Registration

Thu. Jun 01

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $150.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, June 1st.

  • Welcome to the Atlanta Cybersecurity Conference
  • Welcome / Introductions
  • What's Old is New Again 9:00 am
    Add to Calendar20230601 9:00 am20230601 9:20 amAmerica/New_YorkWhat's Old is New Again

    Secureworks CTU researchers have seen a steady increase in sophisticated and destructive threat actors accessing networks through web drive-by downloads. This venerable threat class is no longer the exclusive domain of tech support scams and adware, instead becoming a leading entry point for large-scale ransomware attacks. We will survey the threat groups responsible for the more prolific drive-by download networks, how they work, and what network defenders can expect after exploitation.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by SecureWorks

    Secureworks CTU researchers have seen a steady increase in sophisticated and destructive threat actors accessing networks through web drive-by downloads. This venerable threat class is no longer the exclusive domain of tech support scams and adware, instead becoming a leading entry point for large-scale ransomware attacks. We will survey the threat groups responsible for the more prolific drive-by download networks, how they work, and what network defenders can expect after exploitation.

    Click to Expand

    Speaker:

    Keith Jarvis
    Keith Jarvis

    Keith Jarvis

    Senior Security Researcher-Counter Threat Unit at Secureworks

    Collapse This Item

  • Automating Cyber Risk Prioritization 9:30 am
    Add to Calendar20230601 9:30 am20230601 9:50 amAmerica/New_YorkAutomating Cyber Risk Prioritization

    With increasing threats, challenging economic environments, budget limitations, and cyber talent shortages, how can security leaders efficiently manage cyber risk at scale?   

    This session discusses opportunities for identifying, automating, and prioritizing cyber risk throughout an organization’s attack surface, including third parties.

    • What opportunities are there for automating the identification of the most impactful threats amongst the noise in the vast amounts of vulnerability and threat data?   
    • Incorporating context to the likelihood of threat scenarios and the impact to organizations goes beyond traditional CVSS-based vulnerability ranking.
    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by FortifyData

    With increasing threats, challenging economic environments, budget limitations, and cyber talent shortages, how can security leaders efficiently manage cyber risk at scale?   

    This session discusses opportunities for identifying, automating, and prioritizing cyber risk throughout an organization’s attack surface, including third parties.

    • What opportunities are there for automating the identification of the most impactful threats amongst the noise in the vast amounts of vulnerability and threat data?   
    • Incorporating context to the likelihood of threat scenarios and the impact to organizations goes beyond traditional CVSS-based vulnerability ranking.
    Click to Expand

    Speaker:

    Eric Smith
    Eric Smith

    Eric Smith

    Director of Technical Services Delivery, Fortify Data

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am
    Add to Calendar20230601 10:10 am20230601 10:30 amAmerica/New_YorkProtecting Against Cyber Attacks

    For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day. Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day. Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.

    Click to Expand

    Panel Participants:

    Justin Scarpaci
    Justin Scarpaci

    Justin Scarpaci

    Technical Strategist at Sevco Security

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Kevin Jordan
    Kevin Jordan

    Kevin Jordan

    Account Executive at SolCyber

    Kevin Baranowski
    Kevin Baranowski

    Kevin Baranowski

    Head of Global Channels at Accedian

    Collapse This Item

  • OT Security Engineering 10:50 am
    Add to Calendar20230601 10:50 am20230601 11:10 amAmerica/New_YorkOT Security Engineering

    The engineering profession has powerful tools available to address cyber risks to physical operations, tools that have no counterparts in classic IT security, frameworks or standards. The new US DOE Cyber-Informed Engineering Strategy is working to capture this body of knowledge so that these powerful tools can be applied routinely, in addition to classic IT security mechanisms. In this presentation we summarize the CIE strategy and dig into examples of these techniques in safety engineering, automation engineering and network engineering.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by Waterfall Security Solutions

    The engineering profession has powerful tools available to address cyber risks to physical operations, tools that have no counterparts in classic IT security, frameworks or standards. The new US DOE Cyber-Informed Engineering Strategy is working to capture this body of knowledge so that these powerful tools can be applied routinely, in addition to classic IT security mechanisms. In this presentation we summarize the CIE strategy and dig into examples of these techniques in safety engineering, automation engineering and network engineering.

    Click to Expand

    Speaker:

    Andrew Ginter
    Andrew Ginter

    Andrew Ginter

    VP Industrial Security at Waterfall Security Solutions

    Collapse This Item

  • Risky Links - It is More Than Just Email 11:10 am
    Add to Calendar20230601 11:10 am20230601 11:30 amAmerica/New_YorkRisky Links - It is More Than Just Email

    Risky links are coming our way from a variety of places: Slack, LinkedIn, SMS – it’s almost impossible to keep track of them all. In fact, it may just be. The good news is that links are mostly opened in the browser. By isolating risky links when they are opened, ConcealBrowse prevents your organization and you from being infected with malware.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by Conceal

    Risky links are coming our way from a variety of places: Slack, LinkedIn, SMS – it’s almost impossible to keep track of them all. In fact, it may just be. The good news is that links are mostly opened in the browser. By isolating risky links when they are opened, ConcealBrowse prevents your organization and you from being infected with malware.

    Click to Expand

    Speaker:

    Tim Savage
    Tim Savage

    Tim Savage

    Top of Funnel Optimizer at Conceal

    Collapse This Item

  • 2023 Trends & Directions 11:30 am
    Add to Calendar20230601 11:30 am20230601 11:55 amAmerica/New_York2023 Trends & Directions

    As we’re getting closer to the halfway point of 2023, it’s clear that cybercriminals are still coming up with new, more complex ways to cash in.  During this panel discussion, you’ll get insights on the latest trends from these experts who live on the leading edge of cybersecurity technology. You’ll hear about some of the newest tactics for defending against unprecedented attacks. 

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    As we’re getting closer to the halfway point of 2023, it’s clear that cybercriminals are still coming up with new, more complex ways to cash in.  During this panel discussion, you’ll get insights on the latest trends from these experts who live on the leading edge of cybersecurity technology. You’ll hear about some of the newest tactics for defending against unprecedented attacks. 

    Click to Expand

    Panel Participants:

    Travis Howerton
    Travis Howerton

    Travis Howerton

    Co-Founder and Chief Technology Officer (CTO) at RegScale

    Ryan DeMarco
    Ryan DeMarco

    Ryan DeMarco

    Director at Glasswall Solutions

    Alex Tomsheck
    Alex Tomsheck

    Alex Tomsheck

    Account Executive at LogicGate, Inc.

    Jordan Gackowski
    Jordan Gackowski

    Jordan Gackowski

    Sales Engineer Team Lead at Adlumin

    Collapse This Item

  • Lunch Break
  • Lunch Demo: Sponsored by OpenText Security Solutions 12:25 pm
    Add to Calendar20230601 12:25 pm20230601 12:45 pmAmerica/New_YorkLunch Demo: Sponsored by OpenText Security Solutions3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by OpenText Security Solutions

    Collapse This Item

  • Keynote Presentation: Mathieu Gorge 12:35 pm
    Add to Calendar20230601 12:35 pm20230601 1:15 pmAmerica/New_YorkKeynote Presentation: Mathieu Gorge

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Making sense of Geopoltical Risks in 2023 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books by Keynote Speaker Mathieu Gorge 12:55 pm
    Add to Calendar20230601 12:55 pm20230601 1:15 pmAmerica/New_YorkSigned Books by Keynote Speaker Mathieu Gorge3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now. 1:35 pm
    Add to Calendar20230601 1:35 pm20230601 1:50 pmAmerica/New_YorkCyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now.

    What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

    The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

    Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by Ridge IT Cyber

    What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

    The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

    Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

    Click to Expand

    Speaker:

    Chad Koslow
    Chad Koslow

    Chad Koslow

    CEO and Co-Founder at Ridge IT Cyber

    Collapse This Item

  • AI and Zero Trust : The inevitable enrichments of SIEM and IAM 1:55 pm
    Add to Calendar20230601 1:55 pm20230601 2:15 pmAmerica/New_YorkAI and Zero Trust : The inevitable enrichments of SIEM and IAM

    Topics to be covered in the presentation on AI and Zero Trust:

    1. Fundamentals of log management.
    2. IAM – Concepts and why Zero Trust is inevitable in IAM. 
    3. Effortless configuration and management of logs from different sources.
    4. UBA and UEBA – How is it achieved ?
    5. Threats and attacks – Detection and converting them into actionable items using workflows.
    6. Reporting on crucial security events and searching through logs.
    7. Getting beyond the compliance mandates. 
    8. Managing and responding to incidents.
    9. Discovering attack patterns with default and custom correlation rules.

     

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by Manage Engine

    Topics to be covered in the presentation on AI and Zero Trust:

    1. Fundamentals of log management.
    2. IAM – Concepts and why Zero Trust is inevitable in IAM. 
    3. Effortless configuration and management of logs from different sources.
    4. UBA and UEBA – How is it achieved ?
    5. Threats and attacks – Detection and converting them into actionable items using workflows.
    6. Reporting on crucial security events and searching through logs.
    7. Getting beyond the compliance mandates. 
    8. Managing and responding to incidents.
    9. Discovering attack patterns with default and custom correlation rules.

     

    Click to Expand

    Speaker:

    Anandh Palanisamy
    Anandh Palanisamy

    Anandh Palanisamy

    Senior Technology Evangelist for the ADSolutions Team at ManageEngine

    Collapse This Item

  • Why Small and Mid-Size Businesses Need XDR for Security 2:35 pm
    Add to Calendar20230601 2:35 pm20230601 2:55 pmAmerica/New_York Why Small and Mid-Size Businesses Need XDR for Security

    Small and medium-sized businesses (SMBs) are often targeted by attackers due to their limited resources, making them vulnerable. While many cybersecurity solutions are too expensive and demanding for smaller budgets, there are surprisingly cost-effective XDRs available. SMBs may need to look for solutions that automate processes, and reduce detection and remediation times without burdening IT and security teams that are already stretched thin. 

    Discover how XDR can enhance your cybersecurity defenses while remaining within your budget.

    Join us for an informative discussion where you’ll explore: 

    • Understanding the different types of XDR platforms (e.g., open vs. native XDR) 
    • Key features SMBs should consider in an XDR solution 
    • Strategies for maintaining protection without round-the-clock resources 

    This engaging talk encourages audience participation and welcomes questions. Don’t miss out on the opportunity to gain insights from Amanda Berlin, Blumira’s Lead Incident Detection Engineer.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    Presented by Blumira

    Small and medium-sized businesses (SMBs) are often targeted by attackers due to their limited resources, making them vulnerable. While many cybersecurity solutions are too expensive and demanding for smaller budgets, there are surprisingly cost-effective XDRs available. SMBs may need to look for solutions that automate processes, and reduce detection and remediation times without burdening IT and security teams that are already stretched thin. 

    Discover how XDR can enhance your cybersecurity defenses while remaining within your budget.

    Join us for an informative discussion where you’ll explore: 

    • Understanding the different types of XDR platforms (e.g., open vs. native XDR) 
    • Key features SMBs should consider in an XDR solution 
    • Strategies for maintaining protection without round-the-clock resources 

    This engaging talk encourages audience participation and welcomes questions. Don’t miss out on the opportunity to gain insights from Amanda Berlin, Blumira’s Lead Incident Detection Engineer.

    Click to Expand

    Speaker:

    Amanda Berlin
    Amanda Berlin

    Amanda Berlin

    Lead Incident Detection Engineer at Blumira

    Collapse This Item

  • Guest Keynote Presentation: Travis Howerton 2:55 pm
    Add to Calendar20230601 2:55 pm20230601 3:25 pmAmerica/New_YorkGuest Keynote Presentation: Travis Howerton

