• Featured Speakers

    Collapse This Item

Event Schedule

Times for the Atlanta Cybersecurity Conference are in Eastern Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, October 20th.

  • Welcome to the Atlanta Cybersecurity Conference
  • The State of Phishing: An Under the Hood Look at the Latest Phishing Tactics 8:30 am

    Presented by INKY

    Account Takeover Attacks (ATO), Business Email Compromise (BEC) and Ransomware attacks are most definitely on the rise and some of the biggest problems facing security teams in 2022. 

    You could say 2022 is the year that phishing became an ‘industry’. The volume, variety, sophistication, and impact of phishing attacks have risen dramatically as black-hat players have organized themselves around what they see as a fast-growing opportunity. Specialists have risen in all areas as phishing/malware/ransomware-as-a-service have become a reality. The impact of ransomware payloads attached to phishing exploits have been felt worldwide. Such attacks are the main driver behind the dramatic increase in financial penalties suffered by corporate victims. 

    Criminals are using sophisticated tactics that are designed to slip through legacy gateway protection. Dave Baggett, CEO of INKY Technology will take you on an in-depth look, using real world examples of the latest deceptive tricks been used to circumvent these secure email gateways.

    Click to Expand

    Speaker:

    Dave Baggett
    Dave Baggett

    Dave Baggett

    Chief Executive Officer at INKY

    Collapse This Item

  • The Battle of Algorithms: How AI Is Beating AI at Its Own Game 8:50 am

    Presented by Darktrace

    Presentation Abstract:
    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    In this session, discover:
    – How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
    – What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    – Why defensive AI technologies are uniquely positioned to fight back

    Click to Expand

    Speaker:

    Dillon Hawrylak
    Dillon Hawrylak

    Dillon Hawrylak

    Senior Cyber Technology Specialist at Darktrace

    Collapse This Item

  • Identity: The Core of Zero Trust 9:30 am

    Presented by Okta

    Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.

    Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.

    Click to Expand

    Speaker:

    Marko Prudnikov
    Marko Prudnikov

    Marko Prudnikov

    Solutions Engineer at Okta

    Collapse This Item

  • Is It Finally the Time to Let AI Drive Our Cyber Defenses and Security Operations? 9:50 am

    Presented by IRONSCALES

    AI has made significant advancements in recent years. Cybersecurity teams struggle to keep up with threats and a substantial skills shortage, making it an ideal space for AI-based tools to have a significantly positive impact. Join IRONSCALES as we share how AI has become powerful enough to detect and remediate around 99% of even the most advanced phishing attacks. But why is it not enough?

    Are we at the point where we can finally trust AI to take over cyber defenses and security operations, especially against phishing and account takeover attacks? Join us as we discuss:
    • Why 99% isn’t good enough when considering how many emails the average organization.
    • Adding tools to the security stack can create efficiency, but also risk. Listen as we share our experience with how we help our customers mitigate system risk, while also leveraging scalability through AI.
    • How humans can be part of the solution and not be viewed as a liability when it comes to cyber defenses.
    In conclusion, we hope you walk away with a better understanding of what the power of AI means to your security strategy and why it shouldn’t sideline humans just yet.

    Click to Expand

    Speaker:

    Eyal Benishti
    Eyal Benishti

    Eyal Benishti

    CEO and Founder at IRONSCALES

    Collapse This Item

  • Protecting Against Cyber Attacks 10:20 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Paul Lewis
    Paul Lewis

    Paul Lewis

    CEO at Calamu Technologies Corporation

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Sam McHugh
    Sam McHugh

    Sam McHugh

    MDR Specialist at Open Systems

    Collapse This Item

  • Three Myths of the Modern Attack Surface 11:05 am

    Presented by Cyberpion

    With Attack Surface Expansion first on Gartner’s Top Risk and Security Trends for 2022, one would assume that there is a broad understanding of the risk factors. These three widely believed myths are preventing security teams from effectively addressing this growing concern. In this presentation, Ran Nahmias, Cyberpion’s Co-Founder & CBO will take a deep dive into three myths of the Modern Attack Surface based on findings and industry trends backed by real-life anonymized customer data. If you are part of most security leaders, who are seeking more effective ways to combat this growing threat, this is a presentation you can’t afford to miss.

    Click to Expand

    Speaker:

    Ran Nahmias
    Ran Nahmias

    Ran Nahmias

    Co-Founder & CBO at Cyberpion

    Collapse This Item

  • Immutable Storage: Level-Up Your Ransomware Readiness 11:25 am

    Presented by Arcserve

    Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.

    Click to Expand

    Speaker:

    Stacey Budd
    Stacey Budd

    Stacey Budd

    Principal Solution Consultant at Arcserve

    Collapse This Item

  • Conference Lunch Break
  • Scaling Application Security to the speed of DevSecOps 12:10 pm

    Presented by ArmorCode

    Agile DevOps, Cloud Deployment, Microservices, and Open Source have all dramatically accelerated application delivery and complexity. Today’s AppSec teams depend on a collection of point security products and siloed manual processes. This makes it harder for AppSec teams and developers to gain visibility into the application risk surface and remediate it without slowing software releases. The resulting AppSec chaos means applications ship fast without the assurance of shipping securely, leaving the organization at risk of breaches and losses. With an effective AppSecOps program, companies can continue to ship software fast but without the unmanaged risk because their AppSec team has the automation practices to ensure risk reduction keeps pace with business demands.

