dataconnectors.com Open in urlscan Pro
2606:4700:3031::ac43:ad0c  Public Scan

Submitted URL: http://go.dc-cybersecurityevents.com/lnk/AG8AANMIF_gAAAAAAAAAACBhZscAAAAAXVYAAAAAABKm_wBjSA6bBDzJTfYmTMmoJG5JBlQ0tQASonI/4/9X_4ADfSyw...
Effective URL: https://dataconnectors.com/events/2022/october/atlanta/?aff=MJE6&utm_source=MJE6&utm_medium=Email&utm_campaign=ATL
Submission Tags: falconsandbox
Submission: On March 18 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Events
   
   
   UPCOMING EVENTS
   
   Mar 30 Kansas City
   
   Conference
   
   
   MAR 30
   
   Kansas City
   
   Apr 13 Nashville
   
   Conference
   
   
   APR 13
   
   Nashville
   
   Apr 20 Milwaukee
   
   Conference
   
   
   APR 20
   
   Milwaukee
   
   View all events
   
   
   FIND AN EVENT
   
   All Events
   
   Past Events
   
   Why Attend?
   
   
   EVENTS BY LOCATION:
   
   -- Select --ALAlbuquerqueAnaheimArizonaAtlantaAugustaAustinBaltimoreBaton
   RougeBillingsBirminghamBoiseBostonBritish
   ColumbiaBurlingtonCACalgaryCanadaCaribbeanCentral
   AmericaCharlestonCharlotteCheyenneChicagoClevelandCleveland Marriott Downtown
   at Key TowerColoradoColumbiaColumbusConcrodCTDallasDCDenverDes
   MoinesDetroitDurhamEdmontonFLFloridaFort LauderdaleGAHartfordHelenaHilton
   MemphisHoustonIDIllinoisIndianaIndianapolisJacksonJacksonvilleJersey CityJW
   Marriott IndianapolisKansas CityLALas VegasLe Meridien Charlotte HotelLos
   AngelesMarylandMDMEMemphisMiamiMichiganMilwaukeeMinneapolisMontogmeryMontrealMSMTNashvilleNCNevadaNew
   MexicoNew OrleansNew YorkNew York
   CityNewportNHNJNVNYNYCOhioOmahaOntarioOROrlandoOttawaPAPennsylvaniaPhiladelphiaPhoenixPittsburghPortlandPRProvidenceQuebecRaleighRIRichmondSacramentoSalemSalt
   Lake CitySan AntonioSan DiegoSan FranciscoSanta FeSCSeattleSoCalSt.
   LouisSyracuseTampaTNTorontoTrentonTucsonTXUSVIUtahVAVancouverVirginiaVTWAWashington
   DCWisconsinWVWY-- Select --
 * Partners
   
   
   FEATURED VENDOR PARTNERS
   
   View all vendor partners
   
   
   
   
   FEATURED AFFILIATE PARTNERS
   
   View all affiliate partners
   
   
   
   View all partners Become a Partner
   
   * Vendor Partners
   * Affiliate Partners
 * News
 * Sponsor
 * Join

Join

Conference


ATLANTA


CYBERSECURITY CONFERENCE

When it comes to staying on top of your organization’s security needs, it is
vital to make connections and learn from experts. Attend the Atlanta
Cybersecurity Conference with thought leaders and luminaries face-to-face and
gather insights on the latest trends and threats in cybersecurity to help you
better navigate whatever cyber threats may come. At the Atlanta Cybersecurity
Conference, you will gain unfettered access to many local CISOs, as well as
representatives from government agencies and law enforcement, as they provide an
in-depth analysis of the current state of cybersecurity with extensive training
sessions, live Q&A panels, access to solution providers, and networking
opportunities.

Whether you’re looking to grow your understanding about cloud security, working
on improving your organization’s DevSecOps, or just looking to learn more about
the current threat environment, the Atlanta Cybersecurity Conference will give
you the knowledge you need to ensure your team’s success.

Connect with Data Connectors on LinkedIn here!


View Video


Atlanta

Date

THU. OCT 20



Location

Atlanta Marriott Marquis

265 Peachtree Center Avenue
Atlanta, GA 30303
404-521-0000

Get Directions

 * Featured Speakers
   Hadas Cassorla
   
   Hadas Cassorla
   
   CISO - M1 Finance
   
   --------------------------------------------------------------------------------
   
   Nobody Cares That You Can Do Your Job: And How To Fix That
   
   Philip Wislar
   
   Philip Wislar
   
   Assistant Special Agent in Charge at FBI, Atlanta Field Office
   
   --------------------------------------------------------------------------------
   
   Ransomware, Cyber Hygiene & Partnering with the FBI
   
   Chad Hunt
   
   Chad Hunt
   
   Supervisory Special Agent at FBI, Atlanta Field Office
   
   --------------------------------------------------------------------------------
   
   Ransomware, Cyber Hygiene & Partnering with the FBI
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   --------------------------------------------------------------------------------
   
