
Conference
Atlanta
Cybersecurity Conference
Join your fellow cybersecurity professionals at the Atlanta Cybersecurity Conference to gain insights to help you better navigate whatever cyber threats that 2023 may bring! You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
The Atlanta Cybersecurity Conference will allow you to connect with your peers and industry experts for live, in-person sessions. Engaging topics will range from the future of ransomware to protecting your organization from advanced threat actors.
Take a look at all Data Connectors has to offer here!
Date
Thu. Jun 01
Location
Atlanta Marriott Buckhead Hotel & Conference Center
3405 Lenox Road NE
Atlanta, Georgia 30326
1 404-261-9250
Registration
Thu. Jun 01
Registration for qualified senior cybersecurity professionals. Subject to approval.
-
Featured Speakers
Justin Scarpaci
Protecting Against Cyber Attacks
Andy StoneProtecting Against Cyber Attacks
Kevin JordanProtecting Against Cyber Attacks
Kevin BaranowskiProtecting Against Cyber Attacks
Mathieu GorgeKeynote Presentation: Mathieu Gorge
The Cyber Elephant in the Board RoomSigned Books by Keynote Speaker Mathieu Gorge
Travis HowertonGuest Keynote Presentation: Travis Howerton
Chad HuntCyber Inter-Agency Collaboration Panel
Dean GloreCyber Inter-Agency Collaboration Panel
Josh ReedCyber Inter-Agency Collaboration Panel
Jay GambleCyber Inter-Agency Collaboration Panel
Michael F. D. AnayaCyber Executive RoundTable
Tamika BassCyber Executive RoundTable
Travis HowertonCyber Executive RoundTable
Jude Fils-AimeCyber Executive RoundTable
James AzarCyber Executive RoundTable
James AzarNetworking Reception and Happy Hour
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, June 1st.
- Welcome to the Atlanta Cybersecurity Conference
- Welcome / Introductions
-
What's Old is New Again 9:00 am
Add to Calendar20230601 9:00 am20230601 9:20 amAmerica/New_YorkWhat's Old is New Again
Secureworks CTU researchers have seen a steady increase in sophisticated and destructive threat actors accessing networks through web drive-by downloads. This venerable threat class is no longer the exclusive domain of tech support scams and adware, instead becoming a leading entry point for large-scale ransomware attacks. We will survey the threat groups responsible for the more prolific drive-by download networks, how they work, and what network defenders can expect after exploitation.
3405 Lenox Road NE
Atlanta, Georgia 30326Secureworks CTU researchers have seen a steady increase in sophisticated and destructive threat actors accessing networks through web drive-by downloads. This venerable threat class is no longer the exclusive domain of tech support scams and adware, instead becoming a leading entry point for large-scale ransomware attacks. We will survey the threat groups responsible for the more prolific drive-by download networks, how they work, and what network defenders can expect after exploitation.
Speaker:
-
Automating Cyber Risk Prioritization 9:30 am
Add to Calendar20230601 9:30 am20230601 9:50 amAmerica/New_YorkAutomating Cyber Risk Prioritization
With increasing threats, challenging economic environments, budget limitations, and cyber talent shortages, how can security leaders efficiently manage cyber risk at scale?
This session discusses opportunities for identifying, automating, and prioritizing cyber risk throughout an organization’s attack surface, including third parties.
- What opportunities are there for automating the identification of the most impactful threats amongst the noise in the vast amounts of vulnerability and threat data?
- Incorporating context to the likelihood of threat scenarios and the impact to organizations goes beyond traditional CVSS-based vulnerability ranking.
Atlanta, Georgia 30326With increasing threats, challenging economic environments, budget limitations, and cyber talent shortages, how can security leaders efficiently manage cyber risk at scale?
This session discusses opportunities for identifying, automating, and prioritizing cyber risk throughout an organization’s attack surface, including third parties.
- What opportunities are there for automating the identification of the most impactful threats amongst the noise in the vast amounts of vulnerability and threat data?
- Incorporating context to the likelihood of threat scenarios and the impact to organizations goes beyond traditional CVSS-based vulnerability ranking.
Speaker:
-
Protecting Against Cyber Attacks 10:10 am
Add to Calendar20230601 10:10 am20230601 10:30 amAmerica/New_YorkProtecting Against Cyber Attacks
For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day. Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.
3405 Lenox Road NE
Atlanta, Georgia 30326.
For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day. Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.
Panel Participants:
-
OT Security Engineering 10:50 am
Add to Calendar20230601 10:50 am20230601 11:10 amAmerica/New_YorkOT Security Engineering
The engineering profession has powerful tools available to address cyber risks to physical operations, tools that have no counterparts in classic IT security, frameworks or standards. The new US DOE Cyber-Informed Engineering Strategy is working to capture this body of knowledge so that these powerful tools can be applied routinely, in addition to classic IT security mechanisms. In this presentation we summarize the CIE strategy and dig into examples of these techniques in safety engineering, automation engineering and network engineering.
3405 Lenox Road NE
Atlanta, Georgia 30326Presented by Waterfall Security Solutions
The engineering profession has powerful tools available to address cyber risks to physical operations, tools that have no counterparts in classic IT security, frameworks or standards. The new US DOE Cyber-Informed Engineering Strategy is working to capture this body of knowledge so that these powerful tools can be applied routinely, in addition to classic IT security mechanisms. In this presentation we summarize the CIE strategy and dig into examples of these techniques in safety engineering, automation engineering and network engineering.
Speaker:
-
Risky Links - It is More Than Just Email 11:10 am
Add to Calendar20230601 11:10 am20230601 11:30 amAmerica/New_YorkRisky Links - It is More Than Just Email
Risky links are coming our way from a variety of places: Slack, LinkedIn, SMS – it’s almost impossible to keep track of them all. In fact, it may just be. The good news is that links are mostly opened in the browser. By isolating risky links when they are opened, ConcealBrowse prevents your organization and you from being infected with malware.
3405 Lenox Road NE
Atlanta, Georgia 30326Risky links are coming our way from a variety of places: Slack, LinkedIn, SMS – it’s almost impossible to keep track of them all. In fact, it may just be. The good news is that links are mostly opened in the browser. By isolating risky links when they are opened, ConcealBrowse prevents your organization and you from being infected with malware.
Speaker:
-
2023 Trends & Directions 11:30 am
Add to Calendar20230601 11:30 am20230601 11:55 amAmerica/New_York2023 Trends & Directions
As we’re getting closer to the halfway point of 2023, it’s clear that cybercriminals are still coming up with new, more complex ways to cash in. During this panel discussion, you’ll get insights on the latest trends from these experts who live on the leading edge of cybersecurity technology. You’ll hear about some of the newest tactics for defending against unprecedented attacks.
Atlanta, Georgia 30326.
As we’re getting closer to the halfway point of 2023, it’s clear that cybercriminals are still coming up with new, more complex ways to cash in. During this panel discussion, you’ll get insights on the latest trends from these experts who live on the leading edge of cybersecurity technology. You’ll hear about some of the newest tactics for defending against unprecedented attacks.
Panel Participants:
- Lunch Break
-
Lunch Demo: Sponsored by OpenText Security Solutions 12:25 pm
Add to Calendar20230601 12:25 pm20230601 12:45 pmAmerica/New_YorkLunch Demo: Sponsored by OpenText Security Solutions3405 Lenox Road NE
Atlanta, Georgia 30326 -
Keynote Presentation: Mathieu Gorge 12:35 pm
Add to Calendar20230601 12:35 pm20230601 1:15 pmAmerica/New_YorkKeynote Presentation: Mathieu Gorge
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
3405 Lenox Road NE
Atlanta, Georgia 30326Making sense of Geopoltical Risks in 2023 – Impact on Cybersecurity & Compliance
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Speaker:
-
Signed Books by Keynote Speaker Mathieu Gorge 12:55 pm
Add to Calendar20230601 12:55 pm20230601 1:15 pmAmerica/New_YorkSigned Books by Keynote Speaker Mathieu Gorge3405 Lenox Road NE
Atlanta, Georgia 30326.
About the Book:
-
Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now. 1:35 pm
Add to Calendar20230601 1:35 pm20230601 1:50 pmAmerica/New_YorkCyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now.
What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense?
The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive.
Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.
3405 Lenox Road NE
Atlanta, Georgia 30326What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense?
The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive.
Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.
Speaker:
-
AI and Zero Trust : The inevitable enrichments of SIEM and IAM 1:55 pm
Add to Calendar20230601 1:55 pm20230601 2:15 pmAmerica/New_YorkAI and Zero Trust : The inevitable enrichments of SIEM and IAM
Topics to be covered in the presentation on AI and Zero Trust:
- Fundamentals of log management.
- IAM – Concepts and why Zero Trust is inevitable in IAM.
- Effortless configuration and management of logs from different sources.
- UBA and UEBA – How is it achieved ?
- Threats and attacks – Detection and converting them into actionable items using workflows.
- Reporting on crucial security events and searching through logs.
- Getting beyond the compliance mandates.
- Managing and responding to incidents.
- Discovering attack patterns with default and custom correlation rules.
Atlanta, Georgia 30326Topics to be covered in the presentation on AI and Zero Trust:
- Fundamentals of log management.
- IAM – Concepts and why Zero Trust is inevitable in IAM.
- Effortless configuration and management of logs from different sources.
- UBA and UEBA – How is it achieved ?
- Threats and attacks – Detection and converting them into actionable items using workflows.
- Reporting on crucial security events and searching through logs.
- Getting beyond the compliance mandates.
- Managing and responding to incidents.
- Discovering attack patterns with default and custom correlation rules.
