Registration

Wed. Mar 30 — Thu. Mar 31

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: FREE

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Summit will be open from 11:00 AM March 30th to 5PM and 8:30 AM March 31st to 3PM.

  • DAY ONE
  • Welcome to the SouthEast Virtual Cybersecurity Summit
  • Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust 9:35 am

    Presented by ThreatLocker

    Join ThreatLocker’s Director of Technical Engagement, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture.

    Click to Expand

    Speaker:

    Ben Jenkins
    Ben Jenkins

    Ben Jenkins

    Director of Technical Engagement at ThreatLocker

    Collapse This Item

  • The State of Secure Identity 10:05 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Empower the Human “Cyber-Warrior”: A Public-Private Partnership 10:25 am

    Despite the addition of more and more technologies (MFA, DLP, email security, etc.), and education (user awareness, phishing simulation, etc.) more than 90% of eventual monetary losses due to a data breach result from users. Whether malicious or unintentional, the oft-confused carbon-based life forms (users) are worthy of a focus from this panel of experts.

    This discussion at the SouthEast Virtual Cybersecurity Summit will include members of our law enforcement, federal cyber support, and other agencies alongside leaders from private industry. They will present some of the facts from their experiences, and share best practices and practical advice for the cyber leaders in the audience to finally close the gaps related to user “error.” They’ll discuss processes and ideas on how cyber leaders can be less susceptible to these gaps, and thoughtful paradigms to effectuate a shift in strategy to better cope.

    Click to Expand

    Panel Participants:

    Richard Dean
    Richard Dean

    Richard Dean

    Assistant to the Special Agent in Charge, Tampa Field Office

    Todd Ryan
    Todd Ryan

    Todd Ryan

    Chief Information Officer at Hillsborough County Sheriff's Office

    Robert Price
    Robert Price

    Robert Price

    Supervisory Special Agent at Infragard MO (FBI partner)

    Richard Kelley
    Richard Kelley

    Richard Kelley

    General Manager, Q:CYBER and Platform at QOMPLX, Inc.

    Philip Kapusta
    Philip Kapusta

    Philip Kapusta

    Future Operations Bureau Commander at Pasco Sheriff's Office

    Collapse This Item

  • Low Hanging Fruit – Improving AD Security for the Easy Win 11:15 am

    Presented by Attivo Networks

    Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.

    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 11:35 am

    Presented by One Identity

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Larry Chinski
    Larry Chinski

    Larry Chinski

    Vice President Global IAM Strategy and Customer Advocacy at One Identity

    Collapse This Item

  • Lunch Break
  • Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 12:30 pm

    Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center.  Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.  

    Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age.  Protecting citizens, assets, information and infrastructure is the building block for stable government services. 

    Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors.  He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.  

    Click to Expand

    Speaker:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Knowing What Not to Do 1:15 pm

    Presented by Tego Data

    The proliferation of Zero-Day vulnerabilities has amplified the stress level for already burdened IT and Security staff. One needs to look no farther than ProxyLogon, PrintNightmare and Log4j vulnerabilities as sublime examples of disruptive vulnerabilities. 

    Tasked with finding the vulnerabilities and then planning and executing mitigation strategies, many IT teams had to jump into vulnerability resolution while neglecting important, but less urgent IT initiatives. Exacerbating matters, those steps were often executed in a void of proper risk assessment and change management. The problems will only get worse in the future. 

    This presentation will provide a brief case study into the aforementioned vulnerabilities and identify new techniques, technologies and best practices to evaluate how, when and even if IT should take action to mitigate.

    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 1:35 pm

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 2:15 pm

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”.  As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce.  In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization. 

    Click to Expand

    Speaker:

    John Spiegel
    John Spiegel

    John Spiegel

    Director of Strategy at Axis Security

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 2:35 pm

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.

    Join Mitch Bowman, Cyber Security Director, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

    This presentation will discuss:
    -Recent ransomware threat trends, including double extortion and RDP attacks
    -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
    -Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day

    Click to Expand

    Panel Participants:

    Mitch Bowman
    Mitch Bowman

    Mitch Bowman

    Cyber Security Director at Darktrace

    Collapse This Item

  • Defense in Depth: New Strategies for 2022 2:55 pm

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022? Join us at the SouthEast Virtual Cybersecurity Summit to hear industry experts thoughts on this question and more!

    Click to Expand

    Panel Participants:

    Troy Kitch
    Troy Kitch

    Troy Kitch

    VP of Products at 1Password

    Ryan Bowman
    Ryan Bowman

    Ryan Bowman

    Director of Solutions Engineering at ThreatLocker

    Nick Houck
    Nick Houck

    Nick Houck

    Senior Security Strategist at Attivo

    Collapse This Item

  • Incident Response & The Trickle Down Effect 3:40 pm

    CISOs stand prepared to guide their organizations through Cyber Intrusion and Ransomware Events and Devon Ackerman’s Incident Response teams across North America handle thousands of such events each year. They are on the front lines working in lockstep with victim organizations and their CISOs, augmenting Client IT and Incident Response teams, performing forensic analysis, working to contain and eject threat actors from networks and investigate incidents to identify risk to sensitive data. 

    From that body of experience, interactions and investigative results, Mr. Ackerman will walk through observed patterns that Kroll has termed “The Trickle Down Effect” as it relates to Nation State Actors and their Tactics, Techniques and Procedures being observed and absorbed by Organized Crime Groups and mass produced against victim organizations, like your own.  Mr. Ackerman will also walk the audience through two concepts (Castle Wall Doctrine & Kroll’s Intrusion Lifecycle) that he hopes will be helpful for CISOs as they convey concepts and analogies to members of their Boards, their Executive Teams, and employees of their organizations. 

    Click to Expand

    Speaker:

    Devon Ackerman
    Devon Ackerman

    Devon Ackerman

    MD & Head of Incident Response at Kroll Cyber Risk

    Collapse This Item

  • Day One Closing Session
  • DAY TWO
  • Welcome to the SouthEast Virtual Cybersecurity Summit
  • A New, Modern Way to Protect Data 9:35 am

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Panel Participants:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Human-Centric Security: Protect the Person to Protect the Business 9:55 am

    Presented by 1Password

    Human error is the leading cause of data breaches, with 92% of workers feeling additional security measures impacts their work. This session will dive into the changing landscape of security, the key challenges that are causing security risks to be at an all-time high, and how to secure your people to protect your business with a human-centric approach.

    Click to Expand

    Speaker:

    Troy Kitch
    Troy Kitch

    Troy Kitch

    VP of Products at 1Password

    Collapse This Item

  • DHS-CISA Briefing: The Russia-Ukraine Conflict’s Impact on the Cyber-Threat Landscape 10:15 am

    The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its “Shields Up” warning in mid-February. Working with other agencies, important information is updated regularly at cisa.gov/shields-up.  Consolidating that information and a host of the intelligence that CISA has made available, Region 4 Cybersecurity Advisor and former Georgia State CISO Stanton Gatewood will go over the nature of the current threats posed by these and other pressing headlines. 

    Join this session for update on cybercrime, cyber-attacks, exploits, data breaches, cyber insurance, the cyber workforce gap, kinetic-warfare v. cyber-warfare, soaring ransomware PLUS live audience Q&A. 

    Click to Expand

    Speaker:

    Stanton Gatewood
    Stanton Gatewood

    Stanton Gatewood

    Cyber Security Coordinator/Advisor at US DHS/CISA

    Collapse This Item

  • Evolving Your Organization’s Security Maturity 11:20 am

    Presented by Cavelo

    Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.

     This session will review:

    • The NIST Cybersecurity Maturity Model and how it supports broader security strategy
    • Sensitive data types and how they vary based on the nature of your business or the industry that you operate in
    • Core security initiatives to achieve greater security maturity, whether you’re establishing your baseline or scaling your strategy
    Click to Expand

    Panel Participants:

    James Mignacca
    James Mignacca

    James Mignacca

    CEO at Cavelo

    Collapse This Item

  • AI/ML and Other Leading-Edge Innovations in Cybersecurity 11:45 am

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’? Find out what experts have to say at the SouthEast Virtual Cybersecurity Summit!

    Click to Expand

    Panel Participants:

    Adam Fletcher
    Adam Fletcher

    Adam Fletcher

    Senior Managing Director, Chief Security Officer at The Blackstone Group

    Larry Chinski
    Larry Chinski

    Larry Chinski

    Vice President Global IAM Strategy and Customer Advocacy at One Identity

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Lunch Break
  • A Realistic Take on Zero Trust 1:05 pm

    Presented by Lookout

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Click to Expand

    Speaker:

    Hank Schless
    Hank Schless

    Hank Schless

    Senior Manager, Security Solutions at Lookout

    Collapse This Item

  • Compliance as a Catalyst for Reducing Risk 1:25 pm

    Presented by Reciprocity

    Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper. 

    • Challenges in Compliance and Risk Programs
    • Five Best Practices in starting a Risk Program
    • Compliance Considerations that will Improve Your Risk Posture
    Click to Expand

    Speaker:

    Rob Ellis
    Rob Ellis

    Rob Ellis

    Chief Strategy Officer at Reciprocity

    Collapse This Item

  • Keynote Fireside Chat: John Kindervag 1:45 pm

    John Kindervag is a 25-year veteran of the high-tech world. He holds numerous industry certifications, including CISSP, CEH, QSA and CCNA. Prior to joining Forrester, Kindervag was the Senior Security Architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a Principal Security Consultant. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine, SecurityFocus.com and Techtarget.com. Kindervag has spoken at many security conferences and events, including ToorCon, ShmoCon and InfoSec World.

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Top 5 Considerations When Adopting Zero Trust 2:45 pm

    Presented by Twingate

    Zero Trust is not a new concept, but only in recent years have organizations prioritized efforts towards adopting the architecture. And in the past two years, with teams increasingly becoming distributed or remote, there has been a greater need for Zero Trust than ever before. However, current tech stacks hardly offer ideal support for BYOD, let alone mass adoption of a mobile workforce.

    With Zero Trust, organizations reduce their attack surface, develop identity-first concepts in place of device IPs, build in continuous authentication, establish a trust model that removes inherent trust, and move towards the principle of least privilege and passwordless systems. Join Twingate’s Product Manager Team Lead, Anna Liu, for a brief presentation discussing how to successfully build a foundation towards adopting and implementing a Zero Trust strategy.

    After joining this session, you’ll come away with:

    • A path towards Zero Trust adoption
    • Processes needed prior to tool evaluation
    • Myths squashed and buzzwords decrypted
    • Resources for building a Zero Trust architecture
    Click to Expand

    Speaker:

    Anna Liu
    Anna Liu

    Anna Liu

    Product Manager Team Lead at Twingate

    Collapse This Item

  • Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 3:05 pm

    If it’s not Illegal, immoral, or unethical – it’s on the table.  John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity. 

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms.  Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels. 

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    Formerly: Asst Director, CISA; Director, NCCIC

    Collapse This Item

  • Cyber Executive RoundTable 3:45 pm

    Submit your bio for consideration to participate on our Cyber Executive RoundTable

    at the SouthEast Virtual Cybersecurity Summit

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Scott Dickinson
    Scott Dickinson

    Scott Dickinson

    CISO - AnMed Health

    Jeremy Rodgers
    Jeremy Rodgers

    Jeremy Rodgers

    Chief Information Security Officer

    Stanton Gatewood
    Stanton Gatewood

    Stanton Gatewood

    Cyber Security Coordinator/Advisor at US DHS/CISA

    Jeff Hudesman
    Jeff Hudesman

    Jeff Hudesman

    CISO at Pinwheel

    Carlota Sage
    Carlota Sage

    Carlota Sage

    vCISO at Fractional CISO

    Collapse This Item

  • SouthEast Virtual Cybersecurity Summit Closing
  • Partners

    Platinum Partners

    ThreatLocker

    Gold Partners

    1Password
    Attivo Networks
    Auth0
    One Identity
    Pure Storage - Alternate

    Silver Partners

    Axis
    baramundi - Alternate
    Cavelo
    Darktrace
    Lookout
    Reciprocity
    Tego
    Twingate

    Bronze Partners

    Cloudflare - Alternate
    Okta - Alternate

    Exhibiting Partners

    Cobalt
    Red Canary

    Affiliate Partners

    (ISC)2
    AFCEA Atlanta
    AFCEA North Carolina
    Infragard Tampa Bay
    STEM Atlanta Women
    WiCys

    Collapse This Item

Partners Register