February 7 @ 8:00 am - 5:15 pm
The Atlanta Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cyber Security Strategies Conference.
Senior Identity Systems Engineer
Business-Driven Security, Identity and the New Age of Risk
In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.
Vasanth Balakrishnan is a Senior Identity Systems Engineer with RSA Security, based in Houston. He has been with RSA 7 years with most of that time as a subject matter expert on the RSA SecurID Authentication Manager multi-factor authentication solution, involved in several large enterprise deployments of up to 100K users. He is an active member local cyber security groups such as InfraGard Houston and Control System Cyber Security Association International known as (CS)2AI.
Vice President of Sales
Network 3.0: Networking of only trusted identities
While Networking 1.0 was about networking all PCs and giving users access to the Internet, the current era of Networking 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Networking 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere, without worry.
Matt Close is the Vice President of Sales at Tempered Networks. Matt has over 20 years of Sales Leadership experience, most recently at Altify (formerly The TAS Group). At Altify, Matt was EVP of Sales as the SaaS company grew from a small start up to a Platinum Partner of Salesforce. Prior to Altify, Matt has held sales leadership positions at The Coca-Cola Company and OC Tanner. Matt holds a BA in History from UC, Irvine and an MBA from Azusa Pacific University.
Does Your Time to First Byte Bite?
Regional Sales Manager
The Top 5 Wi-Fi Security Mistakes
Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Senior Account Executive
Secure Your Cloud Email and Applications in Minutes with Best-of-Breed Vendors
Users have been evolving to the cloud for everything from Office 365 mail/suite and Google mail/suite to more traditional cloud apps like SFDC, ServiceNow, file-sharing services, and even the IaaS guys like AWS and Azure. With this comes the inherent risk of not being able to use your trusted on-premise security tools to manage your data. Avanan, unlike the legacy vendors in the email protection and CASB space, does not rely on complicated rerouting of users and traffic to proxy inspection engines in the cloud. Hear how full presence within the cloud data can be accessed in minutes via API’s and secured with 60+ world-class and trusted vendors ranging from Check Point to Palo Alto, FireEye, Cylance and many more…
VP of Strategy
Making the Case for Stronger Endpoint Data Visibility
As security practitioners, we often get caught up worrying about protecting against the latest threat or patching the latest zero-day, however we should spend at least an equal amount of time understanding the data risks of our users and how to offer both better visibility into endpoint data usage, as well as guidance into good data protection practices.
There are a number of different products and vendors that touch on these aspects, but there is no one-stop shop for data protection, and likely never will be. DLP, or Data Loss Prevention, can look at known content types for matches and take protective actions. However, most DLP deployments never moved beyond monitoring due to over-blocking or false positive concerns. Endpoint employee monitoring can take good forensic information, even screenshots to recreate evidence of either inappropriate data usage, or other significant events, though these types of technology are often cumbersome, hard to realize the value and present some serious privacy and ethical concerns. EDR or Endpoint Detection and Response is very threat-focused, with a severe limit on data visibility, and often does little more than capture a checksum of a file, with no content inspection or awareness. UEBA, or User and Entity Behavior Analytics, can often be deployed in conjunction with SIEM or log management capabilities to get a better contextual view of your organization, however, you must first have some semblance of “normal” or a baseline before you can uncover abnormal.
Organizations should begin building the case for stronger endpoint data visibility. This improved data visibility must be easy to use, fast to provide actionable answers, not impede other endpoint security capabilities, and most importantly provide the financial impact of endpoint data and the decisions that users make with that data.
Brian Reed is the VP of Strategy for ThinAir. In his current role, he provides strategy and vision for ThinAir’s products and constantly looking for ways to better provide meaningful endpoint data visibility. Previously, Brian was the Research Director at Gartner for a number of data security and cloud security topics and was the lead author for the last two Gartner Magic Quadrants for Enterprise Data Loss Prevention, and Market Guides for CASB and DCAP. Before Gartner, he worked for several vendors in both threat protection and data protection focused roles at Lastline, Sourcefire (acquired by Cisco Systems), HP, McAfee and Internet Security Systems (acquired by IBM). Brian has a BA from the University of Georgia, and an MBA from Kennesaw State University.
Enterprise Sales Engineer