Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2021?

Conference
Atlanta
Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Atlanta Cybersecurity Conference with thought leaders and luminaries face-to-face and gather insights on the latest trends and threats in cybersecurity. These conferences gather IT professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities.
Whether you’re looking to grow your understanding about cloud security, working on improving your org’s DevSecOps, or just looking to learn more about the current threat environment, this conference will give you the knowledge you need to ensure your team’s success.
Take a look at all Data Connectors has to offer here!
Date
Wed. Oct 27 — Thu. Oct 28
Location
Atlanta Marriott Buckhead Hotel & Conference Center
3405 Lenox Road NE
Atlanta, Georgia 30326
1 404-261-9250
-
Featured Speakers
Dean Mallis
CISO RoundTable
Jameeka Green AaronCISO RoundTable
Michael F. D. AnayaCISO RoundTable
Tamika BassCISO RoundTable
Taiye LamboCISO RoundTable
Klint WalkerCISO RoundTable
Nathan LangmackKeynote: Atlanta FBI Looks Back on 2021 Cyber Threats
Derek JohnsonKeynote: Waking up Boards and Executive Leadership
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Conference will be open from 8AM to 6PM.
- DAY ONE
- Welcome / Introductions
-
Malware Threats Q3: An Analysis of 113M Files & the Evasive, Unknown Malware Inside 12:20 pm
From August to September, Votiro’s research team has been aggregating and analyzing proprietary data on the threats that made it through detection-based security solutions like email gateways, AV, and sandboxing. Join Henry Frith, VP of Customer Success, as he overviews the statistics from 113M files analyzed and explains the stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions:
- See the latest trends in malware delivery via files
- Learn common techniques that hackers use to evade detection-based security tools
- View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year
Panel Participants:
-
Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 12:50 pm
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Panel Participants:
-
The State of Secure Identity 1:15 pm
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Panel Participants:
- Expert Panel Discussion: Defense in Depth: New Strategies for 2021 2:00 pm
-
The ROI of Zero Trust and the Move to Distributed Enterprise 2:40 pm
The move towards zero-trust architectures and cloud applications has left many organizations to question the value of migration. While there are important technical considerations around zero-trust and SASE/SSE solutions, this presentation looks at the positive return-on-investment in their implementation
Panel Participants:
-
Securing the Modern API Ecosystem 3:05 pm
APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:
- API discovery and inventory management
- continuous vulnerability identification and testing
- runtime prevention and detection
Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.
Panel Participants:
-
Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 3:45 pm
DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected (escapes or false negatives)? Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.
Panel Participants:
-
CISO RoundTable 4:10 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Community Networking Reception
- DAY TWO
- Welcome / Introductions
-
What CISOs Get Wrong About Connected Device Product Security (And Why It Could Cost You) 9:30 am
With billions of connected devices powering up every year, crowded markets have created unique challenges and opportunities for device manufacturers. In this environment, competitive differentiation is key. As attackers move away from application layer attacks, connected devices are now the ultimate low-hanging fruit to offer unauthorized access to critical IT and OT networks.
Breaches in product security will have unprecedented impacts on device manufacturers and owners. According to Gartner, cyber-physical attacks resulting in fatal casualties will cost over $50B by 2023. Even the White House is taking note, with a new Cybersecurity EO that will add new requirements for secure software.
In this presentation by Finite State, we’ll take a close look at how product security breaches occur, and how the financial impact of these breaches have tangible permanent effects on industry competitors. Learn proactive approaches to product security that are being adopted by some of the world’s largest device manufacturers, as well as how to ensure that your product security strategies generate value for your customers and shareholders.
Panel Participants:
-
Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 9:55 am
The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss:
-How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment.
-Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.
Panel Participants:
-
Expert Panel Discussion: Managing Risk: Seek Forward Accountability and Assume a Stormy Sea 10:20 am
While managing risk has always been a part of the CISO office, most resources turn to stopping new ransomware threats, managing supply chain attacks and mitigating third-party vulnerabilities. And budgets reflect this tactical action-reaction approach. How can CISOs truly move to managing risk? And by extension, how can they clearly communicate risk, and measure the efficacy of mitigation activities?
In this panel, experts will debate how to facilitate the risk conversation with non-technical leaders, determine priorities, and counterbalance cybersecurity considerations against business requirements. This panel will address risk quantification, accounting, budgeting and resourcing, and building more resilience rather than taller walls.
Panel Participants:
-
Securing Remote Access & Data: Secular Risks With 3rd Parties 11:25 am
In 2021 the “workforce” consisted of third-parties, contractors, and remote employee in addition to “traditional in office” workers. All of these stakeholders require access to sensitive and critical resources and data. Employees and the devices they use, even if they are unmanaged, are treated with certain implicit trust despite whether the trust is justified or not. However, contractors and third parties cannot be managed in the same fashion. In fact, granting them access to the integral resources and data is accompanied by several risks.
During this presentation, we will discuss the secular risk associated with providing access to contractors and third parties. We will also address the best practices that could be applied to mitigate such risk.
Panel Participants:
-
Self-Learning AI: Redefining Enterprise Security 11:50 am
In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done
In this session, learn how self-learning AI:
-Detects, investigates and responds to threats – even while you are OOTO
-Protects your entire workforce and digital environment – wherever they are, whatever the data
-Defends against zero-days and other advanced attacks – without disrupting the organization
Panel Participants:
- Demo Sessions / Lunch Break
-
Keynote: Atlanta FBI Looks Back on 2021 Cyber Threats 12:45 pm
In a year that had more cybersecurity headlines than any before, Greater Atlanta remains a hotbed for cyber-enabled fraud, as reported by the FBI Internet Crime Complaint Center (IC3). In this keynote, Nathan Langmack will dissect the key components of some of the well-known ransomware attacks such as SolarWinds and Colonial Pipeline. He will use these and others to surface lessons learned that translate to what CISOs and all Information Security Executives should regard as best practices.
Special Agent Langmack will dig into the impact of these breaches; further, he will talk about the importance of building key law enforcement relationships ahead of time. He’ll outline response capabilities, prevention practices and how to go about developing the key relationships that every CISO should have across the region.
The talk will also outline the importance of collecting evidence for an investigation, what to say when calling the FBI or other agencies, and how to maintain the engagement with law enforcement. Finally, he will discuss continuous cooperative collaboration and learning methods with private sector partners, in which community members can become involved.
Panel Participants:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 1:35 pm
It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack?
If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.
Panel Participants:
-
The Art & Science of Cloud Security 2:25 pm
Come learn about the beauty of the cloud while applying the right “science” to securing your multiple cloud services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy work of art.
Panel Participants:
-
Remote Workforce: Authorization Intercept, Recording & Tracking 2:50 pm
Learn what benefits organizations gain from the latest security controls around remote access including session recording, authorization intercept on demand and modeling of remote user behavior. How ZTNA and SASE are making this possible without major investments in products, manpower, infrastructure or change and why the remote worker also enjoys faster access performance to their applications and services.
Panel Participants:
-
Keynote: Waking up Boards and Executive Leadership 3:15 pm
Waking up Boards and Executive Leadership Teams to the Reality of Cybersecurity.
Organizations today can no longer engage in digital transactions or ecommerce serving their employees, customers, or partners without understanding the global cybersecurity landscape or the state of their internal security program. Cybersecurity risks are growing at an alarming rate across all industries, profit and nonprofit. Boards and Executive Leadership Teams can no longer act as if they are not a target of bad actors or that their organization is not important enough for bad actors to target them.
Panel Participants:
- Conference Final Closing Session
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners