Atlanta Cybersecurity Conference

  • Conference

Don't wait for a breach to happen, take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Atlanta Cybersecurity Conference on 11/30/23.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

List of Hotels Around The Venue

thursday, November 30, 2023

08:00 AM to 06:00 PM

Venue:

COBB GALLERIA CENTRE

Two Galleria Parkway | Atlanta, Georgia 30339   770-955-8000

Get Directions

  • Days
  • hrs
  • min
  • sec

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.  

yellow-double-small-dot
Experience:

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 09:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:00 AM to 09:30 AM
The Rising Complexities of Software Supply Chain: A Proactive Approach to Security
General Sessions
Rahul Sasi
Founder & CEO at CloudSEK
Add to Calendar 11/30/2023 09:00 AM 11/30/2023 09:30 AM The Rising Complexities of Software Supply Chain: A Proactive Approach to Security

Join Rahul Sasi, Founder and CEO of CloudSEK, in a compelling session exploring the new frontiers of cybersecurity in our technology-driven business world. As enterprises integrate more deeply with third-party technologies, the digital supply chain becomes a critical focus for potential risks, from supplier vulnerabilities to data exposure. 

In this talk, Rahul, an internationally acclaimed cybersecurity expert, will guide you through effective strategies for identifying and mitigating supply chain risks, and establishing stronger governance over third-party partnerships. This session is essential for anyone eager to master the art of safeguarding their enterprise in a networked world where collaboration and security are equally vital. 

Rahul, a globally recognized cybersecurity expert, will share invaluable insights on proactive risk mitigation, establishing robust third-party governance, and real-world strategies to secure your software supply chain. This is a must-attend talk for anyone looking to navigate the intricate balance between innovation and security in today's interconnected digital landscape.

Join Rahul Sasi, Founder and CEO of CloudSEK, in a compelling session exploring the new frontiers of cybersecurity in our technology-driven business world. As enterprises integrate more deeply with third-party technologies, the digital supply chain becomes a critical focus for potential risks, from supplier vulnerabilities to data exposure. 

In this talk, Rahul, an internationally acclaimed cybersecurity expert, will guide you through effective strategies for identifying and mitigating supply chain risks, and establishing stronger governance over third-party partnerships. This session is essential for anyone eager to master the art of safeguarding their enterprise in a networked world where collaboration and security are equally vital. 

Rahul, a globally recognized cybersecurity expert, will share invaluable insights on proactive risk mitigation, establishing robust third-party governance, and real-world strategies to secure your software supply chain. This is a must-attend talk for anyone looking to navigate the intricate balance between innovation and security in today's interconnected digital landscape.

09:30 AM to 09:50 AM
Email Security Reinvented - Securing Cloud Email and Collaboration
General Sessions
Russell Barker
Senior Security Engineer at Check Point Software Technolgies
Add to Calendar 11/30/2023 09:30 AM 11/30/2023 09:50 AM Email Security Reinvented - Securing Cloud Email and Collaboration

As businesses rely more on email and collaboration tools to run their operations, cyber-criminals are finding new ways to compromise remote workforces. Harmony Email and Collaboration protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.

As businesses rely more on email and collaboration tools to run their operations, cyber-criminals are finding new ways to compromise remote workforces. Harmony Email and Collaboration protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.

09:50 AM to 10:20 AM
2023 Trends and Directions In Cybersecurity
General Sessions
event-simple-logo
Steve Mosley
VP of Sales at BitLyft
Ben Chappell
CEO, Apona Security
Anna Livingston
Solutions Architect at SecurityScorecard
Lisa Jones Huff
Senior Director of Global Security Specialists at Elastic
Aakash Mehta
Security Solutions Leader
Marshall Hall
Field Solutions Architect at DAI Source/TD SYNNEX
10:45 AM to 11:05 AM
KNOW WHAT YOU DON'T KNOW: Why Our Approach to Cybersecurity Eventually Fails and Leads to a Breach.
General Sessions
Ridge-IT-Cyber-Logos_Ridge-blue
Chad Koslow
CEO & Co-Founder
Add to Calendar 11/30/2023 10:45 AM 11/30/2023 11:05 AM KNOW WHAT YOU DON'T KNOW: Why Our Approach to Cybersecurity Eventually Fails and Leads to a Breach.

While this might seem like an ominous topic and raise some eyebrows, it's a critical conversation we must have in today's digital age.

We live in a world where cyberattacks have become an unfortunate reality. No organization, regardless of its size or industry, is immune to the ever-evolving threats that lurk in the digital shadows. The truth is, no matter how robust your cybersecurity measures may seem, they are not infallible. It's not a matter of if, but when, your cybersecurity will face its ultimate test.

The way to combat the ultimate failure of your cybersecurity defenses is to remain in a constant state of Cyber Readiness. We will cover what that means and how to get there from a state of legacy networks and security, as well as the importance of shifting your cybersecurity posture from a state of defense to offense, from continuous monitoring to continuous improvement.

Posture matters and we need to know what we don’t know. You will be shown the path to a proactive and offensive posture. You will rethink your strategy and embrace a more dynamic and adaptive approach to safeguarding digital infrastructure.

While this might seem like an ominous topic and raise some eyebrows, it's a critical conversation we must have in today's digital age.

We live in a world where cyberattacks have become an unfortunate reality. No organization, regardless of its size or industry, is immune to the ever-evolving threats that lurk in the digital shadows. The truth is, no matter how robust your cybersecurity measures may seem, they are not infallible. It's not a matter of if, but when, your cybersecurity will face its ultimate test.

The way to combat the ultimate failure of your cybersecurity defenses is to remain in a constant state of Cyber Readiness. We will cover what that means and how to get there from a state of legacy networks and security, as well as the importance of shifting your cybersecurity posture from a state of defense to offense, from continuous monitoring to continuous improvement.

Posture matters and we need to know what we don’t know. You will be shown the path to a proactive and offensive posture. You will rethink your strategy and embrace a more dynamic and adaptive approach to safeguarding digital infrastructure.

11:05 AM to 11:25 AM
Behave! Reducing cyber risk through user behavior change
General Sessions
Munya Hoto
Chief Customer and Marketing Officer at CybSafe
Add to Calendar 11/30/2023 11:05 AM 11/30/2023 11:25 AM Behave! Reducing cyber risk through user behavior change

SebDB is the world’s cyber security behavior database. 

It’s maintained by a global community of security professionals and academics. And it just got an upgrade! 

Join CybSafe’s Munya Hoto as he discusses how SebDB can be used to reduce human cyber risk, by mapping specific user security behaviors to risk outcomes. 

He’ll also cover the new and improved features of SebDB v3, including: 

  • New risk categories 
  • New behaviours added 
  • Sub-behaviours added 
  • UIDs added for easy tracking 
  • Refreshed descriptions

SebDB is the world’s cyber security behavior database. 

It’s maintained by a global community of security professionals and academics. And it just got an upgrade! 

Join CybSafe’s Munya Hoto as he discusses how SebDB can be used to reduce human cyber risk, by mapping specific user security behaviors to risk outcomes. 

He’ll also cover the new and improved features of SebDB v3, including: 

  • New risk categories 
  • New behaviours added 
  • Sub-behaviours added 
  • UIDs added for easy tracking 
  • Refreshed descriptions
11:25 AM to 11:55 AM
Guest Keynote Presentation: There Are No New Cyber Threats
General Sessions
kcecyber
E.J. Hilbert
Founder, KCE Cyber
Add to Calendar 11/30/2023 11:25 AM 11/30/2023 11:55 AM Guest Keynote Presentation: There Are No New Cyber Threats

Every time a public cyber attack occurs, the pundits, news and industry reps claim that that the attack is “new and unique.”  Poppycock.  There are no new cyber threats and haven’t been since 2004.  The only thing new is the vector of attack and in most cases even those aren’t new.  During this talk we will cover the 5 cyber threats and the 2 primary methodologies required to convert those threats into attacks.  My ascertain is based on my 25 years in the industry from being one the FBI’s pioneering cyber agents, why I left, and what I have learned in the varied roles I have played since then.

