Loading Events

« All Events

  • This event has passed.

Atlanta (Cybersecurity)

February 7 @ 8:00 am - 5:15 pm

Event Navigation

Details

Date:
February 7
Time:
8:00 am - 5:15 pm
Event Category:

Venue

Cobb Galleria Centre
2 Galleria Pkwy SE
Atlanta, GA 30339
United States
  + Google Map
Phone:
770-955-8000
Website:
https://web.archive.org/web/20141002082033/http://cobbgalleria.com/index.aspx

Overview

The Atlanta Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:30amSession One

Vasanth Balakrishnan
Senior Identity Systems Engineer

Business-Driven Security, Identity and the New Age of Risk

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.

Speaker’s Bio:

Vasanth Balakrishnan is a Senior Identity Systems Engineer with RSA Security, based in Houston. He has been with RSA 7 years with most of that time as a subject matter expert on the RSA SecurID Authentication Manager multi-factor authentication solution, involved in several large enterprise deployments of up to 100K users. He is an active member local cyber security groups such as InfraGard Houston and Control System Cyber Security Association International known as (CS)2AI.

 

9:30am - 10:00amSession Two

Erich Kron
Security Awareness Advocate

Best Practices and Future Direction of Security Awareness Training

Ignoring the human side of cybersecurity will leave your organization vulnerable. Reported numbers may fluctuate from industry study to industry study, but they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated cyber-scam and your systems, data, and customers.

Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start. This session will provide practical security awareness and behavior management tips, outline how and where tools are helpful, and discuss emerging industry trends.

10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:00amSession Three

Joe Lubelczyk
Senior Account Manger

Securing your organization and containing the insider threat  

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.

11:00am - 11:30amSession Four

Will Tharp
Systems Engineer

Migrating to NFV – Virtualization Platforms Purpose-Built for Network Functions & Network Operations

From compute to storage to networking and security, businesses are increasingly going virtual. However; when it comes to network functions, several challenges stand in the way of broader enterprise adoption. While virtual appliances and virtual network functions are highly agile, they can sometimes fall short when it comes to performance and scalability. In addition, there is considerable complexity associated with architecting virtual environments to content with the demands of networking and security functions. Learn about the new breed of purpose-built Network Functions Platforms that are solving performance and complexity challenges for businesses that are moving towards virtualized networking, security and app delivery.

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Matt Close
Vice President of Sales

Network 3.0:  Networking of only trusted identities

While Networking 1.0 was about networking all PCs and giving users access to the Internet, the current era of Networking 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Networking 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere, without worry.

Speaker’s Bio:

Matt Close is the Vice President of Sales at Tempered Networks. Matt has over 20 years of Sales Leadership experience, most recently at Altify (formerly The TAS Group). At Altify, Matt was EVP of Sales as the SaaS company grew from a small start up to a Platinum Partner of Salesforce. Prior to Altify, Matt has held sales leadership positions at The Coca-Cola Company and OC Tanner. Matt holds a BA in History from UC, Irvine and an MBA from Azusa Pacific University.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Brad Tompkins
Enterprise Sales Engineer

 

Bolstering Security with UEBA

Download the Presentation

Speaker’s Bio:

An Atlanta native coming from a network security background, Brad joined LogRhythm in 2015.  He is focused on helping organizations pinpoint abnormal behavior in their environments, no matter the size and is always willing to lend a hand to his fellow engineers.

1:15pm - 1:45pmSession Seven

Nate Brown
Solutions Engineer

Does Your Time to First Byte Bite?

Download the Presentation

1:45pm - 2:00pmBreak/ Vendor Booth Time
2:00pm - 2:30pmSession Eight

Brad Armstrong
Regional Sales Manager

The Top 5 Wi-Fi Security Mistakes

Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models

 

2:30pm -3:00pmSession Nine

Kevin O’Brien
CEO

Phishing & Social Engineering Attacks: What to Do?

Email threats, while not new, increasingly have become more sophisticated.  In this session, attendees will learn about targeted phishing, how it’s evolving and what to do to protect your organization from business email compromise.  Kevin will demonstrate how attackers execute social engineering attacks, debunk the 4 common myths about email security, and provide practical advice on new approaches to email security for cloud email platforms (Office365 and G Suite) to protect against advanced threats.

