Atlanta Cybersecurity Conference

  • Conference

Join forces with fellow cybersecurity professionals at the Atlanta Cybersecurity Conference, a hub for acquiring invaluable insights to expertly navigate the evolving landscape of cyber threats in 2024. Immerse yourself in the expertise of industry mavens and influential leaders while engaging with representatives from top-tier global providers of cybersecurity solutions.

The Atlanta Cybersecurity Conference offers a prime opportunity for direct connections with peers and industry specialists. Engaging discussions will span diverse topics, encompassing emerging cybersecurity challenges and strategies designed to fortify your organization against advanced threat actors.

Explore the comprehensive array of offerings tailored for the Atlanta Cybersecurity Conference through Data Connectors, available right here!

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
07:30 AM to 08:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:00 AM to 09:30 AM
Training Workshop: Secure Your Organization Today! Key Security Settings that Every Organization Needs to Verify ASAP!
Solutions Showcase
Nanitor@DerekMelber
Derek Melber
Chief Strategist at Nanitor
Add to Calendar 04/11/2024 08:00 AM 04/11/2024 09:30 AM America/Los_Angeles Training Workshop: Secure Your Organization Today! Key Security Settings that Every Organization Needs to Verify ASAP!

Security must improve to protect our enterprises. The old-way of buying “point security solutions” is not working, as these solutions are not integrated, don’t correlate, use different risk scoring, etc. The new and improved method of securing an enterprise is to use a unified and continuous threat exposure management solution, which solves the issues that plague organizations trying to work with their disparate solutions. In this workshop, 19X Microsoft MVP Derek Melber will guide you through the specifics of what a typical exposure management platform includes, focusing on the details so you can immediately update your existing solutions. The workshop will show you how to verify existing security settings, using scripts and PowerShell, to verify that your current solutions are not functioning the way you would expect. This exposure to the reality of your existing security will be eye-opening and become the foundation for moving to a unified exposure management platform! Come prepared to learn a ton, have a list of action items to perform when you get back to the office, and overall learn about:

  • What security settings you need to verify today, to ensure you are secure TODAY!
  • How you alter your security mindset to secure your network from attacks
  • What is included in a unified continuous threat exposure management platform
  • What should you look for in a unified CTEM platform

This workshop will be “demo driven” and “action item driven”. Meaning, you will see the scripts and PowerShell commands in action, live (No pathetic recordings!). You will have explanations of each and every setting discussed, so you know the “why” of what you need to verify. 

Location of the event

Security must improve to protect our enterprises. The old-way of buying “point security solutions” is not working, as these solutions are not integrated, don’t correlate, use different risk scoring, etc. The new and improved method of securing an enterprise is to use a unified and continuous threat exposure management solution, which solves the issues that plague organizations trying to work with their disparate solutions. In this workshop, 19X Microsoft MVP Derek Melber will guide you through the specifics of what a typical exposure management platform includes, focusing on the details so you can immediately update your existing solutions. The workshop will show you how to verify existing security settings, using scripts and PowerShell, to verify that your current solutions are not functioning the way you would expect. This exposure to the reality of your existing security will be eye-opening and become the foundation for moving to a unified exposure management platform! Come prepared to learn a ton, have a list of action items to perform when you get back to the office, and overall learn about:

  • What security settings you need to verify today, to ensure you are secure TODAY!
  • How you alter your security mindset to secure your network from attacks
  • What is included in a unified continuous threat exposure management platform
  • What should you look for in a unified CTEM platform

This workshop will be “demo driven” and “action item driven”. Meaning, you will see the scripts and PowerShell commands in action, live (No pathetic recordings!). You will have explanations of each and every setting discussed, so you know the “why” of what you need to verify. 

09:45 AM to 10:15 AM
Ultimate Prevention of File-Based Malware Threats
General Sessions
David Gordon
Vice President, Americas at Resec
Add to Calendar 04/11/2024 09:45 AM 04/11/2024 10:15 AM Ultimate Prevention of File-Based Malware Threats
10:15 AM to 10:45 AM
Is AI Really the Key To Early Threat Detection? How Would You Prevent the $100M+ MGM Attack of 2023?
General Sessions
Tom Ertel
SEVP, Technical Sales & Strategic Accounts at Seceon
Add to Calendar 04/11/2024 10:15 AM 04/11/2024 10:45 AM Is AI Really the Key To Early Threat Detection? How Would You Prevent the $100M+ MGM Attack of 2023?