    Click to Expand

    Speaker:

    Chipper Jones
    Chipper Jones

    Chipper Jones

    Regional Director

    Collapse This Item

  • Nobody Cares That You Can Do Your Job: And How To Fix That 12:30 pm

    A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful.

    Click to Expand

    Speaker:

    Hadas Cassorla
    Hadas Cassorla

    Hadas Cassorla

    CISO - M1 Finance

    Collapse This Item

  • Look Your Enemy in Their Eyes 1:20 pm

    Presented by Redacted

    It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.

    Click to Expand

    Speakers:

    Ryan Jamieson
    Ryan Jamieson

    Ryan Jamieson

    Head of Advisory Services, Redacted

    Collapse This Item

  • Creating the Human Centric Network with Adaptive Trust 1:40 pm

    Presented by Axis

    Zero Trust and ZTNA have become a victim of vendor technical marketing. This session will break down the meaning of zero trust based on the founders of the movement and show you how to use this security framework to create a human centric network based on adaptive trust. This will enable you to unlock your network and security solutions to become a business enabler vs slowing down your organization.

    Click to Expand

    Speaker:

    John Spiegel
    John Spiegel

    John Spiegel

    Field CTO at Axis Security

    Collapse This Item

  • 2022 Trends & Directions 2:00 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

     

    Click to Expand

    Panel Participants:

    Jay Stewart
    Jay Stewart

    Jay Stewart

    Vice President at CORL Technologies

    Joe Potraza
    Joe Potraza

    Joe Potraza

    Security Strategist at Mimecast North America

    Collapse This Item

  • What You Don’t See Will Hurt You: Network Blind Spots, Visibility, and the importance of Being Proactive 2:45 pm

    Presented by Keysight

    Please join Keysight to discuss network blind spots, visibility, and the importance of ongoing network test. As networks continue to grow more complex and move into cloud and multi-cloud environments, getting an accurate view into your network has never been harder or more important. Security tools are only part of the answer as they are only as good as they data they receive. Learn how network visibility and testing are key aspects to a successful network security strategy.

    Click to Expand

    Speaker:

    Bill Canter
    Bill Canter

    Bill Canter

    Healthcare Business Development, Keysight Technologies

    Collapse This Item

  • Ransomware, Cyber Hygiene & Partnering with the FBI 3:05 pm

    Drawing from over 20 years of experience with cyber criminal and cyber national security investigations that have spanned the globe, this session will highlight lessons learned and best practices attendees can consider for themselves, their companies, agencies, or schools to help protect them from becoming victims at home or at work, along with helping to mitigate threats in their environments.  This session will also discuss how these best practices can be applied to cyber threats such as ransomware, supply chain attacks, extortion, and Business Email Compromise (BEC) in the year 2022 and beyond.  Moreover, this session will touch on cyber criminal and cyber nation state actors who are responsible for cyber attacks, giving attendees further insights on what to protect both in the real world and online.  The session will also offer insights on working with law enforcement, and the importance of proactively establishing relationships.

    Click to Expand

    Speakers:

    Philip Wislar
    Philip Wislar

    Philip Wislar

    Assistant Special Agent in Charge at FBI, Atlanta Field Office

    Chad Hunt
    Chad Hunt

    Chad Hunt

    Supervisory Special Agent at FBI, Atlanta Field Office

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:35 pm

    Moderator:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Panel Participants:

    Philip Wislar
    Philip Wislar

    Philip Wislar

    Assistant Special Agent in Charge at FBI, Atlanta Field Office

    Chad Hunt
    Chad Hunt

    Chad Hunt

    Supervisory Special Agent at FBI, Atlanta Field Office

    Dean Glore
    Dean Glore

    Dean Glore

    Special Agent, USSS

    Zach Bulliner
    Zach Bulliner

    Zach Bulliner

    ATSAIC, USSS

    Collapse This Item

  • Keynote Presentation: Joye Purser 4:25 pm

    Cyberwars and the New Target: US Critical Infrastructure

    The explosion of ransomware and other cyber attacks have forever changed the strategic and business importance of the CISO. Dr. Joye Purser shares how and why the landscape has shifted, and what companies can do to better prepare for and respond to the inevitable cyber breach.

    Click to Expand

    Speaker:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Collapse This Item

  • Cyber Executive Panel 4:55 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Panel Participants:

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Global Director of Attribution at Palo Alto Networks

    Steven Ferguson
    Steven Ferguson

    Steven Ferguson

    CIO - Technical College System of Georgia (TCSG)

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Conference Closing Session 5:20 pm
  • Atlanta Cybersecurity Conference Networking Reception & Happy Hour 5:30 pm
Partners Register