
Conference
Atlanta
Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Atlanta Cybersecurity Conference with thought leaders and luminaries face-to-face and gather insights on the latest trends and threats in cybersecurity to help you better navigate whatever cyber threats may come. At the Atlanta Cybersecurity Conference, you will gain unfettered access to many local CISOs, as well as representatives from government agencies and law enforcement, as they provide an in-depth analysis of the current state of cybersecurity with extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities.
Whether you’re looking to grow your understanding about cloud security, working on improving your organization’s DevSecOps, or just looking to learn more about the current threat environment, the Atlanta Cybersecurity Conference will give you the knowledge you need to ensure your team’s success.
Connect with Data Connectors on LinkedIn here!
Date
Thu. Oct 20
Location
265 Peachtree Center Avenue
Atlanta, GA 30303
404-521-0000
-
Featured Speakers
Hadas Cassorla
Nobody Cares That You Can Do Your Job: And How To Fix That
Philip WislarRansomware, Cyber Hygiene & Partnering with the FBI
Chad HuntRansomware, Cyber Hygiene & Partnering with the FBI
Joye PurserCyber Inter-Agency Collaboration Panel
Philip WislarCyber Inter-Agency Collaboration Panel
Chad HuntCyber Inter-Agency Collaboration Panel
Dean GloreCyber Inter-Agency Collaboration Panel
Zach BullinerCyber Inter-Agency Collaboration Panel
Joye PurserKeynote Presentation: Joye Purser
Joye PurserCyber Executive Panel
Michael F. D. AnayaCyber Executive Panel
Steven FergusonCyber Executive Panel
Jameeka Green AaronCyber Executive Panel
Event Schedule
Times for the Atlanta Cybersecurity Conference are in Eastern Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, October 20th.
- Welcome to the Atlanta Cybersecurity Conference
-
The State of Phishing: An Under the Hood Look at the Latest Phishing Tactics 8:30 am
Account Takeover Attacks (ATO), Business Email Compromise (BEC) and Ransomware attacks are most definitely on the rise and some of the biggest problems facing security teams in 2022.
You could say 2022 is the year that phishing became an ‘industry’. The volume, variety, sophistication, and impact of phishing attacks have risen dramatically as black-hat players have organized themselves around what they see as a fast-growing opportunity. Specialists have risen in all areas as phishing/malware/ransomware-as-a-service have become a reality. The impact of ransomware payloads attached to phishing exploits have been felt worldwide. Such attacks are the main driver behind the dramatic increase in financial penalties suffered by corporate victims.
Criminals are using sophisticated tactics that are designed to slip through legacy gateway protection. Dave Baggett, CEO of INKY Technology will take you on an in-depth look, using real world examples of the latest deceptive tricks been used to circumvent these secure email gateways.
Speaker:
-
The Battle of Algorithms: How AI Is Beating AI at Its Own Game 8:50 am
Presentation Abstract:
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.In this session, discover:
– How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
– What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
– Why defensive AI technologies are uniquely positioned to fight backSpeaker:
-
Identity: The Core of Zero Trust 9:30 am
Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters.
Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals.
Speaker:
-
Is It Finally the Time to Let AI Drive Our Cyber Defenses and Security Operations? 9:50 am
AI has made significant advancements in recent years. Cybersecurity teams struggle to keep up with threats and a substantial skills shortage, making it an ideal space for AI-based tools to have a significantly positive impact. Join IRONSCALES as we share how AI has become powerful enough to detect and remediate around 99% of even the most advanced phishing attacks. But why is it not enough?
Are we at the point where we can finally trust AI to take over cyber defenses and security operations, especially against phishing and account takeover attacks? Join us as we discuss:
• Why 99% isn’t good enough when considering how many emails the average organization.
• Adding tools to the security stack can create efficiency, but also risk. Listen as we share our experience with how we help our customers mitigate system risk, while also leveraging scalability through AI.
• How humans can be part of the solution and not be viewed as a liability when it comes to cyber defenses.
