  09:15
Keynote 1 |  Driving Innovation to Enable Mission
Lt Gen William Bender, USAF

Keynote 1 | Driving Innovation to Enable Mission

Appointed Air Force CIO in 2014, Bender overseas more than 54,000 military and civilian personnel and a portfolio valued at more than $17 billion. Lt. Gen. Bender will discuss lessons learned on enterprise innovation and agility, along with how to mitigate the challenges associated with innovation in a large enterprise.

Click for more information on 'Keynote 1 | Driving Innovation to Enable Mission'

Keynote 2 | Beyond Technology: Cybersecurity as an Enterprise Risk
09:15  -  10:00
Keynote 2 | Beyond Technology: Cybersecurity as an Enterprise Risk
Bob Gourley
Kiersten Todt

Keynote 2 | Beyond Technology: Cybersecurity as an Enterprise Risk

Cognitio founding partner Bob Gourley, former CTO of the Defense Intelligence Agency, and Kiersten Todt, Executive Director of the President’s Commission on Enhancing National Cybersecurity, will discuss short- and long-term strategies and challenges of building and growing the nation’s cybersecurity plan. Todt also will provide attendees with a glimpse into the Commission’s forthcoming report to […]

Click for more information on 'Keynote 2 | Beyond Technology: Cybersecurity as an Enterprise Risk'

Breakout Session 1.1  |  Exploiting Big Data  to Enhance Cybersecurity
10:30  -  11:30
Breakout Session 1.1  |  Exploiting Big Data  to Enhance Cybersecurity
Henry Sowell
Les Smith
Susan Lawrence

Breakout Session 1.1 | Exploiting Big Data to Enhance Cybersecurity

Big data and advanced analytic capabilities—including artificial intelligence, machine learning, and semantic indexing—can surface hidden trends, accelerating the identification of cyber threats and empowering cybersecurity professionals to react to these risk indicators in near real-time. The profusion of data, driven by its increasing use as a currency and the rapid growth of the Internet of […]

Click for more information on 'Breakout Session 1.1 | Exploiting Big Data to Enhance Cybersecurity'

Breakout Session 2.1  |  The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology
10:30  -  11:30
Breakout Session 2.1  |  The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology
Jane Melia
Kenneth Bible
Mark Gaydos
Paul A. Graver

Breakout Session 2.1 | The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology

Stagnation and entropy are competing forces in the drive to innovate. Enterprises can neither afford to sit idly hoping for the best, nor to move forward haphazardly deploying the newest technology whose salesperson happens to walk through their doors. How can organizations better surface unmet business and mission requirements, identify solutions to address those needs, […]

Click for more information on 'Breakout Session 2.1 | The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology'

Breakout Session 1.2  |  Beyond Incident Response: Creating Your Own Cyber Intelligence Capability
11:45  -  12:45
Breakout Session 1.2  |  Beyond Incident Response: Creating Your Own Cyber Intelligence Capability
Aaron Staryak
David Horvath
Marcus Sachs
Ron Carback
Dr Scott J White

Breakout Session 1.2 | Beyond Incident Response: Creating Your Own Cyber Intelligence Capability

Just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. That said, there are a wide variety of ways organizations can go about creating a cyber intelligence program. In this session, we’ll discuss how to tailor […]

Click for more information on 'Breakout Session 1.2 | Beyond Incident Response: Creating Your Own Cyber Intelligence Capability'

Breakout Session 2.2  |  Cloud as a Transformation Engine
11:45  -  12:45
Breakout Session 2.2  |  Cloud as a Transformation Engine
Adam Gerhart
David Bray
Jack Wilmer
Shawna Wimpy
Todd Schwartzrock

Breakout Session 2.2 | Cloud as a Transformation Engine

The time between identifying a need, defining requirements, and fielding a technology-based solution used to be measured in months or years. By changing the nature of how compute, storage and memory are consumed by every enterprise, cloud computing has made it possible to compress this cycle to days, weeks or months. Utilizing cloud computing as […]

Click for more information on 'Breakout Session 2.2 | Cloud as a Transformation Engine'

Lunch Session: Protecting Against Cyberthreats with Actionable Intelligence to Drive Informed Decisions
12:45  -  1:45
Lunch Session: Protecting Against Cyberthreats with Actionable Intelligence to Drive Informed Decisions
Josh Ray

Lunch Session: Protecting Against Cyberthreats with Actionable Intelligence to Drive Informed Decisions

Each year, enterprises around the globe dedicate increasing levels of time, budget and labor to identifying, preventing and mitigating online threats. The cat-and-mouse game of cyber security means that new trends emerge almost daily, requiring at-risk organizations in all industries to stay ahead of these new and evolving risks to revenue and reputation.