Speaker’s Bio:

Kevin O’Brien is GreatHorn’s CEO and Co-Founder. Under Kevin’s leadership, GreatHorn has become the world’s leading next generation email security company, analyzing billions of messages and stopping phishing attacks targeting a global customer base of organizations, both public and private. He brings deep industry experience, having been an early member of multiple successfully exited security companies, including CloudLock (Cisco), Conjur (CyberArk), and @stake (Symantec).

In addition to his role at GreatHorn, Kevin serves as co-chair for the Mass Technology Leadership Council’s cybersecurity group, and is a frequent speaker at key cloud cybersecurity and industry events. He has presented at the RSA Security Conference, Xconomy’s What’s Hot in Cybersecurity Conference, Microsoft’s Innovation Outreach Program, the MassTLC Cybersecurity Conference, and has been featured in TechCrunch, NPR Marketplace, Mashable, Forbes, CSO Magazine, and more.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Doug Laughlin
Senior Account Executive

Secure Your Cloud Email and Applications in Minutes with Best-of-Breed Vendors

Users have been evolving to the cloud for everything from Office 365 mail/suite and Google mail/suite to more traditional cloud apps like SFDC, ServiceNow, file-sharing services, and even the IaaS guys like AWS and Azure.  With this comes the inherent risk of not being able to use your trusted on-premise security tools to manage your data.  Avanan, unlike the legacy vendors in the email protection and CASB space, does not rely on complicated rerouting of users and traffic to proxy inspection engines in the cloud.  Hear how full presence within the cloud data can be accessed in minutes via API’s and secured with 60+ world-class and trusted vendors ranging from Check Point to Palo Alto, FireEye, Cylance and many more…

3:45pm - 4:15pmSession Eleven

Brian Reed
VP of Strategy

Making the Case for Stronger Endpoint Data Visibility 

As security practitioners, we often get caught up worrying about protecting against the latest threat or patching the latest zero-day, however we should spend at least an equal amount of time understanding the data risks of our users and how to offer both better visibility into endpoint data usage, as well as guidance into good data protection practices.

There are a number of different products and vendors that touch on these aspects, but there is no one-stop shop for data protection, and likely never will be. DLP, or Data Loss Prevention, can look at known content types for matches and take protective actions. However, most DLP deployments never moved beyond monitoring due to over-blocking or false positive concerns. Endpoint employee monitoring can take good forensic information, even screenshots to recreate evidence of either inappropriate data usage, or other significant events, though these types of technology are often cumbersome, hard to realize the value and present some serious privacy and ethical concerns. EDR or Endpoint Detection and Response is very threat-focused, with a severe limit on data visibility, and often does little more than capture a checksum of a file, with no content inspection or awareness. UEBA, or User and Entity Behavior Analytics, can often be deployed in conjunction with SIEM or log management capabilities to get a better contextual view of your organization, however, you must first have some semblance of “normal” or a baseline before you can uncover abnormal.

Organizations should begin building the case for stronger endpoint data visibility. This improved data visibility must be easy to use, fast to provide actionable answers, not impede other endpoint security capabilities, and most importantly provide the financial impact of endpoint data and the decisions that users make with that data.

Download the Presentation

Speaker’s Bio:

Brian Reed is the VP of Strategy for ThinAir. In his current role, he provides strategy and vision for ThinAir’s products and constantly looking for ways to better provide meaningful endpoint data visibility. Previously, Brian was the Research Director at Gartner for a number of data security and cloud security topics and was the lead author for the last two Gartner Magic Quadrants for Enterprise Data Loss Prevention, and Market Guides for CASB and DCAP. Before Gartner, he worked for several vendors in both threat protection and data protection focused roles at Lastline, Sourcefire (acquired by Cisco Systems), HP, McAfee and Internet Security Systems (acquired by IBM). Brian has a BA from the University of Georgia, and an MBA from Kennesaw State University.

Prize Drawing for All in Attendance
4:15pm - 4:45pmSession Twelve

Mark Holobach 
Enterprise Sales Engineer

Intercepting Advanced Threats

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.
•           Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
•           Detect: quickly and easily detect and isolate attacks
•           Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio: 

Mark Holobach has been in the IT/Security world for almost 20 years. In his current role, Mark is a Senior Sales Engineer at Sophos preaching the gospel of endpoint protection to his customers across the Southeast.

Prize Drawings for All in Attendance

Sponsors