Session Details Coming Soon

Virtual Summit
Atlanta
Virtual Cybersecurity Summit
The Atlanta Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. May 05 — Thu. May 06
-
Partners
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Eastern Standard Time (EST)
The Summit will be open from 8AM to 6PM.
- Welcome
-
Understanding and Combating Credential Stuffing Attacks 9:25 am
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
- How credential stuffing attacks work
- What effect they can have on your company
- Steps to detect and mitigate these attacks
Panel Participants:
-
Using Security Testing to know What’s Working 9:45 am
The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.
Panel Participants:
- Morning Coffee Break
-
A new Spin on Securing Active Directory 10:20 am
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.
Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
-
Why do Small Businesses Need Big Protection? 10:45 am
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Panel Participants:
- Expert Panel Discussion #1 11:05 am
- Lunch Break
-
Keynote: 12:15 pm
Session Details Coming Soon
-
How do you start a ML project? Finding the Breach with Infinity SOC 1:10 pm
What is Machine Learning? Can you decipher buzzwords such as Artificial Intelligence, machine or deep learning, and differentiate between hype and fake news? Cyber-attacks are more prevalent than ever in our world today, with exponential, every-increasing variance, velocity, and volume of threat campaigns. This presentation aims to hopefully enable you to understand what lies beneath the words “AI-powered cloud” or more precisely “data driven security”.
The Security Operations Center (SOC) is often all that stands between an organization and a potentially financially devastating data breach. However, 98% of SOC teams face significant challenges in their mission to detect and shut down attacks. For many SOC teams, finding malicious activity inside their network is like finding a needle in a haystack. They are often forced to translate information from across a multitude of monitoring solutions and navigate through tens of thousands of daily alerts. This is a crossroad where machine learning and security align to equip security analysts with relevant and actionable information to prevent and respond to threats in real time.
Panel Participants:
-
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 1:30 pm
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Panel Participants:
- Afternoon Coffee Break
-
The Fear Factor: Reducing Risk in Your Environment 2:05 pm
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
- A clear understanding of the scare tactics organizations are facing from cyber criminals
- Threats and vulnerabilities that exist in their environment
- Steps organizations can take to minimize the risks of their organization’s employees
This session will help attendees to understand that fear should not be a factor in their approach to security
Panel Participants:
- Subject Matter Expert Session - More Details To Come 2:30 pm
-
Expert Panel Discussion #2 2:50 pm
Session Details Coming Soon
- Afternoon Break
-
Subject Matter Expert Session - More Details To Come 3:35 pm
Session Details Coming Soon
- Guest Keynote: 3:55 pm
- Day One Closing Session
- Day Two
- Breakfast Briefing 8:55 am
- Welcome / Introductions
-
Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 9:25 am
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
- What is BEC and EAC? And how do they work?
- What are the common attack tactics regarding this new form of email threats?
- Best practices to defend against BEC and EAC
Panel Participants:
- Subject Matter Expert Session - More Details To Come 9:45 am
- Morning Coffee Break
-
Automate or Die Trying: The New Cybersecurity Reality 10:20 am
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our session to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
Panel Participants:
-
Moving Beyond Password to Delight & Secure Users 10:45 am
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
- Expert Panel Discussion #3 11:05 am
- Lunch Break
-
Small businesses deserve big protection 1:10 pm
Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.
Panel Participants:
-
2020 Threats in Review 1:30 pm
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.
Panel Participants:
- Afternoon Coffee Break
-
Introduction to Risk-Based Vulnerability Management 2:05 pm
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
- Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
- Details the findings on how risk-based is the way to get ahead in vulnerability management
- Lays out several factors that drive better remediation performance
- Provides steps for setting up a successful risk-based vulnerability management program
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 2:30 pm
Session Details Coming Soon
-
Expert Panel Discussion #4 2:50 pm
Session Details Coming Soon
- Afternoon Break
-
Subject Matter Expert Session - More Details To Come 3:30 pm
Session Details Coming Soon
-
CISO Panel 3:55 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
- Summit Final closing Session
Registration
Wed. May 05 — Thu. May 06
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).