• Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe
Data Connectors Logo
  • Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe

    Atlanta Cybersecurity Conference
    March 28, 2019

    Includes FBI Keynote Session and CISO Panel
    • Register Now

    CISO Panel

    • Mark Gelhardt
      VP, Technology Governance
      US Bank
    • Ben Halpert
      VP, Risk and Corporate Security
      Ionic Security
    • Tamika Bass
      Chief Information Security Officer
      Georgia Department of Public Health
    • Chris Bullock
      Chief Executive Officer
      Cyber Investigations & Intelligence Agency
    • Dexter Caffey
      Chief Executive Officer
      Smart Eye Technology

    CHECK-IN AND OPENING INTRODUCTIONS

    8:15 am - 8:45 am

    Data Connectors is proud to host the Cybersecurity Strategies Conference.

    Session Two

    9:15 am - 9:45 am
    • David Coleman

    The Five Tenants of Wi-Fi Security

    David Coleman, author of the Certified Wireless Security Professional Study Guide, discusses the five tenants of Wi-Fi security. An overview of the Robust Security Network (RSN) security mechanisms that are defined for WLAN security. Learn about current Wi-Fi security capabilities and what is coming next with the WPA-3 Wi-Fi security certification.

     

    Speaker’s Bio:

    David Coleman is a wireless mobility consultant, public speaker, and trainer. For the last twenty years, David has instructed IT professionals from around the globe in enterprise WLAN design, WLAN security, WLAN administration and WLAN troubleshooting. In his spare time, David writes white papers, blogs, and books about enterprise Wi-Fi networking. David is the co-author of Sybex Publishings Certified Wireless Network Administrator (CWNA) Study Guide and numerous other books about Wi-Fi. David is the Senior Product Evangelist for Aerohive Networks and is CWNE #4.

    Break

    9:45 am - 10:15 am

    Break / Vendor Booth Time

    Session Three

    10:15 am - 10:45 am
    • John Alvarez

    A New approach to email security for Office 365

    For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

    Download the Presentation

    Session Four

    10:45 am - 11:15 am
    • Jason Snook
      Senior Solution Architect

    Top 5 Ransomwares in 2019 and How to Protect Against Them

    Jason Snook, (CISM) Certified Information Systems Manager and (CBCP) Certified Business Continuity Professional navigates the Ransomware headlines dominating the news so far in 2019.  Our discussion will answer which Ransomware variants are making noise in the world, what they target, and ultimately how to prepare to mitigate these threats.  Learn the keys to Ransomware response and how to ensure your company is ready to battle the latest threats.

     

    Speaker’s Bio:

    Jason lives, works, and plays in Eugene Oregon.  He’s been working in IT as a system engineer, network engineer, and finally IT director for over 15 years.  He’s worked on the customer side engineering solutions working with vendors, and dealing with the buying end of technology prior to working with Quorum.  Jason’s been at Quorum for over 4 years as a Solutions Architect and brings that customer perspective to the world of technology sales.

    Lunch

    11:15 am - 11:45 am

    Break / Vendor Booth Time / Lunch

    Keynote Session

    11:45 am - 12:45 pm
    • Special Agent Nathan Langmack
      FBI Atlanta

    The Big Three: Data Breaches, Ransomware and Business Email Compromise

    Break

    12:45 pm - 1:00 pm

    Break / Vendor Booth Time

    Session Six

    1:00 pm - 1:30 pm
    • Cal Jeffrey

    Secure Networking – Simplified

    This session is designed to demonstrate that it is time we re-think how we design networks. Using HIP (Host Identity Protocol) we can literally create secure, zero trust networks in seconds that enable businesses to address SCADA requirements, Micro Segmentation initiatives, HIPPA/PCI compliance and more.

    Download the Presentation

     

    Speaker’s Bio:

    Cal Jeffrey has been in the Network and Cyber Security industry for nearly 30 years. He has worked for the most prominent companies in Network Security and been involved with global deployments at some of the largest international companies across numerous industries.

    Session Seven

    1:30 pm - 2:00 pm
    • Krishnan Natarajan
      Senior Director

    The current Malware Threat Landscape – and Best Practices for Enterprise Grade Remediation

    Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

    This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

    Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

     

    Download the Presentation

     

    Speaker’s Bio:

    Krishnan Natarajan is Senior Director for Malwarebytes, based in Santa Clara California. He has experience with multiple areas of information security: web application security, user and entity behavior analytics, insider threat, data loss prevention, and endpoint security. Prior to Malwarebytes, Krishnan has held leadership roles at several S.F. Bay Area companies including Whitehat Security, Dtex Systems, and Hewlett-Packard. Krishnan is alsoactive in the security community as the manger in the 400,000 member Information Security Community on LinkedIn. He holds undergraduate and graduate degrees from M.I.T.

    Break

    2:00 pm - 2:15 pm

    Break / Vendor Booth Time

    Session Eight

    2:15 pm - 2:45 pm
    • Pete Nicoletti
      Chief Data Officer

    The top Security Challenges and how AI/Machine Learning is evolving to Address

    In this presentation we’ll discuss a number of issues contributing to the increasing number of breaches and how we can leverage the latest advances in AI/ML to turn this trend around.

