Data Connectors is proud to host the Atlanta Cybersecurity Conference with special coverage by Cyberhub Engage.
8:30 am - 5:00 pm165 Courtland Street NEAtlanta, GA 30303(404) 659-6500
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Why Does Asset Management Matter for Cybersecurity?
Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.
Drew is a technical team member who enjoys debating solutions and solving problems. He draws from his 30 years of technical and business experience where he’s worked for some of the largest network, data center, and MSSP providers. In that time he’s focused on a wide variety of security areas, including managed security services, DDoS protection, GRC (Governance, Risk & Compliance), threat intelligence platforms, and phishing defense services before moving to Axonius where he helps solve a foundational problem for every enterprise. Drew is a member of the Raleigh ISSA chapter and holds active CISSP and CISM credentials.
Session Two9:30 am - 10:00 am
Lightweight Deception, Heavyweight Results
As Vice President of Sales and Business Development, Tim is responsible for the development and execution of company sales and strategic partnering strategies. Tim has over 20 years of technical sales and marketing experience with specific focus on cybersecurity solutions over the past 12 years. Tim specializes in global, enterprise and major account sales, channel strategies and new business development. Prior to joining PacketViper Tim had senior security sales responsibilities at Dimension Data and NTT Security (formerly Solutionary). Tim holds an MBA from Duquesne University concentrating in Marketing and Sales Management, and a Bachelor of Science degree in Business Administration and Finance from the University of Pittsburgh.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Stacey Budd has been working with Arcserve solutions since 2007 and joined the company as a Presales Consultant back in 2014. Prior to that, he worked for TechData as a System Engineer supporting several IT products including Arcserve. He also served in the United States Air Force as a Nuclear Weapons Specialist.
When he isn’t educating the world about Arcserve Unified Data Protection, you can often find him fishing. Or Kayaking. Or preferably fishing while kayaking in the warm Florida sun.
Session Four11:00 am - 11:30 am
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
Migration to cloud email requires a strategic shift in security. Given that Office 365 inboxes and user credentials are top targets for hackers, it’s no surprise that 90% of breaches start with email. The resulting security incident orchestration and response workload drain resources from the SOC team.
Sr Solutions Engineer, Jeff Raymond will share insights from research and demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks. He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to secure inboxes from threats like phishing, account takeover, and business email compromise.
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
The CSI Model of Digital Forensics
With the speed of business, the width of company exposure, and the number of growing attackers; learning and utilizing the CSI Model of Digital Forensics can assist in the mitigation of security events and the protection of company assets.
I began my career as a USSS SA in 1999 in Dallas, Texas. Moved through my career in a traditional manner, making stops in the Training Section and Protection Divisions in Washington, DC. In 2011, was assigned to the Atlanta Field Office and moved into the Digital Forensics Lab as an ECSAP SA in 2013. In 2017, I was promoted to the position of Technical Staff Assistant where I manage the day to day operations of the USSS ATL Regional Cyber Center Digital Forensics Lab, as well as continue to conduct digital forensics examinations involving mobile, computer, network, and skimmer devices.
Break12:45 pm - 1:15 pm
Dessert and Coffee Break / Vendor Exhibit Time
Session Six1:15 pm - 1:45 pm
Threat Hunting and Modern Security: 3 Fundamental Flaws
When considering how to move forward with the development or operations of a monitoring function, what risks must be addressed and which ones are inherently unavoidable? There are three fundamental flaws with threat hunting and trying to find “the bad” that many organizations may not be addressing.
Tommy Scott is a Sr. Security Consultant at Critical Start responsible for all presales activities for Critical Start’s MDR services in the Central Region. Tommy has spent a decade in the Information Security industry with experience ranging from Security Operations, Security Engineering, and GRC within industries such as healthcare, retail, and oil & gas.
Session Seven1:45 pm - 2:15 pm
Cyber Security Report 2020
Join us to take a look at the new trends in Cyber Warfare for 2020. We will take a look at the top threats facing businesses and government organizations, such as Magecart and Supply Chain attacks. We will discuss why the traditional approach is not enough to respond to these new threats.
Jerrod has over 12 years of cyber security experience, including work in telecom, finance, and the energy industry. For the last several years, he has specialized in advanced threat prevention, focusing on emerging technologies. He enjoys talking about the cyber threat landscape and modern, multi-vector attacks.
Break2:15 pm - 2:30 pm
Break / Vendor Exhibit Time
Session Eight2:30 pm - 3:00 pm
The Paradox of Securing Workloads
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Arthur has more than 25 years of executive management and sales leadership experience, including over a decade and a half in the data and cyber security industry. Before joining Morphisec, he was Vice President at Big Belly, leading their private sector expansion. Prior to Big Belly, he served as VP Strategic Accounts at CloudLock, a cloud cybersecurity company, where he focused on large enterprise customers. Prior to that, Arthur built the major accounts strategy and portfolio for Digital Guardian. Previously, he held executive-level roles at Escort Inc., ArchiText, Polaroid and AT&T. He serves in the advisory boards of GreatHorn and Jeenie, two startups, and is a co-founder of Language Line Services.
Session Nine3:00 pm - 3:30 pm
Risk Exchanges: The Key to Vendor Risk Management
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
• Understand third-party risk management trends and challenges
• Gain actionable insights on how to monitor third-party risks and performance
• Learn the benefits of a third-party risk exchange
• See how you can protect against third-party threats such as data breaches, etc
Randy Ferree serves as a Third-Party Risk Consultant for OneTrust VendorpediaTM– a purpose-built software designed to operationalize third-party risk management. In his role, Ferree advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG, GDPR and CCPA). Ferree works with clients to centralize their third-party information across business units, assess risks and performance, and monitor threats throughout the entire third-party relationship, from onboarding to offboarding.
CISO Panel3:45 pm - 4:45 pm
Gary BrantleyChief Information Security OfficerCity of Atlanta
Jose MarroquinChief Information Security OfficerEncompass Digital Media
Chris ParavateChief Information OfficerNortheast Georgia Health System
Chris StouffChief Security OfficerArmor
Steven FergusonChief Information OfficerTechnical College System of Georgia
John SlaughterChief Information OfficerAlliant Health
Gaurav SingalVP and CIOGeorgia Lottery Corporation
Registration has closed for this conference
8:30 am - 5:00 pm165 Courtland Street NEAtlanta, GA 30303(404) 659-6500