Speaker:
-
Why Small and Mid-Size Businesses Need XDR for Security 2:35 pm
Add to Calendar20230601 2:35 pm20230601 2:55 pmAmerica/New_York Why Small and Mid-Size Businesses Need XDR for Security
Small and medium-sized businesses (SMBs) are often targeted by attackers due to their limited resources, making them vulnerable. While many cybersecurity solutions are too expensive and demanding for smaller budgets, there are surprisingly cost-effective XDRs available. SMBs may need to look for solutions that automate processes, and reduce detection and remediation times without burdening IT and security teams that are already stretched thin.
Discover how XDR can enhance your cybersecurity defenses while remaining within your budget.
Join us for an informative discussion where you’ll explore:
- Understanding the different types of XDR platforms (e.g., open vs. native XDR)
- Key features SMBs should consider in an XDR solution
- Strategies for maintaining protection without round-the-clock resources
This engaging talk encourages audience participation and welcomes questions. Don’t miss out on the opportunity to gain insights from Amanda Berlin, Blumira’s Lead Incident Detection Engineer.
3405 Lenox Road NE
Atlanta, Georgia 30326Small and medium-sized businesses (SMBs) are often targeted by attackers due to their limited resources, making them vulnerable. While many cybersecurity solutions are too expensive and demanding for smaller budgets, there are surprisingly cost-effective XDRs available. SMBs may need to look for solutions that automate processes, and reduce detection and remediation times without burdening IT and security teams that are already stretched thin.
Discover how XDR can enhance your cybersecurity defenses while remaining within your budget.
Join us for an informative discussion where you’ll explore:
- Understanding the different types of XDR platforms (e.g., open vs. native XDR)
- Key features SMBs should consider in an XDR solution
- Strategies for maintaining protection without round-the-clock resources
This engaging talk encourages audience participation and welcomes questions. Don’t miss out on the opportunity to gain insights from Amanda Berlin, Blumira’s Lead Incident Detection Engineer.
Speaker:
-
Guest Keynote Presentation: Travis Howerton 2:55 pm
Add to Calendar20230601 2:55 pm20230601 3:25 pmAmerica/New_YorkGuest Keynote Presentation: Travis Howerton
With the rise of DevSecOps, Continuous Integration (CI) and Continuous Delivery (CD) are changing the world of software development. Applications are increasingly shipped in containers and deployed with automation that has greatly increased velocity for new capabilities and improved IT’s ability to support the business. At the same time, Zero Trust is gaining momentum as CISOs push for architectures that have strong isolation, minimal dependencies, and high assurance of user identity. One side is moving at light speed while the other side is looking to slow down, re-architect, and build a more secure environment. At times, the goals of these movements can feel at odds with one another. This talk will cover the need for the RegOps movement and bringing the principles of DevOps to Compliance. In many cases, the reason CISO’s have Zero Trust is because IT provides them with zero assurance on how software is built and how the environment runs. The talk will cover the RegOps manifesto and the principles of the movement, it will discuss the industry trends driving the need for RegOps, and it will provide tips on a practical roadmap to get started with your RegOps initiatives.
3405 Lenox Road NE
Atlanta, Georgia 30326CI/CD Was Just the Beginning – Continuous Assurance (CA) and RegOps are Next
With the rise of DevSecOps, Continuous Integration (CI) and Continuous Delivery (CD) are changing the world of software development. Applications are increasingly shipped in containers and deployed with automation that has greatly increased velocity for new capabilities and improved IT’s ability to support the business. At the same time, Zero Trust is gaining momentum as CISOs push for architectures that have strong isolation, minimal dependencies, and high assurance of user identity. One side is moving at light speed while the other side is looking to slow down, re-architect, and build a more secure environment. At times, the goals of these movements can feel at odds with one another. This talk will cover the need for the RegOps movement and bringing the principles of DevOps to Compliance. In many cases, the reason CISO’s have Zero Trust is because IT provides them with zero assurance on how software is built and how the environment runs. The talk will cover the RegOps manifesto and the principles of the movement, it will discuss the industry trends driving the need for RegOps, and it will provide tips on a practical roadmap to get started with your RegOps initiatives.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 3:45 pm
Add to Calendar20230601 3:45 pm20230601 4:30 pmAmerica/New_YorkCyber Inter-Agency Collaboration Panel
We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today. In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
3405 Lenox Road NE
Atlanta, Georgia 30326.
We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today. In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive RoundTable 4:30 pm
Add to Calendar20230601 4:30 pm20230601 4:50 pmAmerica/New_YorkCyber Executive RoundTable
Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun! It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region. We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
3405 Lenox Road NE
Atlanta, Georgia 30326.
Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun! It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region. We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
-
Conference Closing Session 5:10 pm
Add to Calendar20230601 5:10 pm20230601 5:20 pmAmerica/New_YorkConference Closing Session
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
3405 Lenox Road NE
Atlanta, Georgia 30326.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
-
Networking Reception and Happy Hour 5:15 pm
Add to Calendar20230601 5:15 pm20230601 6:15 pmAmerica/New_YorkNetworking Reception and Happy Hour
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
3405 Lenox Road NE
Atlanta, Georgia 30326CyberHub Podcast with James Azar: Live - Espresso Shots Podcast with James Azar
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Speaker:
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners