• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Conference will be open from 8AM to 6PM.

  • DAY ONE
  • Welcome / Introductions
  • Malware Threats Q3: An Analysis of 113M Files & the Evasive, Unknown Malware Inside 12:20 pm

    Presented by Votiro

    From August to September, Votiro’s research team has been aggregating and analyzing proprietary data on the threats that made it through detection-based security solutions like email gateways, AV, and sandboxing. Join Henry Frith, VP of Customer Success, as he overviews the statistics from 113M files analyzed and explains the stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions: 

    • See the latest trends in malware delivery via files 
    • Learn common techniques that hackers use to evade detection-based security tools 
    • View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year
    Click to Expand

    Panel Participants:

    Henry Frith
    Henry Frith

    Henry Frith

    VP of Customer Success at Votiro

    Collapse This Item

  • Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 12:50 pm

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Collapse This Item

  • The State of Secure Identity 1:15 pm

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth: New Strategies for 2021 2:00 pm

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2021?

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Ben Johnson
    Ben Johnson

    Ben Johnson

    Co-Founder & CTO at Obsidian Security

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Collapse This Item

  • The ROI of Zero Trust and the Move to Distributed Enterprise 2:40 pm

    Presented by Bitglass

    The move towards zero-trust architectures and cloud applications has left many organizations to question the value of migration. While there are important technical considerations around zero-trust and SASE/SSE solutions, this presentation looks at the positive return-on-investment in their implementation

    Click to Expand

    Panel Participants:

    Ed Lopez
    Ed Lopez

    Ed Lopez

    Sr. Solutions Architect at Bitglass

    Collapse This Item

  • Securing the Modern API Ecosystem 3:05 pm

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Edgar Ortiz
    Edgar Ortiz

    Edgar Ortiz

    Director of Solutions Architecture at Noname Security

    Collapse This Item

  • Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 3:45 pm

    Presented by Fluid Attacks

    DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected (escapes or false negatives)? Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

    Click to Expand

    Panel Participants:

    Daniel Salazar
    Daniel Salazar

    Daniel Salazar

    Lead DevSecOps Engineer at Fluid Attacks

    Collapse This Item

  • CISO RoundTable 4:10 pm

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Dean Mallis
    Dean Mallis

    Dean Mallis

    CISO at MARTA (Metropolitan Atlanta Rapid Transit Authority)

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Head of Attack Surface Analysis at Palo Alto Networks

    Tamika Bass
    Tamika Bass

    Tamika Bass

    Cybersecurity Technology Director at Gannett Fleming

    Taiye Lambo
    Taiye Lambo

    Taiye Lambo

    Founder at HISPI and Pioneer vCISO

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Collapse This Item

  • Community Networking Reception
  • DAY TWO
  • Welcome / Introductions
  • What CISOs Get Wrong About Connected Device Product Security (And Why It Could Cost You) 9:30 am

    Presented by Finite State

    With billions of connected devices powering up every year, crowded markets have created unique challenges and opportunities for device manufacturers. In this environment, competitive differentiation is key. As attackers move away from application layer attacks, connected devices are now the ultimate low-hanging fruit to offer unauthorized access to critical IT and OT networks. 

    Breaches in product security will have unprecedented impacts on device manufacturers and owners. According to Gartner, cyber-physical attacks resulting in fatal casualties will cost over $50B by 2023. Even the White House is taking note, with a new Cybersecurity EO that will add new requirements for secure software. 

    In this presentation by Finite State, we’ll take a close look at how product security breaches occur, and how the financial impact of these breaches have tangible permanent effects on industry competitors. Learn proactive approaches to product security that are being adopted by some of the world’s largest device manufacturers, as well as how to ensure that your product security strategies generate value for your customers and shareholders.

    Click to Expand

    Panel Participants:

    Jonathan Goldheim
    Jonathan Goldheim

    Jonathan Goldheim

    Regional Director at Finite State

    Collapse This Item

  • Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 9:55 am

    Presented by TigerGraph

    The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss: 

    -How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment. 

    -Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.

    Click to Expand

    Panel Participants:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Collapse This Item

  • Expert Panel Discussion: Managing Risk: Seek Forward Accountability and Assume a Stormy Sea 10:20 am

    While managing risk has always been a part of the CISO office, most resources turn to stopping new ransomware threats, managing supply chain attacks and mitigating third-party vulnerabilities. And budgets reflect this tactical action-reaction approach. How can CISOs truly move to managing risk? And by extension, how can they clearly communicate risk, and measure the efficacy of mitigation activities?

    In this panel, experts will debate how to facilitate the risk conversation with non-technical leaders, determine priorities, and counterbalance cybersecurity considerations against business requirements. This panel will address risk quantification, accounting, budgeting and resourcing, and building more resilience rather than taller walls.