    The issues that we’ll discuss are: Conventional tools only combat known attacks. The incredible increasing volume of data. Outsourced Managed Security Service Providers (MSSP) Operations are mostly failing at preventing breaches. Alert Overload. Lack of Security Professionals. Lack of subscribing to and managing environments to a Security Framework. Average time to fully contain a breach is lengthening. The cost of a breach remains very expensive. The length of time to identify a breach is barely improving. Efficacy of Conventional Security tools averages only 85%. Almost every company needs more money for cybersecurity but won’t get it.

    For each of the above challenges there are new approaches that need to be understood and potentially leveraged to reduce risk.

     

    Speaker’s Bio:

    Pete is currently Cybraics “Chief Data Officer” and has global responsibility for Systems Engineering, Analyst Relations, and assists in Product Development, Marketing, Customer Engagements and Operations.

    Pete is the former CISO of Hertz Rent a Car Global Holdings, CISO of Virtustream (a Dell company) and VP of Security engineering at Terremark/Verizon. Pete has been a local South Florida trailblazer being the CEO of an MSSP, a wireless ISP, a network engineering company and a CRM telephony company.
    Pete has 31 years of progressive responsibility in the deployment, marketing, sales, product development, engineering design, project implementation and operation of information technology, IaaS/SaaS/PaaS, cloud, data center operations, the entire spectrum of security technologies, compliance frameworks and Managed Security Service Provider services and operations.

    In 2017, Pete was selected as a “Top 100 Global Chief Security Officers” by Hot Topics Magazine.
    Pete’s cloud security deployments and designs have been rated by Garter as #1 and #2 in the world and he literally “wrote the book” on secure cloud reference designs as published in Intel Press: “Building the Infrastructure for Cloud Security: A Solutions View.”

    Pete is a former president of the South Florida ISSA and started the Chili cook off and Hack for the Flag Contest still going strong!

    Pete enjoys mentoring security professionals and had some prodigies that have really had some great success!
    Pete lives in the Keys with his wife Jenifer and has 3 kids, two away at collage spending his retirement money.

    Session Nine

    2:45 pm - 3:15 pm
    • Stan Wisseman
      Chief Security Strategist

    Application Security in an Ever Changing Digital Landscape

    Why is application security such a crucial function of any robust Cyber Security Program. We will take a look at the findings from our latest research on application security vulnerability trends. Why is application security still the weakest link in most programs and how to position application security programs successfully in an organization. We will dive into why application security is solved by one or more products, but by a comprehensive program. Most importantly, what are the key steps companies have taken to establish application security programs that have really moved the needle with respect to reducing the application attack surface.

     

    Speaker’s Bio:

    Stan Wisseman is a Chief Security Strategist and Business Solutions Director for MicroFocus security products. In these roles, Mr. Wisseman is responsible for providing driving business, but also providing thought leadership and insight regarding the ever-changing global threat landscape. Mr. Wisseman has over 30 years of information security experience and has built security into products, systems, software, and enterprises. He led application security consulting practices at Cigital and Booz Allen Hamilton. While serving as Deputy CISO at Fannie Mae, he helped establish an application security program. Mr. Wisseman has a Masters from Santa Clara University and is CISSP, CISM, CSSLP, CCSK certified.

    Break

    3:15 pm - 3:30 pm

    Session Ten

    3:30 pm - 3:50 pm

    About Sertainty

    Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.

    Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.

    CISO Panel

    4:00 pm - 5:00 pm
    • Mark Gelhardt
      VP, Technology Governance
      US Bank
    • Ben Halpert
      VP, Risk and Corporate Security
      Ionic Security
    • Tamika Bass
      Chief Information Security Officer
      Georgia Department of Public Health
    • Chris Bullock
      Chief Executive Officer
      Cyber Investigations & Intelligence Agency
    • Dexter Caffey
      Chief Executive Officer
      Smart Eye Technology

    Registration

  • Cobb Galleria Centre
    8:15 am - 5:00 pm
    2 Galleria Pkwy SE
    Atlanta, GA 30339
    770-955-8000

    Event Sponsors

    • Acalvio
    • Accellion
    • Aerohive-e1527260938899
    • Altaro-1
    • Arctic Wolf
    • Area-1-e1533046341846
    • Array Networks
    • Check Point
    • Checkpoint Technologies
    • Cirro-vertical-col-RGB
    • CI-Security-e1533139983491
    • Circadence-e1533914602524
    • Code42-e1525885926109
    • CyberVista_logo_rgb_tag-e1510095299141
    • Cybraics
    • ESET-logo-Compact-Colour-Dark-Turq-tag-RGB-e1517589386862
    • Infogressive
    • ISACA_039-Atlanta_4c
    • LogRhythm-updated-Logo-Web-e1492788834897
    • Malwarebytes
    • Micro Focus
    • Print
    • Okta
    • onelogin
    • One-Span-e1528814217627
    • PacketViper-Logo-Horizontal-01-8-17-e1501599685373
    • Quorum_Logo_wotag_110316
    • Recorded Future
    • Respond-Software-e1520273059171
    • SaltStack
    • Sertainty-Corp-e1530285078658
    • Silent Break
    • SSH Communications Security
    • Tempered Networks
    • TenableLogo-updated-4-17_FullColor_RGB-e1492788853166
    • Tufin
    • VadeSecure
    • Velocloud VMware
    • Vera
    • Whitesource-e1503411956331
    Become a sponsor
Contact Us
Privacy Policy
Media Kit
500 Chesterfield Center, Suite 320
Chesterfield MO 63017
636-778-9495
[email protected]
Data Connectors Logo
Data Connectors - 2018