Loading Events

« All Events

Atlanta (Cybersecurity)

February 7 @ 8:00 am - 5:15 pm

Event Navigation

Details

Date:
February 7
Time:
8:00 am - 5:15 pm
Event Category:

Venue

Cobb Galleria Centre
2 Galleria Pkwy SE
Atlanta,GA30339United States  + Google Map
Phone:
770-955-8000
Website:
https://web.archive.org/web/20141002082033/http://cobbgalleria.com/index.aspx

Overview

The Atlanta Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:30amSession One

Vasanth Balakrishnan
Senior Identity Systems Engineer

Business-Driven Security, Identity and the New Age of Risk

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.

Speaker’s Bio:

Vasanth Balakrishnan is a Senior Identity Systems Engineer with RSA Security, based in Houston. He has been with RSA 7 years with most of that time as a subject matter expert on the RSA SecurID Authentication Manager multi-factor authentication solution, involved in several large enterprise deployments of up to 100K users. He is an active member local cyber security groups such as InfraGard Houston and Control System Cyber Security Association International known as (CS)2AI.

 

9:30am - 10:00amSession Two
10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:00amSession Three
11:00am - 11:30amSession Four
11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Matt Close
Vice President of Sales

Network 3.0:  Networking of only trusted identities

While Networking 1.0 was about networking all PCs and giving users access to the Internet, the current era of Networking 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Networking 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere, without worry.

Speaker’s Bio:

Matt Close is the Vice President of Sales at Tempered Networks. Matt has over 20 years of Sales Leadership experience, most recently at Altify (formerly The TAS Group). At Altify, Matt was EVP of Sales as the SaaS company grew from a small start up to a Platinum Partner of Salesforce. Prior to Altify, Matt has held sales leadership positions at The Coca-Cola Company and OC Tanner. Matt holds a BA in History from UC, Irvine and an MBA from Azusa Pacific University.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six
1:15pm - 1:45pmSession Seven

Nate Brown
Solutions Engineer

Does Your Time to First Byte Bite?

Download the Presentation

1:45pm - 2:00pmBreak/ Vendor Booth Time
2:00pm - 2:30pmSession Eight

Brad Armstrong
Regional Sales Manager

The Top 5 Wi-Fi Security Mistakes 

Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
2:30pm -3:00pmSession Nine
3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Doug Laughlin
Senior Account Executive

Secure Your Cloud Email and Applications in Minutes with Best-of-Breed Vendors

Users have been evolving to the cloud for everything from Office 365 mail/suite and Google mail/suite to more traditional cloud apps like SFDC, ServiceNow, file-sharing services, and even the IaaS guys like AWS and Azure.  With this comes the inherent risk of not being able to use your trusted on-premise security tools to manage your data.  Avanan, unlike the legacy vendors in the email protection and CASB space, does not rely on complicated rerouting of users and traffic to proxy inspection engines in the cloud.  Hear how full presence within the cloud data can be accessed in minutes via API’s and secured with 60+ world-class and trusted vendors ranging from Check Point to Palo Alto, FireEye, Cylance and many more…

3:45pm - 4:15pmSession Eleven

Brian Reed
VP of Strategy

Making the Case for Stronger Endpoint Data Visibility 

As security practitioners, we often get caught up worrying about protecting against the latest threat or patching the latest zero-day, however we should spend at least an equal amount of time understanding the data risks of our users and how to offer both better visibility into endpoint data usage, as well as guidance into good data protection practices.

There are a number of different products and vendors that touch on these aspects, but there is no one-stop shop for data protection, and likely never will be. DLP, or Data Loss Prevention, can look at known content types for matches and take protective actions. However, most DLP deployments never moved beyond monitoring due to over-blocking or false positive concerns. Endpoint employee monitoring can take good forensic information, even screenshots to recreate evidence of either inappropriate data usage, or other significant events, though these types of technology are often cumbersome, hard to realize the value and present some serious privacy and ethical concerns. EDR or Endpoint Detection and Response is very threat-focused, with a severe limit on data visibility, and often does little more than capture a checksum of a file, with no content inspection or awareness. UEBA, or User and Entity Behavior Analytics, can often be deployed in conjunction with SIEM or log management capabilities to get a better contextual view of your organization, however, you must first have some semblance of “normal” or a baseline before you can uncover abnormal.

Organizations should begin building the case for stronger endpoint data visibility. This improved data visibility must be easy to use, fast to provide actionable answers, not impede other endpoint security capabilities, and most importantly provide the financial impact of endpoint data and the decisions that users make with that data.

Speaker’s Bio:

Brian Reed is the VP of Strategy for ThinAir. In his current role, he provides strategy and vision for ThinAir’s products and constantly looking for ways to better provide meaningful endpoint data visibility. Previously, Brian was the Research Director at Gartner for a number of data security and cloud security topics and was the lead author for the last two Gartner Magic Quadrants for Enterprise Data Loss Prevention, and Market Guides for CASB and DCAP. Before Gartner, he worked for several vendors in both threat protection and data protection focused roles at Lastline, Sourcefire (acquired by Cisco Systems), HP, McAfee and Internet Security Systems (acquired by IBM). Brian has a BA from the University of Georgia, and an MBA from Kennesaw State University.

 

 

 

 

4:15pm - 4:45pmSession Twelve

Mark Holobach 
Enterprise Sales Engineer

4:45pm - 5:15pmSession Thirteen

Sponsors