    Click to Expand

    Panel Participants:

    Ravi Srinivasan
    Ravi Srinivasan

    Ravi Srinivasan

    CEO at Votiro

    Brendan Fitzpatrick
    Brendan Fitzpatrick

    Brendan Fitzpatrick

    VP, Cyber Risk Engineering at Axio

    Derek Johnson
    Derek Johnson

    Derek Johnson

    Infragard Board Member

    Stanton Gatewood
    Stanton Gatewood

    Stanton Gatewood

    Cyber Security Coordinator/Advisor at US DHS/CISA

    Collapse This Item

  • Securing Remote Access & Data: Secular Risks With 3rd Parties 11:25 am

    Presented by Appaegis

    In 2021 the “workforce” consisted of third-parties, contractors, and remote employee in addition to “traditional in office” workers. All of these stakeholders require access to sensitive and critical resources and data. Employees and the devices they use, even if they are unmanaged, are treated with certain implicit trust despite whether the trust is justified or not. However, contractors and third parties cannot be managed in the same fashion. In fact, granting them access to the integral resources and data is accompanied by several risks. 

    During this presentation, we will discuss the secular risk associated with providing access to contractors and third parties. We will also address the best practices that could be applied to mitigate such risk.

    Click to Expand

    Panel Participants:

    Prakash Nagpal
    Prakash Nagpal

    Prakash Nagpal

    Vice President at Appaegis

    Collapse This Item

  • Self-Learning AI: Redefining Enterprise Security 11:50 am

    Presented by Darktrace

    In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done 

    In this session, learn how self-learning AI: 

    -Detects, investigates and responds to threats – even while you are OOTO 

    -Protects your entire workforce and digital environment – wherever they are, whatever the data 

    -Defends against zero-days and other advanced attacks – without disrupting the organization

    Click to Expand

    Panel Participants:

    Andrea Dempsey
    Andrea Dempsey

    Andrea Dempsey

    Cyber Security Executive at Darktrace

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Keynote: Atlanta FBI Looks Back on 2021 Cyber Threats 12:45 pm

    In a year that had more cybersecurity headlines than any before, Greater Atlanta remains a hotbed for cyber-enabled fraud, as reported by the FBI Internet Crime Complaint Center (IC3).  In this keynote, Nathan Langmack will dissect the key components of some of the well-known ransomware attacks such as SolarWinds and Colonial Pipeline.  He will use these and others to surface lessons learned that translate to what CISOs and all Information Security Executives should regard as best practices.

    Special Agent Langmack will dig into the impact of these breaches; further, he will talk about the importance of building key law enforcement relationships ahead of time. He’ll outline response capabilities, prevention practices and how to go about developing the key relationships that every CISO should have across the region.

    The talk will also outline the importance of collecting evidence for an investigation, what to say when calling the FBI or other agencies, and how to maintain the engagement with law enforcement.  Finally, he will discuss continuous cooperative collaboration and learning methods with private sector partners, in which community members can become involved.

    Click to Expand

    Panel Participants:

    Nathan Langmack
    Nathan Langmack

    Nathan Langmack

    Special Agent at FBI Atlanta, Cyber

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 1:35 pm

    Presented by Cybereason

    It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack? 

    If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.

    Click to Expand

    Panel Participants:

    Kraig Faulkner
    Kraig Faulkner

    Kraig Faulkner

    Director Systems Engineering at Cybereason

    Collapse This Item

  • The Art & Science of Cloud Security 2:25 pm

    Presented by Lookout

    Come learn about the beauty of the cloud while applying the right “science” to securing your multiple cloud services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy work of art.

    Click to Expand

    Panel Participants:

    Andrew Olpin
    Andrew Olpin

    Andrew Olpin

    Cyber Solutions Architect at Lookout

    Collapse This Item

  • Remote Workforce: Authorization Intercept, Recording & Tracking 2:50 pm

    Presented by CarbonHelix

    Learn what benefits organizations gain from the latest security controls around remote access including session recording, authorization intercept on demand and modeling of remote user behavior. How ZTNA and SASE are making this possible without major investments in products, manpower, infrastructure or change and why the remote worker also enjoys faster access performance to their applications and services.

    Click to Expand

    Panel Participants:

    Mark Precious
    Mark Precious

    Mark Precious

    CTO at CarbonHelix

    David DeLozier
    David DeLozier

    David DeLozier

    Solutions Design at CarbonHelix

    Collapse This Item

  • Keynote: Waking up Boards and Executive Leadership 3:15 pm

    Waking up Boards and Executive Leadership Teams to the Reality of Cybersecurity.

    Organizations today can no longer engage in digital transactions or ecommerce serving their employees, customers, or partners without understanding the global cybersecurity landscape or the state of their internal security program. Cybersecurity risks are growing at an alarming rate across all industries, profit and nonprofit. Boards and Executive Leadership Teams can no longer act as if they are not a target of bad actors or that their organization is not important enough for bad actors to target them.

    Click to Expand

    Panel Participants:

    Derek Johnson
    Derek Johnson

    Derek Johnson

    Infragard Board Member

    Collapse This Item

  • Conference Final Closing Session
Partners