Tuesday, September 10

Areas of Interest:D = DefenseL = Law EnforcementF = Fraud/Financial Crime

Time PeriodActivitySpeaker Information
General Session
9:15-9:45Keynote: Boston Marathon Bombings Investigations: Successful Collaborative TechnologyMajor Dermott Quinn, Massachusetts State Police
9:45-10:30Panel Discussion on Impact of Collaboration: Breaking Down the Barriers to Collaboration

Bill Crate, Director, Canadian Bankers Association,
Captain David Azuelo, Tucson Police Department,
Major Dermott Quinn, Massachusetts State Police

Bob Griffin : moderator
11:00-12:00     Session 6 Breakouts
D    L    F
Hands on Labs:
  • Bringing It Together - The IBM i2 Solution
  • Filtering IBM i2 COPLINK Result Sets : Getting to the Bad Guys
  • IBM i2 Analyst's Notebook for Beginners
  • Performing Multidimensional Analysis Using IBM i2's Fraud Intelligence Solution (FIA)
D    L    FThe Need for Technology and Data Sharing for Appropriate Counter Terrorism IntelligenceMarc Dubowitz: Exec Dir. Foundation for Defense of Democracies
1:00-1:50     Session 7 Breakouts
D    L    F
Hands on Labs:
  • Charting with IBM i2 iBase
  • Introduction to IBM i2 COPLINK and IBM i2 COPLINK Detect COPLINK Basic
  • Social Network Analysis
  • Using the Local Area Repository in IBM i2 Analyst’s Notebook Premium
FInvestigation of Internal Fraud & Abuse – Connecting the DotsTammy Hurst, SVP, Bank of America
D    L    FIdentifying Advanced Cyber Threat Actors using Analyst’s NotebookTerry Weatherstone, Cyber Intel Analyst, GE
D    L    Video Analytics and Facial RecognitionCommander Ken Gominsky
Santa Ana, CA Police Department
2:00-2:50     Session 8 Breakouts
D    L    F
Hands on Labs:
  • Analysis Attributes
  • iBase Structured Activity
  • IBM i2 COPLINK Detect Refined Searches : Cutting to the Chase
  • Introduction to Importing
D    L    FCyber IntelligenceGary Warner, Chief Technologist, Malcovery Security
FSupporting Anti Money Laundering Investigations with TechnologyAlfredo Federico Revilak De la Vega, Former Deputy General Director of the FIU (Financial Intelligence Unit) Mexico
LKnow Crime, No Boundaries: Sharing Information across the Street and across the NationCommander Scott Edson, Los Angeles County Sheriff's Department
3:00-3:50     Session 9 Breakouts
D    L    F
Hands on Labs:
  • Conditional Formatting
  • Financial Analysis
  • IBM i2 COPLINK Incident Analyzer
  • Using IBM i2 Analyst’s Notebook in Cyber Investigations
FDetecting Digital Impersonation and Rogue Digital IdentitiesEli Katz, VP Enterprise Strategies, 41st Parameter
FIBM Counter Fraud: The Future of Integrated Fraud IntelligenceScott Burroughs, IBM Counter Fraud Portfolio Strategy Manager
D    LGenerating a Return on Investment with IBM i2 SolutionsClayton Byford, Counter Threat Finance Analyst, HIDTA
4:00-7:00     Closing Remarks and Reception

Agenda subject to change until conference begins.