Join us in Washington DC, 2020

REGISTER TODAY

Agenda

To see what each day has to offer, please select the date and read through the agenda.

Find out what social event you can participate in when at the Summit.

time session location topic speaker
5:00 – 6:00 p.m. Registration
5:00 – 6:00 p.m. Welcome Reception
time session location topic speaker
7:30 – 9:00 a.m. Registration
8:00 – 9:00 a.m. Breakfast
8:00 a.m. – 4:30 p.m. Expo Open
8:00 – 9:00 a.m. Exhibitor/Client Relationship
9:00 – 9:30 a.m. Opening Cerimonies Lafitte Room A Blue Light
Bruce Parkman
CEO
IBM
Anthony Aurigemma
Senior Executive
9:30 – 10:15 a.m. i2® Roadmap Lafitte Room A IBM
Akiba Saeedi
10:15 – 10:45 a.m. Morning Networking Break
10:45 – 11:45 a.m. Session 1 – CPE Credit Track Orleans Room A IBM® i2® Analyst’s Notebook Basics
For those who are new to IBM® i2® Analyst’s Notebook or those who want to brush up on their skills. Learn to navigate Analyst’s Notebook, create entities, links, and manual charts.
Blue Light
Gary Whitehead
Director of Training
10:45 – 11:45 a.m. Session 1 Orleans Room B Exploitation of Open-Source Intelligence for Advanced Link Analysis
Learn to marry the functionality of i2® Analyst’s Notebook with OSINT analytics, advanced Googling and moving past “locked down” Social Media profiles. All tools used are publicly available and can be incorporated into investigations immediately.
Cigna
Donna Jallits
Informatics Senior Specialist
Shawn Lipsey
Informatics Senior Specialist
10:45 – 11:45 a.m. Session 1 D.H. Holmes Room C Real-Time Crime Centers – Investigative Technology
Investigative Technology An organized approach to using investigative technology to solve criminal investigations.
JCour-Consulting LLC
Joseph Courtesis
Retired commander NYPD
Real Time Crime Center
11:45 a.m. – 1:00 p.m. Lunch
1:00 – 1:45 p.m. Session 2 – CPE Credit Track Orleans Room A Follow The Money – Importing Fundamentals in IBM® i2® Analyst’s Notebook Using Financial Data
Master import procedures and how to achieve predictable results.  Understand how to import and merge data from multiple databases and manage the matching and merging of entities.
Blue Light
Jennifer Godbold
Senior Trainer
1:00 – 1:45 p.m. Session 2 Orleans Room B EIA in Deployed/Tactical Environments
A Case study of how EIA has been enhanced and configured in support of a large scale military deployment.
IBM
Dave Waxman
Executive Architect
1:00 – 1:45 p.m. Session 2 D.H. Holmes Room C Shorten Time to Target – Investigation as a Service
The world, and technology are evolving as are the threats and the ways we approach them. Traditional funding, procurement, and integration cycles inhibit our ability to address short tail attacks. How can we quickly obtain valuable intelligence?
IBM
Jeff Mausolf
Executive Architect IPU
1:45 – 2:15 p.m. Networking Break
2:15 – 3:00 p.m. Exhibitor Area
3:15 – 4:00 p.m. Session 3 – CPE Credit Track Orleans Room A Actionable Intelligence: Accurint Virtual Crime Center (AVCC) and IBM® i2® Analyst’s Notebook
LexisNexis® AVCC and IBM® i2® Analyst’s Notebook solution team up to provide automated link analysis and investigative data within seconds. It’s easier than ever before to export data directly from AVCC into i2® Analyst’s Notebook.
LexisNexis
Ryan Hughes
Sr. Data Crime Analyst
Blue Light
Jennifer Godbold
Senior Trainer
3:15 – 4:00 p.m. Session 3 Orleans Room B i2® Used for Combating Insurance Fraud
See how IBM® i2® software is used by fraud teams in the Insurance sector to identify fraudulent activity. Smart use of analytical tools such as IBM® i2® Analyst’s Notebook can be used to collaborate with other insurers and agencies, such as the Police, to build evidence and lead to prosecution saving insurers millions of dollars a year.
VA Worldwide
Dave Ashton
Australia/New Zealand Regional Manager
3:15 – 4:00 p.m. Session 3 D.H. Holmes Room C OSINT Plugin For IBM i2 Analyst’s Notebook
See a demo of OSINT Plugin for IBM i2 Analyst’s Notebook. MKCVI OSINT Plugin is a product developed to extract information from several Open Source Networks into a structured format that can be easily analyzed.
MKCVI
Maria Leite
Director
4:15 – 5:00 p.m. Session 4 – CPE Credit Track Orleans Room A Blue Fusion for IBM® i2® Analyst’s Notebook
Learn to use Blue Fusion plug-in to search, display, and analyze data in IBM® i2® Analyst’s Notebook.
Blue Light
Marcos Cejudo
Senior Software Developer
Joel Damin
Senior Trainer
4:15 – 5:00 p.m. Session 4 Orleans Room B Using IBM i2 to Help Find a Fraudster
Discover a case study about detection and investigation of internal fraud using IBM i2 Analyst’s Notebook in the banking sector. Discuss what could be done next and more effectively with other IBM i2 tools.
NRD Cyber Security
Ruta Jasinskiene
Intelligence Analyst
4:15 – 5:00 p.m. Session 4 D.H. Holmes Room C Organization of i2 Charts Cigna
Donna Jallits
Informatics Senior Specialist
5:00 – 7:00 p.m. Networking Reception – Riverboat Cruise more info to follow
time session location topic speaker