In conclusion, we hope you walk away with a better understanding of what the power of AI means to your security strategy and why it shouldn’t sideline humans just yet.Speaker:
-
Protecting Against Cyber Attacks 10:20 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Three Myths of the Modern Attack Surface 11:05 am
With Attack Surface Expansion first on Gartner’s Top Risk and Security Trends for 2022, one would assume that there is a broad understanding of the risk factors. These three widely believed myths are preventing security teams from effectively addressing this growing concern. In this presentation, Ran Nahmias, Cyberpion’s Co-Founder & CBO will take a deep dive into three myths of the Modern Attack Surface based on findings and industry trends backed by real-life anonymized customer data. If you are part of most security leaders, who are seeking more effective ways to combat this growing threat, this is a presentation you can’t afford to miss.
Speaker:
-
Immutable Storage: Level-Up Your Ransomware Readiness 11:25 am
Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.
Speaker:
- Conference Lunch Break
-
Scaling Application Security to the speed of DevSecOps 12:10 pm
Agile DevOps, Cloud Deployment, Microservices, and Open Source have all dramatically accelerated application delivery and complexity. Today’s AppSec teams depend on a collection of point security products and siloed manual processes. This makes it harder for AppSec teams and developers to gain visibility into the application risk surface and remediate it without slowing software releases. The resulting AppSec chaos means applications ship fast without the assurance of shipping securely, leaving the organization at risk of breaches and losses. With an effective AppSecOps program, companies can continue to ship software fast but without the unmanaged risk because their AppSec team has the automation practices to ensure risk reduction keeps pace with business demands.
Speaker:
-
Nobody Cares That You Can Do Your Job: And How To Fix That 12:30 pm
A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful.
Speaker:
-
Look Your Enemy in Their Eyes 1:20 pm
It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.
Speakers:
-
Creating the Human Centric Network with Adaptive Trust 1:40 pm
Zero Trust and ZTNA have become a victim of vendor technical marketing. This session will break down the meaning of zero trust based on the founders of the movement and show you how to use this security framework to create a human centric network based on adaptive trust. This will enable you to unlock your network and security solutions to become a business enabler vs slowing down your organization.
Speaker:
-
2022 Trends & Directions 2:00 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
What You Don’t See Will Hurt You: Network Blind Spots, Visibility, and the importance of Being Proactive 2:45 pm
Please join Keysight to discuss network blind spots, visibility, and the importance of ongoing network test. As networks continue to grow more complex and move into cloud and multi-cloud environments, getting an accurate view into your network has never been harder or more important. Security tools are only part of the answer as they are only as good as they data they receive. Learn how network visibility and testing are key aspects to a successful network security strategy.
Speaker:
-
Ransomware, Cyber Hygiene & Partnering with the FBI 3:05 pm
Drawing from over 20 years of experience with cyber criminal and cyber national security investigations that have spanned the globe, this session will highlight lessons learned and best practices attendees can consider for themselves, their companies, agencies, or schools to help protect them from becoming victims at home or at work, along with helping to mitigate threats in their environments. This session will also discuss how these best practices can be applied to cyber threats such as ransomware, supply chain attacks, extortion, and Business Email Compromise (BEC) in the year 2022 and beyond. Moreover, this session will touch on cyber criminal and cyber nation state actors who are responsible for cyber attacks, giving attendees further insights on what to protect both in the real world and online. The session will also offer insights on working with law enforcement, and the importance of proactively establishing relationships.
Speakers:
-
Cyber Inter-Agency Collaboration Panel 3:35 pm
Moderator:
Panel Participants:
-
Keynote Presentation: Joye Purser 4:25 pm
Cyberwars and the New Target: US Critical Infrastructure
The explosion of ransomware and other cyber attacks have forever changed the strategic and business importance of the CISO. Dr. Joye Purser shares how and why the landscape has shifted, and what companies can do to better prepare for and respond to the inevitable cyber breach.
Speaker:
-
Cyber Executive Panel 4:55 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 5:20 pm
- Atlanta Cybersecurity Conference Networking Reception & Happy Hour 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners