As approved by the CompTIA program, attendees can earn continuing education credit(s) by attending the following sessions:
Breakout Session 1.1 | Exploiting Big Data to Enhance Cybersecurity, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.1 | The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology, 1 credit: Net+
Breakout Session 1.2 | Beyond Incident Response: Creating Your Own Cyber Intelligence Capability, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.2 | Cloud as a Transformation Engine, 1 credit: A+, Net+
Breakout Session 1.3 | Finding the Signal: The State of the Crowded Security Tools Marketplace, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.3 | Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge, 1 credit: Net+
Breakout Session 1.4 | Start at the Beginning: Developing a Cyber Strategy and Governance Model, 1 credit: A+, Net+, Security+, CASP
Breakout Session 2.4 | Leveraging Machine Intelligence and Autonomous Systems to Deliver Results, 1 credit: Net+
Cognitio CEO Roger Hockenberry, former innovation officer for the Central Intelligence Agency and Chief Technology Officer for the CIA’s National Clandestine Service, will invite attendees to reconsider what they think they know about the role of compute in any organization. Once upon a time, a company’s business was in a vertical market, enabled by technology; […]
Click for more information on 'Opening Keynote | The Future of Business in the IoT'Appointed Air Force CIO in 2014, Bender overseas more than 54,000 military and civilian personnel and a portfolio valued at more than $17 billion. Lt. Gen. Bender will discuss lessons learned on enterprise innovation and agility, along with how to mitigate the challenges associated with innovation in a large enterprise.
Click for more information on 'Keynote 1 | Driving Innovation to Enable Mission'Cognitio founding partner Bob Gourley, former CTO of the Defense Intelligence Agency, and Kiersten Todt, Executive Director of the President’s Commission on Enhancing National Cybersecurity, will discuss short- and long-term strategies and challenges of building and growing the nation’s cybersecurity plan. Todt also will provide attendees with a glimpse into the Commission’s forthcoming report to […]
Click for more information on 'Keynote 2 | Beyond Technology: Cybersecurity as an Enterprise Risk'Big data and advanced analytic capabilities—including artificial intelligence, machine learning, and semantic indexing—can surface hidden trends, accelerating the identification of cyber threats and empowering cybersecurity professionals to react to these risk indicators in near real-time. The profusion of data, driven by its increasing use as a currency and the rapid growth of the Internet of […]
Click for more information on 'Breakout Session 1.1 | Exploiting Big Data to Enhance Cybersecurity'Stagnation and entropy are competing forces in the drive to innovate. Enterprises can neither afford to sit idly hoping for the best, nor to move forward haphazardly deploying the newest technology whose salesperson happens to walk through their doors. How can organizations better surface unmet business and mission requirements, identify solutions to address those needs, […]
Click for more information on 'Breakout Session 2.1 | The Innovation Imperative: Identifying, Assessing, and Deploying Novel Technology'Just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. That said, there are a wide variety of ways organizations can go about creating a cyber intelligence program. In this session, we’ll discuss how to tailor […]
Click for more information on 'Breakout Session 1.2 | Beyond Incident Response: Creating Your Own Cyber Intelligence Capability'The time between identifying a need, defining requirements, and fielding a technology-based solution used to be measured in months or years. By changing the nature of how compute, storage and memory are consumed by every enterprise, cloud computing has made it possible to compress this cycle to days, weeks or months. Utilizing cloud computing as […]
Click for more information on 'Breakout Session 2.2 | Cloud as a Transformation Engine'Each year, enterprises around the globe dedicate increasing levels of time, budget and labor to identifying, preventing and mitigating online threats. The cat-and-mouse game of cyber security means that new trends emerge almost daily, requiring at-risk organizations in all industries to stay ahead of these new and evolving risks to revenue and reputation.
Click for more information on 'Lunch Session: Protecting Against Cyberthreats with Actionable Intelligence to Drive Informed Decisions'How can a cybersecurity leader identify best-in-class tools in today’s supersaturated cyber marketplace? The challenge was on full display at this year’s RSA conference where more than 500 exhibitors posed an insurmountable challenge to even the most experienced and capable CISOs trying to navigate the expo floor to identify ways to enhance their organizations’ risk […]
Click for more information on 'Breakout Session 1.3 | Finding the Signal: The State of the Crowded Security Tools Marketplace'Corporate data stores have grown in size, technological complexity and content diversity. It is obvious that a strategy to manage and access all of this data is necessary. And yet, many organizations still struggle with how to create a comprehensive strategy. In this session, we’ll explore why a data strategy is needed, as well as […]
Click for more information on 'Breakout Session 2.3 | Developing a Data Strategy: Using Innovative Technology to Turn Data into Knowledge'Check out their latest emerging technologies in Meeting Room 16.
Click for more information on 'PKWARE and QLabs Demo'Whether in industry or government, the art of governance is concerned with ensuring business objectives are accomplished. In a cybersecurity context, governance means putting all the right mechanisms in place to ensure no cyber threat will impede organizational objectives. Risks will be mitigated, data protected yet available to authorized users, and the functionality of IT […]
Click for more information on 'Breakout Session 1.4 | Start at the Beginning: Developing a Cyber Governance Strategy'Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into home and business and especially with the growing importance of self-driving cars, robots, smartphones, and other technologies. The expanding uses of AI are considered by some to be threatening human jobs across multiple industries; […]
Click for more information on 'Breakout Session 2.4 | Leveraging Machine Intelligence and Autonomous Systems to Deliver Results'Francis Rose, host of ABC7 & News Channel 8’s Government Matters, will interview Michael Stonebraker, co-founder and CTO of Tamr, and recipient of the 2014 Association for Computing Machinery A.M. Turing Award, to discuss how agencies can better manage and leverage data. In a career that has spanned more than 40 years, Stonebraker has established […]
Click for more information on 'Afternoon Keynote | Big Data, Disruption and the 800-Pound Gorilla in the Corner'Cognitio’s CEO, Roger Hockenberry, will sum up the lessons learned from The Synergy Forum 2016, and will officially kick off the reception to follow.
Click for more information on 'Closing Remarks | Lessons Learned for Synergy 2016'