   Cyber Inter-Agency Collaboration Panel
   
   Philip Wislar
   
   Philip Wislar
   
   Assistant Special Agent in Charge at FBI, Atlanta Field Office
   
   --------------------------------------------------------------------------------
   
   Cyber Inter-Agency Collaboration Panel
   
   Chad Hunt
   
   Chad Hunt
   
   Supervisory Special Agent at FBI, Atlanta Field Office
   
   --------------------------------------------------------------------------------
   
   Cyber Inter-Agency Collaboration Panel
   
   Dean Glore
   
   Dean Glore
   
   Special Agent, USSS
   
   --------------------------------------------------------------------------------
   
   Cyber Inter-Agency Collaboration Panel
   
   Zach Bulliner
   
   Zach Bulliner
   
   ATSAIC, USSS
   
   --------------------------------------------------------------------------------
   
   Cyber Inter-Agency Collaboration Panel
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   --------------------------------------------------------------------------------
   
   Keynote Presentation: Joye Purser
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   --------------------------------------------------------------------------------
   
   Cyber Executive Panel
   
   Michael F. D. Anaya
   
   Michael F. D. Anaya
   
   Head of Attack Surface Analysis at Palo Alto Networks
   
   --------------------------------------------------------------------------------
   
   Cyber Executive Panel
   
   Steven Ferguson
   
   Steven Ferguson
   
   CIO - Technical College System of Georgia (TCSG)
   
   --------------------------------------------------------------------------------
   
   Cyber Executive Panel
   
   Jameeka Green Aaron
   
   Jameeka Green Aaron
   
   CISO at Auth0
   
   --------------------------------------------------------------------------------
   
   Cyber Executive Panel
   
   Collapse This Item


EVENT SCHEDULE

Times for the Atlanta Cybersecurity Conference are in Eastern Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, October 20th.

 * Welcome to the Atlanta Cybersecurity Conference
   
 * The State of Phishing: An Under the Hood Look at the Latest Phishing Tactics
   8:30 am
   
   Presented by INKY
   
   Account Takeover Attacks (ATO), Business Email Compromise (BEC) and
   Ransomware attacks are most definitely on the rise and some of the biggest
   problems facing security teams in 2022. 
   
   You could say 2022 is the year that phishing became an ‘industry’. The
   volume, variety, sophistication, and impact of phishing attacks have risen
   dramatically as black-hat players have organized themselves around what they
   see as a fast-growing opportunity. Specialists have risen in all areas as
   phishing/malware/ransomware-as-a-service have become a reality. The impact of
   ransomware payloads attached to phishing exploits have been felt worldwide.
   Such attacks are the main driver behind the dramatic increase in financial
   penalties suffered by corporate victims. 
   
   Criminals are using sophisticated tactics that are designed to slip through
   legacy gateway protection. Dave Baggett, CEO of INKY Technology will take you
   on an in-depth look, using real world examples of the latest deceptive tricks
   been used to circumvent these secure email gateways.
   
   Click to Expand
   
   Speaker:
   
   Dave Baggett
   
   Dave Baggett
   
   Chief Executive Officer at INKY
   
   Collapse This Item

 * The Battle of Algorithms: How AI Is Beating AI at Its Own Game 8:50 am
   
   Presented by Darktrace
   
   Presentation Abstract:
   Among rapidly evolving technological advancements, the emergence of
   AI-enhanced malware is making cyber-attacks exponentially more dangerous, and
   harder to identify. As AI-driven attacks evolve, they will be almost
   indistinguishable from genuine activity, and conducted at an unprecedented
   speed and scale. In the face of offensive AI, only defensive AI can fight
   back, detecting even the most subtle indicators of attack in real time, and
   respond with surgical actions to neutralize threats – wherever they strike.
   
   In this session, discover:
   – How cyber-criminals are leveraging AI tools to create sophisticated cyber
   weapons
   – What an AI-powered spoofing threat may look like, and why humans will not
   be able to spot them
   – Why defensive AI technologies are uniquely positioned to fight back
   
   Click to Expand
   
   Speaker:
   
   Dillon Hawrylak
   
   Dillon Hawrylak
   
   Senior Cyber Technology Specialist at Darktrace
   
   Collapse This Item

 * Identity: The Core of Zero Trust 9:30 am
   
   Presented by Okta
   
   Identity powers cyber resilience, and acts as the basis for the secure
   adoption of modern IT innovations, and for the pursuit of digital
   transformation initiatives that are essential for business competitiveness.
   Identity is the core of a Zero Trust strategy: people are the critical
   component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s
   the foundation of the modern business in a world without perimeters.
   
   Join us for this session to learn more about taking an identity-first
   approach to your zero trust strategy, how you can successfully integrate
   identity into your existing security practice and why adopting identity-first
   security will help you realize your zero trust goals.
   
   Click to Expand
   
   Speaker:
   
   Marko Prudnikov
   
   Marko Prudnikov
   
   Solutions Engineer at Okta
   
   Collapse This Item

 * Is It Finally the Time to Let AI Drive Our Cyber Defenses and Security
   Operations? 9:50 am
   
   Presented by IRONSCALES
   
   AI has made significant advancements in recent years. Cybersecurity teams
   struggle to keep up with threats and a substantial skills shortage, making it
   an ideal space for AI-based tools to have a significantly positive impact.
   Join IRONSCALES as we share how AI has become powerful enough to detect and
   remediate around 99% of even the most advanced phishing attacks. But why is
   it not enough?
   