AI might be all the hype for consumers and “Business Transformation “experts” but we security professionals know that AI and ML is not just an arms race but perhaps the essential ingredient in your stack to stay ahead of the next attack. 


In this talk Tom Ertel, SEVP, Technical Sales & Strategic Accounts at Seceon, shares an anatomy of the MGM attack of September 2023. He will dig in and share the details of the attackers techniques and tactics. You’ll see how by combining social engineering, tools, 3rd party applications all failed what MGM thought was sophisticated reconnaissance.

You will learn: 

  • AI vs. AI - How to determine real AI vs. a “veneer of AI” and LLMs vs. AI in the cybersecurity threat detection context.
  • Why tools and time work against most teams.
  • The most common failure point - people - how AI can break through biases and be a valuable indicator of behaviour.

AI might be all the hype for consumers and “Business Transformation “experts” but we security professionals know that AI and ML is not just an arms race but perhaps the essential ingredient in your stack to stay ahead of the next attack. 


In this talk Tom Ertel, SEVP, Technical Sales & Strategic Accounts at Seceon, shares an anatomy of the MGM attack of September 2023. He will dig in and share the details of the attackers techniques and tactics. You’ll see how by combining social engineering, tools, 3rd party applications all failed what MGM thought was sophisticated reconnaissance.

You will learn: 

  • AI vs. AI - How to determine real AI vs. a “veneer of AI” and LLMs vs. AI in the cybersecurity threat detection context.
  • Why tools and time work against most teams.
  • The most common failure point - people - how AI can break through biases and be a valuable indicator of behaviour.
10:45 AM to 11:15 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
MODERATOR - Tim Swope
Interim CISO at UChicago Medicine
Brandon Hatfield
Security Specialist at Infoblox
Jeremy Powell
CTO at Zyston LLC
Mike Sci
Cyber Security Sales Engineer at Adlumin
Carter LaBrecque
NA - GTM Director at Aryaka Networks
Roger Neal
Head of Product at Apona
11:30 AM to 12:00 PM
From Cloud Chaos to Confidence: Secure Your Infrastructure with Cutting-Edge DevSecOps
General Sessions
Matthew Sweeney
Chief Product Officer and Co-Founder at Gomboc.ai
Add to Calendar 04/11/2024 11:30 AM 04/11/2024 12:00 PM From Cloud Chaos to Confidence: Secure Your Infrastructure with Cutting-Edge DevSecOps

Is your cloud deployment a time bomb? Discover how DevSecOps is evolving to eradicate application misconfigurations before they trigger a devastating breach. Learn best practices and see a real-world case study that exposes the hidden risks in your open-source IaC. The future of secure development is here – are you ready?

Is your cloud deployment a time bomb? Discover how DevSecOps is evolving to eradicate application misconfigurations before they trigger a devastating breach. Learn best practices and see a real-world case study that exposes the hidden risks in your open-source IaC. The future of secure development is here – are you ready?

12:00 PM to 12:30 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
MODERATOR - Stanton Gatewood
Cyber Security Coordinator - Region IV (Georgia) at Cybersecurity and Infrastructure Security Agency
Julius "Jay" Gamble
Regional Director, Region 4 at CISA
Kasey Crump
Special Agent at Homeland Security Investigations
Joe Zadik
Supervisory Special Agent, FBI Atlanta
Zach Bullinar
Assistant to the Special Agent-in-Charge at USSS
Robert 'Dean' Glore
Special Agent at Department of Homeland Security
Andrew Grentz
Special Agent at Homeland Security Investigations
12:45 PM to 01:15 PM
Lunch Break w/ Searchlight Cyber: Shifting Left: Dark Web CTI & The Importance of an Intelligence Led Cyber Program
Solutions Showcase
Evan Blair
General Manager, North America at Searchlight Cyber
Add to Calendar 04/11/2024 12:45 PM 04/11/2024 01:15 PM Lunch Break w/ Searchlight Cyber: Shifting Left: Dark Web CTI & The Importance of an Intelligence Led Cyber Program

Becoming an intelligence-driven security organization is key to defending against the volume and veracity of modern cyber actors: In this presentation we'll dig into the Dark Web, in particular the cybercriminal underground, to explore real-world examples of how dark web threat intelligence can be used to stop breaches before they even happen.

Becoming an intelligence-driven security organization is key to defending against the volume and veracity of modern cyber actors: In this presentation we'll dig into the Dark Web, in particular the cybercriminal underground, to explore real-world examples of how dark web threat intelligence can be used to stop breaches before they even happen.

01:35 PM to 01:55 PM
Anatomy of the Modern Day CISO
General Sessions
Jeremy Hopwood
CEO at 5iron Cyber Security Operations
Add to Calendar 04/11/2024 01:35 PM 04/11/2024 01:55 PM Anatomy of the Modern Day CISO

Navigating the challenges and requirements facing a CISO in today's complex business environment.

Navigating the challenges and requirements facing a CISO in today's complex business environment.

01:55 PM to 02:15 PM
The Key Note About Leadership with Key Notes of Source Code Security
General Sessions
Ben Chappell
CEO at Apona Security
Add to Calendar 04/11/2024 01:55 PM 04/11/2024 02:15 PM The Key Note About Leadership with Key Notes of Source Code Security

This educational key note will offer leadership training and techniques to more effectively manage teams. This methodology will offer insight into holistic security practices and help to develop self awareness.

This educational key note will offer leadership training and techniques to more effectively manage teams. This methodology will offer insight into holistic security practices and help to develop self awareness.

02:15 PM to 02:45 PM
Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power
General Sessions
event-simple-logo
Ed Adams
President & CEO of Security Innovation
Add to Calendar 04/11/2024 02:15 PM 04/11/2024 02:45 PM Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams



In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams



02:45 PM to 03:00 PM
Book Signing / Ed Adams: See Yourself in Cyber
General Session
See Yourself in Cyber
Ed Adams
President & CEO of Security Innovation
Add to Calendar 04/11/2024 02:45 PM 04/11/2024 03:00 PM America/Los_Angeles Book Signing / Ed Adams: See Yourself in Cyber

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

Location of the event

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

03:05 PM to 03:25 PM
Fighting Threats with Great Fundamentals - Network Security
General Sessions
Carter LeBrecque
NA - GTM Director at Aryaka
Add to Calendar 04/11/2024 03:05 PM 04/11/2024 03:25 PM Fighting Threats with Great Fundamentals - Network Security

Addressing the role Infosec teams take as protective parent to their organization and the importance of sticking to security fundamentals.

Addressing the role Infosec teams take as protective parent to their organization and the importance of sticking to security fundamentals.

03:25 PM to 03:45 PM
Data Resilience Best Practices in a Ransomware World!
General Sessions
Shawn Massey
Vice President Sales, Americas at Arcserve LLC
Add to Calendar 04/11/2024 03:25 PM 04/11/2024 03:45 PM Data Resilience Best Practices in a Ransomware World!

Data protection is not enough. Data resilience planning and design are necessary in the Ransomware world we currently live.

Data protection is not enough. Data resilience planning and design are necessary in the Ransomware world we currently live.

03:45 PM to 04:05 PM
INFLUENCE MASTERY: Expanding the Impact of InfoSec Leaders & Teams
General Sessions
Shawn Clark
InfoSec THRIVE - Communication & Influence Coach at Atlanta Challenge
Add to Calendar 04/11/2024 03:45 PM 04/11/2024 04:05 PM INFLUENCE MASTERY: Expanding the Impact of InfoSec Leaders & Teams

All too often, InfoSec leaders are in an uphill battle, armed with inadequate budgets and understaffed teams. They also must contend with stressed-out staff, and stakeholders resisting their efforts and excluding them from pivotal discussions. Fighting off external threats while struggling with these internal challenges is stressful and perilous. It increases risk to the organization, causes burnout on the team, and limits opportunities for advancement.In this talk, we will share essential strategies for getting your message heard and understood so you can gain the resources, compliance, and respect you and your team need to be able to thrive.

All too often, InfoSec leaders are in an uphill battle, armed with inadequate budgets and understaffed teams. They also must contend with stressed-out staff, and stakeholders resisting their efforts and excluding them from pivotal discussions. Fighting off external threats while struggling with these internal challenges is stressful and perilous. It increases risk to the organization, causes burnout on the team, and limits opportunities for advancement.In this talk, we will share essential strategies for getting your message heard and understood so you can gain the resources, compliance, and respect you and your team need to be able to thrive.

04:20 PM to 04:50 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Michael F.D. Anaya
Global Director of Attribution at Palo Alto Networks
Joye Purser, PhD
Global Field CISO at Veritas Technologies
Paul Farley
CISO at NCR Voyix
MIchelle Stewart
CISO at Safe-Guard Products
Tamika Bass
Cybersecurity Director at Gannett Fleming
Dane Bamburry
Senior Director, Enterprise Architecture at Cox Enterprises
04:50 PM to 06:00 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.