7:30 – 9:00 a.m. Registration
7:30 – 8:30 a.m. Breakfast
8:30 a.m. – 4:30 p.m. Expo Open
8:30 – 8:45 a.m. Welcome Remarks
8:45 – 9:30 a.m. Keynote Speaker 2 RESERVED Eric Petrevich
9:30 – 9:45 a.m. Transition
9:35 – 10:15 a.m. Keynote Speaker 3 Casino Intelligence Analysis with IBM® i2®
As a Casino Surveillance Analyst, Dan has been involved in uncovering multi-million dollar scams during an 18yr career. Now a member of VA Worldwide team, he works with Casinos to help them use i2 products to find the scams hiding in their data.
VA Worldwide
Dan Harris
10:15 – 10:45 a.m. Morning Networking Break
10:45 – 11:45 a.m. Session 5 – CPE Credit Track Orleans Room A IBM® i2® iBase Functionality
Understand query functions, creating and analyzing sets and scored matching of iBase data, importing data to populate the databases, and exporting database records.
Blue Light
Gary Whitehead
Director of Training
10:45 – 11:45 a.m. Session 5 Orleans Room B Why Private Sector Enterprises are Adopting Threat Hunting
Are you concerned with insider threat, abuse, fraud, cyber attacks & corruption? In this session, see how i2® Enterprise Intelligence can counter sophisticated threats and attacks on your enterprise.
IBM
Mike Kehoe
Sales Leader
10:45 – 11:45 a.m. Session 5 D.H. Holmes Room C Analyst’s Notebook on Steroids
IMT Intel:ID is an appliance based on IBM Identity Insight (II – The Recommendation Engine in EIA). We’ll explain the capabilities, and demonstrate differences of what you will experience using II to collect and collate your Entity data.
Informagnetics Technologies Inc
Peter Huber
Practice Lead – Justice, Threat & Fraud
11:45 a.m. – 1:00 p.m. Lunch
1:00 – 1:45 p.m. Session 6 – CPE Credit Track Orleans Room A Analyzing Telephone Data in IBM® i2® Analyst’s Notebook
Learn the importance of key information when importing phone data, discuss what you want the import to look like, use basic analytical tools, and send to a map for geospatial analysis.
Blue Light
Joel Damin
Senior Trainer
1:00 – 1:45 p.m. Session 6 Orleans Room B The Safe Campus – Preventing School Violence
In today’s society, we have become all too aware of the devastating effects school violence has brought onto our children, campuses, and communities as a whole. What is not well known, however, is there are proven means to identify problematic individuals and timely acts to prevent these shocking events. Join Bruce Parkman as he illustrates how the application of predictive analytics has proven to be an innovative measure to identify, address, and prevent these violent threats before escalation.
Blue Light
Bruce Parkman
CEO
1:00 – 1:45 p.m. Session 6 D.H. Holmes Room C How Mobile Devices Affect Your Investigations
The number of mobile devices being used in connection with criminal activity is skyrocketing. From cell phones to drones and beyond – learn what information you can extract from a mobile device, and how you can leverage that information effectively.
MSAB
Will Hernandez
Technical Sales Engineer
1:45 – 2:15 p.m. Networking Break
2:15 – 3:00 p.m. Exhibitor Area
3:15 – 4:00 p.m. Session 7 – CPE Credit Track Orleans Room A Analytical Tools in IBM® i2® Analyst’s Notebook
Learn and apply specific analytical techniques and tools. Explore visual searching, bar charts, histograms, and text search. Analyze paths, linked items, and grasp cluster capabilities.
Blue Light
Jennifer Godbold
Senior Trainer
3:15 – 4:00 p.m. Session 7 Orleans Room B TBD Wildfire
Tim Pedos
3:15 – 4:00 p.m. Session 7 D.H. Holmes Room C Cyber Threat Hunting with IBM® i2®
Learn from battle-tested cyber threat hunters how to use i2® to ingest disparate data sources to conduct reactive SOC-based cyber incident investigations that lead to more proactive cyber threat hunting.
IBM
Sidney Pearl
Global i2 Cyber Leader
4:15 – 5:00 p.m. Session 8 – CPE Credit Track Orleans Room A TBD Blue Light
4:15 – 5:00 p.m. Session 8 Orleans Room B TBD Rosoka
4:15 – 5:00 p.m. Session 8 D.H. Holmes Room C TBD Banorte
5:00 – 6:00 p.m. Exhibitor Breakdown

Speakers

Blue Light and IBM have invited thought leaders, trendsetters, and subject matter experts on a variety of issues. They will speak on IBM i2 use cases, applications as well as intelligence analysis, and cybersecurity environments.

Keynote Speakers

Breakout Speakers

TBD

JOEL DAMIN

Joel will speak about IBM® i2® Analyst’s Notebook specific uses May, 8 & 9.

READ JOEL’S BIO.

MARCOS CEJUDO

Join Marcos in his session about “Blue Fusion for IBM® i2® Analyst’s Notebook” May, 8.

READ MARCOS’ BIO.

JENNIFER GODBOLD

Join Jennifer in her sessions showcasing  IBM® i2® Analyst’s Notebook applications on May, 8.

READ JENNIFER’S BIO.

BRUCE PARKMAN

Bruce will share “The Safe Campus”, a solution to school violence on  May, 9.

READ BRUCE’S BIO.

GARY WHITEHEAD

Gary will cover IBM® i2® Analyst’s Notebook basics and functionalities on May, 8 & 9.

READ GARY’S BIO.

Blue Light LLC 2139 Valleygate Drive, Suite 201, Fayetteville, NC 28304 919-436-4170

Web Analytics