Conference
Atlanta Cybersecurity Conference
The Atlanta Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Date
Thu. Mar 05
Event Schedule
-
Why Does Asset Management Matter for Cybersecurity? 9:00 am
Presented by Axonius
Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.
Speaker:
- Lightweight Deception, Heavyweight Results 9:30 am
- Break
-
Real Talk on Ransomware 10:30 am
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Speaker:
-
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated 11:00 am
Presented by Avanan
Migration to cloud email requires a strategic shift in security. Given that Office 365 inboxes and user credentials are top targets for hackers, it’s no surprise that 90% of breaches start with email. The resulting security incident orchestration and response workload drain resources from the SOC team.
Sr Solutions Engineer, Jeff Raymond will share insights from research and demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks. He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to secure inboxes from threats like phishing, account takeover, and business email compromise.
Speaker:
- Break
-
The CSI Model of Digital Forensics 12:00 pm
Presented by United States Secret Service
With the speed of business, the width of company exposure, and the number of growing attackers; learning and utilizing the CSI Model of Digital Forensics can assist in the mitigation of security events and the protection of company assets.
Speaker:
- Break
-
Threat Hunting and Modern Security: 3 Fundamental Flaws 1:15 pm
Presented by CriticalStart
When considering how to move forward with the development or operations of a monitoring function, what risks must be addressed and which ones are inherently unavoidable? There are three fundamental flaws with threat hunting and trying to find “the bad” that many organizations may not be addressing.
Speaker:
-
Cyber Security Report 2020 1:45 pm
Presented by Check Point Software Technologies
Join us to take a look at the new trends in Cyber Warfare for 2020. We will take a look at the top threats facing businesses and government organizations, such as Magecart and Supply Chain attacks. We will discuss why the traditional approach is not enough to respond to these new threats.
Speaker:
- Break
-
The Paradox of Securing Workloads 2:30 pm
Presented by Morphisec
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Speaker:
-
Risk Exchanges: The Key to Vendor Risk Management 3:00 pm
Presented by OneTrust Vendorpedia
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
Key Takeaways:
Understand third-party risk management trends and challenges
Gain actionable insights on how to monitor third-party risks and performance
Learn the benefits of a third-party risk exchange
See how you can protect against third-party threats such as data breaches, etc
Speaker:
- Networking / Happy Hour