    With the rise of DevSecOps, Continuous Integration (CI) and Continuous Delivery (CD) are changing the world of software development. Applications are increasingly shipped in containers and deployed with automation that has greatly increased velocity for new capabilities and improved IT’s ability to support the business. At the same time, Zero Trust is gaining momentum as CISOs push for architectures that have strong isolation, minimal dependencies, and high assurance of user identity. One side is moving at light speed while the other side is looking to slow down, re-architect, and build a more secure environment. At times, the goals of these movements can feel at odds with one another. This talk will cover the need for the RegOps movement and bringing the principles of DevOps to Compliance. In many cases, the reason CISO’s have Zero Trust is because IT provides them with zero assurance on how software is built and how the environment runs. The talk will cover the RegOps manifesto and the principles of the movement, it will discuss the industry trends driving the need for RegOps, and it will provide tips on a practical roadmap to get started with your RegOps initiatives.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    CI/CD Was Just the Beginning – Continuous Assurance (CA) and RegOps are Next

    With the rise of DevSecOps, Continuous Integration (CI) and Continuous Delivery (CD) are changing the world of software development. Applications are increasingly shipped in containers and deployed with automation that has greatly increased velocity for new capabilities and improved IT’s ability to support the business. At the same time, Zero Trust is gaining momentum as CISOs push for architectures that have strong isolation, minimal dependencies, and high assurance of user identity. One side is moving at light speed while the other side is looking to slow down, re-architect, and build a more secure environment. At times, the goals of these movements can feel at odds with one another. This talk will cover the need for the RegOps movement and bringing the principles of DevOps to Compliance. In many cases, the reason CISO’s have Zero Trust is because IT provides them with zero assurance on how software is built and how the environment runs. The talk will cover the RegOps manifesto and the principles of the movement, it will discuss the industry trends driving the need for RegOps, and it will provide tips on a practical roadmap to get started with your RegOps initiatives.

    Click to Expand

    Speaker:

    Travis Howerton
    Travis Howerton

    Travis Howerton

    Co-Founder and Chief Technology Officer (CTO) at RegScale

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:45 pm
    Add to Calendar20230601 3:45 pm20230601 4:30 pmAmerica/New_YorkCyber Inter-Agency Collaboration Panel

    We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today. In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.

     

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today. In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.

     

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Chad Hunt
    Chad Hunt

    Chad Hunt

    Supervisory Special Agent at FBI, Atlanta Field Office

    Dean Glore
    Dean Glore

    Dean Glore

    Special Agent, USSS

    Josh Reed
    Josh Reed

    Josh Reed

    Network Intrusion Forensic Analyst at United States Secret Service

    Jay Gamble
    Jay Gamble

    Jay Gamble

    Regional Director, Region 4 at Department of Homeland Security

    Collapse This Item

  • Cyber Executive RoundTable 4:30 pm
    Add to Calendar20230601 4:30 pm20230601 4:50 pmAmerica/New_YorkCyber Executive RoundTable

    Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun! It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region. We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

     

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun! It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region. We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

     

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Global Director of Attribution at Palo Alto Networks

    Panel Participants:

    Tamika Bass
    Tamika Bass

    Tamika Bass

    Cybersecurity Technology Director at Gannett Fleming

    Travis Howerton
    Travis Howerton

    Travis Howerton

    Co-Founder and Chief Technology Officer (CTO) at RegScale

    Jude Fils-Aime
    Jude Fils-Aime

    Jude Fils-Aime

    Sr. Managing Partner, Enterprise Security at Verizon

    James Azar
    James Azar

    James Azar

    CyberHub Podcaster

    Collapse This Item

  • Conference Closing Session 5:10 pm
    Add to Calendar20230601 5:10 pm20230601 5:20 pmAmerica/New_YorkConference Closing Session

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Collapse This Item

  • Networking Reception and Happy Hour 5:15 pm
    Add to Calendar20230601 5:15 pm20230601 6:15 pmAmerica/New_YorkNetworking Reception and Happy Hour

    The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

    CyberHub Podcast on Amazon

    CyberHub Podcast on Apple

    3405 Lenox Road NE
    Atlanta, Georgia 30326

    CyberHub Podcast with James Azar: Live - Espresso Shots Podcast with James Azar

    The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

    CyberHub Podcast on Amazon

    CyberHub Podcast on Apple

    Click to Expand

    Speaker:

    James Azar
    James Azar

    James Azar

    CyberHub Podcaster

    Collapse This Item

Partners Register