Every time a public cyber attack occurs, the pundits, news and industry reps claim that that the attack is “new and unique.”  Poppycock.  There are no new cyber threats and haven’t been since 2004.  The only thing new is the vector of attack and in most cases even those aren’t new.  During this talk we will cover the 5 cyber threats and the 2 primary methodologies required to convert those threats into attacks.  My ascertain is based on my 25 years in the industry from being one the FBI’s pioneering cyber agents, why I left, and what I have learned in the varied roles I have played since then.

12:00 PM to 12:30 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:30 PM to 12:50 PM
The coming AI compliance standards: what you need to know
General Sessions
Anthony Bolan
Chief Information Security Officer at Tangible Security
Add to Calendar 11/30/2023 12:30 PM 11/30/2023 12:50 PM The coming AI compliance standards: what you need to know

As the use of artificial intelligence (AI) technologies by organizations becomes more pervasive, regulatory and standards bodies are working to implement new compliance obligations that will eventually impact every IT department. This session will provide an overview of the emerging trends in AI compliance, including the NIST AI Risk Management Framework, and multiple ISO standards. 

Attendees will gain a better understanding of the common threads of new compliance obligations, the intent and perspectives driving them, what to expect in the coming years, and steps they can take now to help prepare their organizations.

As the use of artificial intelligence (AI) technologies by organizations becomes more pervasive, regulatory and standards bodies are working to implement new compliance obligations that will eventually impact every IT department. This session will provide an overview of the emerging trends in AI compliance, including the NIST AI Risk Management Framework, and multiple ISO standards. 

Attendees will gain a better understanding of the common threads of new compliance obligations, the intent and perspectives driving them, what to expect in the coming years, and steps they can take now to help prepare their organizations.

12:50 PM to 01:10 PM
The Backbone of Cyber Defense
General Sessions
Neil Ashworth
Sr. Solutions Architect, Security SME at Druva
Add to Calendar 11/30/2023 12:50 PM 11/30/2023 01:10 PM The Backbone of Cyber Defense

Everybody thinks they have a robust data protection strategy, until it’s put to the test by a ransomware attack. Bad actors with compromised credentials not only exfiltrate data but compromise key IT systems like data protection and business applications to gain greater leverage.

You can turn the tables on bad actors by making data protection the backbone of your cyber defense strategy. During this session, learn what it takes to defend against a ransomware incident, the steps taken by real-world victims of ransomware to respond to attacks, and how a cloud-based data protection strategy can better serve organizations in the hour of their greatest need.

Everybody thinks they have a robust data protection strategy, until it’s put to the test by a ransomware attack. Bad actors with compromised credentials not only exfiltrate data but compromise key IT systems like data protection and business applications to gain greater leverage.

You can turn the tables on bad actors by making data protection the backbone of your cyber defense strategy. During this session, learn what it takes to defend against a ransomware incident, the steps taken by real-world victims of ransomware to respond to attacks, and how a cloud-based data protection strategy can better serve organizations in the hour of their greatest need.

01:35 PM to 01:55 PM
Early Warnings to Detect Ransomware Attacks
General Sessions
Matt Saglam
Engagement Manager, North America at SOCRadar
Add to Calendar 11/30/2023 01:35 PM 11/30/2023 01:55 PM Early Warnings to Detect Ransomware Attacks

Learn how to monitor for and detect ransomware attacks in the early stages of the cyber kill chain when threat actors conduct recon and devise weaponization in order to extort your organization.