Click for more information on 'Lunch Session: Protecting Against Cyberthreats with Actionable Intelligence to Drive Informed Decisions'

Breakout Session 1.3  |  Finding the Signal: The State of the Crowded Security Tools Marketplace
1:45  -  2:45
Breakout Session 1.3  |  Finding the Signal: The State of the Crowded Security Tools Marketplace
Dan Cybulski
Dennis Gilbert
Eric McAlpine
Matt Little

Breakout Session 1.3 | Finding the Signal: The State of the Crowded Security Tools Marketplace

How can a cybersecurity leader identify best-in-class tools in today’s supersaturated cyber marketplace? The challenge was on full display at this year’s RSA conference where more than 500 exhibitors posed an insurmountable challenge to even the most experienced and capable CISOs trying to navigate the expo floor to identify ways to enhance their organizations’ risk […]

Click for more information on 'Breakout Session 1.3 | Finding the Signal: The State of the Crowded Security Tools Marketplace'

Breakout Session 2.3  |  Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge
1:45  -  2:45
Breakout Session 2.3  |  Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge
James Turgal
Melvin Greer
Michael Moll
Teresa Smetzer

Breakout Session 2.3 | Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge

Corporate data stores have grown in size, technological complexity and content diversity. It is obvious that a strategy to manage and access all of this data is necessary. And yet, many organizations still struggle with how to create a comprehensive strategy. In this session, we’ll explore why a data strategy is needed, as well as […]

Click for more information on 'Breakout Session 2.3 | Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge'

PKWARE and QLabs Demo
2:45  -  3:45
PKWARE and QLabs Demo

PKWARE and QLabs Demo

Check out their latest emerging technologies in Meeting Room 16.

Click for more information on 'PKWARE and QLabs Demo'

Breakout Session 2.4  |  Leveraging Machine Intelligence and Autonomous Systems to Deliver Results
3:15  -  4:15
Breakout Session 2.4  |  Leveraging Machine Intelligence and Autonomous Systems to Deliver Results
bf
Devanand Shenoy
Paul Brubaker
Thomas Reed

Breakout Session 2.4 | Leveraging Machine Intelligence and Autonomous Systems to Deliver Results

Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into home and business and especially with the growing importance of self-driving cars, robots, smartphones, and other technologies. The expanding uses of AI are considered by some to be threatening human jobs across multiple industries; […]

Click for more information on 'Breakout Session 2.4 | Leveraging Machine Intelligence and Autonomous Systems to Deliver Results'

Breakout Session 1.4  |  Start at the Beginning: Developing a Cyber Governance Strategy
3:15  -  4:15
Breakout Session 1.4  |  Start at the Beginning: Developing a Cyber Governance Strategy
Chris Ward
Jeremy King
Larry Larsen
Ted Girard

Breakout Session 1.4 | Start at the Beginning: Developing a Cyber Governance Strategy

Whether in industry or government, the art of governance is concerned with ensuring business objectives are accomplished. In a cybersecurity context, governance means putting all the right mechanisms in place to ensure no cyber threat will impede organizational objectives. Risks will be mitigated, data protected yet available to authorized users, and the functionality of IT […]

Click for more information on 'Breakout Session 1.4 | Start at the Beginning: Developing a Cyber Governance Strategy'

Afternoon Keynote  |  Big Data, Disruption and the 800-Pound Gorilla in the Corner
4:30  -  5:15
Afternoon Keynote  |  Big Data, Disruption and the 800-Pound Gorilla in the Corner
Francis Rose
Michael Stonebraker

Afternoon Keynote | Big Data, Disruption and the 800-Pound Gorilla in the Corner

Francis Rose, host of ABC7 & News Channel 8’s Government Matters, will interview Michael Stonebraker, co-founder and CTO of Tamr, and recipient of the 2014 Association for Computing Machinery A.M. Turing Award, to discuss how agencies can better manage and leverage data. In a career that has spanned more than 40 years, Stonebraker has established […]

Click for more information on 'Afternoon Keynote | Big Data, Disruption and the 800-Pound Gorilla in the Corner'

Closing Remarks  |  Lessons Learned for Synergy 2016
5:15  -  5:30
Closing Remarks  |  Lessons Learned for Synergy 2016
r

Closing Remarks | Lessons Learned for Synergy 2016

Cognitio’s CEO, Roger Hockenberry, will sum up the lessons learned from The Synergy Forum 2016, and will officially kick off the reception to follow.

Click for more information on 'Closing Remarks | Lessons Learned for Synergy 2016'