Learn how to monitor for and detect ransomware attacks in the early stages of the cyber kill chain when threat actors conduct recon and devise weaponization in order to extort your organization.

01:55 PM to 02:15 PM
BYOD - Data Security vs End-User Privacy - Solved!
General Sessions
Brian Egenrieder
Chief Revenue Officer at SyncDog
Add to Calendar 06/02/2023 01:55 PM 06/02/2023 02:15 PM America/Los_Angeles BYOD - Data Security vs End-User Privacy - Solved!

Data Security: 

Securing the corporate data that the end-user is accessing on the device to make sure that it cannot be compromised by malicious malware 

End-user Privacy: 

the employee loses all privacy because a management profile is required to run the MDM/EMM solution 

Solution - SyncDog: 

SyncDog provides a secure encrypted environment that separates corporate data from personal data on the device - No Management Profile required on the device

Location of the event

Data Security: 

Securing the corporate data that the end-user is accessing on the device to make sure that it cannot be compromised by malicious malware 

End-user Privacy: 

the employee loses all privacy because a management profile is required to run the MDM/EMM solution 

Solution - SyncDog: 

SyncDog provides a secure encrypted environment that separates corporate data from personal data on the device - No Management Profile required on the device

02:15 PM to 02:55 PM
Keynote Presentation: Making sense of Geopolitical Risks in 2024 – Impact on Cybersecurity & Compliance
General Sessions
vigitrust
Mathieu Gorge
CEO, Vigitrust
Add to Calendar 11/30/2023 02:15 PM 11/30/2023 02:55 PM Keynote Presentation: Making sense of Geopolitical Risks in 2024 – Impact on Cybersecurity & Compliance

There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2023 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2024 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes? 

There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2023 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2024 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes? 

03:20 PM to 03:50 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
MODERATOR - Julius 'Jay' Gamble
Regional Director, - Region 4 (AL, FL, GA, KY, MS, NC, SC, TN) at CISA
Kasey Crump
Special Agent at Department of Homeland Security
Joseph Zadik
Supervisory Special Agent at FBI Atlanta
Robert Glore
Special Agent at United States Secret Service
Joshua Reed
Network Intrusion Forensic Analyst (NIFA) at United States Secret Service
Zachary Bulliner
Assistant to the Special Agent in Charge (ATSAIC) at United States Secret Service
04:00 PM to 04:30 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
MODERATOR - Tamika Bass
Cybersecurity Director at Gannett Fleming
Jude Fils-Aimé
Managing Partner, Enterprise Security at Verizon
Jason Hargis
CISO at EIS Inc.
Michael F. D. Anaya
Global Director of Attribution at Palo Alto Networks
Avishai Avivi
CISO at SafeBreach
Irene Thong
CIO - Senior Director, IT and Project Management at Printpack
Chris Bullock
vCISO at Converge
04:30 PM to 05:30 PM
Networking Reception Sponsored by UnderDefense & Signed Books
Solutions Showcase
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.
Also receive a free signed copy of Mathieu Gorge's book "The Cyber Elephant in the Boardroom"

Gold Partners

Silver Partners

  • checkpoint
  • CYBSAFE-teal_logo-main-high_res
  • Druva_Logo
  • ridge
  • SOCRadar_Logo_New_Light
  • SyncDog_Logo
  • Tangible-Security-logo-Secondary-Stacked-Gradient-Large-1718x508-1

Bronze Partners

Exhibiting Partners

  • ArmorCode
  • Array-Networks-Logo-1200x675
  • Blackcloak
  • concentric-ai
  • Cososys
  • Libraesva_logo_RGB-208x30-1
  • Logo-redis.svg
  • Threatlocker
  • trustcloud-logo1
  • underdefense

Affiliate Partners

  • AFCEA-Logo
  • ChickTech
  • ISACA-Atlanta-logo
  • ISC2-ATL-logo-e1634581114534
  • UYOA logo-2

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.