   Are we at the point where we can finally trust AI to take over cyber defenses
   and security operations, especially against phishing and account takeover
   attacks? Join us as we discuss:
   • Why 99% isn’t good enough when considering how many emails the average
   organization.
   • Adding tools to the security stack can create efficiency, but also risk.
   Listen as we share our experience with how we help our customers mitigate
   system risk, while also leveraging scalability through AI.
   • How humans can be part of the solution and not be viewed as a liability
   when it comes to cyber defenses.
   In conclusion, we hope you walk away with a better understanding of what the
   power of AI means to your security strategy and why it shouldn’t sideline
   humans just yet.
   
   Click to Expand
   
   Speaker:
   
   Eyal Benishti
   
   Eyal Benishti
   
   CEO and Founder at IRONSCALES
   
   Collapse This Item

 * Protecting Against Cyber Attacks 10:20 am
   
   We’ve seen the real-world consequences of cyberattacks – from the shutdown of
   the Colonial Pipeline to the slowing of care for hospital patients, to major
   disruptions in the food supply lines. The impact of a single attack can be
   far-reaching and devastating to all those affected. When paired with
   unprecedented geopolitical uncertainty, it’s never been more important for
   organizations to be vigilant against bad actors.
   
   Learn the latest techniques for developing your security posture with this
   expert panel discussion. Come prepared with your thoughts and questions and
   gain an insider’s perspective on the latest threats and most effective
   security strategies during this thoughtful, interactive session.
   
   Click to Expand
   
   Panel Participants:
   
   Paul Lewis
   
   Paul Lewis
   
   CEO at Calamu Technologies Corporation
   
   Jason Miller
   
   Jason Miller
   
   Founder & CEO at BitLyft
   
   Sam McHugh
   
   Sam McHugh
   
   MDR Specialist at Open Systems
   
   Collapse This Item

 * Three Myths of the Modern Attack Surface 11:05 am
   
   Presented by Cyberpion
   
   With Attack Surface Expansion first on Gartner’s Top Risk and Security Trends
   for 2022, one would assume that there is a broad understanding of the risk
   factors. These three widely believed myths are preventing security teams from
   effectively addressing this growing concern. In this presentation, Ran
   Nahmias, Cyberpion’s Co-Founder & CBO will take a deep dive into three myths
   of the Modern Attack Surface based on findings and industry trends backed by
   real-life anonymized customer data. If you are part of most security leaders,
   who are seeking more effective ways to combat this growing threat, this is a
   presentation you can’t afford to miss.
   
   Click to Expand
   
   Speaker:
   
   Ran Nahmias
   
   Ran Nahmias
   
   Co-Founder & CBO at Cyberpion
   
   Collapse This Item

 * Immutable Storage: Level-Up Your Ransomware Readiness 11:25 am
   
   Presented by Arcserve
   
   Data is expected to grow to 200 ZB by the end of 2025. That means more data
   to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice
   as a mid-market data protection strategy. The addition of the new “1” is a
   copy of the data on immutable storage. Backup data is a key tool in business
   continuity & disaster recovery planning. Securing this backup data and
   maintaining multiple copies allows for a resilient recovery plan – and it’s
   critical that your cyber security plan includes a reliable recovery plan. In
   the event of any disaster, natural or man-made, like a ransomware attack,
   getting your IT systems and workloads back on their feet as fast as possible
   is essential. Join us for this do-not-miss discussion as we share best
   practices to help keep your data protected and secure via multiple layers of
   defense.
   
   Click to Expand
   
   Speaker:
   
   Stacey Budd
   
   Stacey Budd
   
   Principal Solution Consultant at Arcserve
   
   Collapse This Item

 * Conference Lunch Break
   
 * Scaling Application Security to the speed of DevSecOps 12:10 pm
   
   Presented by ArmorCode
   
   Agile DevOps, Cloud Deployment, Microservices, and Open Source have all
   dramatically accelerated application delivery and complexity. Today’s AppSec
   teams depend on a collection of point security products and siloed manual
   processes. This makes it harder for AppSec teams and developers to gain
   visibility into the application risk surface and remediate it without slowing
   software releases. The resulting AppSec chaos means applications ship fast
   without the assurance of shipping securely, leaving the organization at risk
   of breaches and losses. With an effective AppSecOps program, companies can
   continue to ship software fast but without the unmanaged risk because their
   AppSec team has the automation practices to ensure risk reduction keeps pace
   with business demands.
   
   Click to Expand
   
   Speaker:
   
   Chipper Jones
   
   Chipper Jones
   
   Regional Director
   
   Collapse This Item

 * Nobody Cares That You Can Do Your Job: And How To Fix That 12:30 pm
   
   A pervasive problem in our industry is that no one thinks the executives or
   board understand or care about security. That leaves leaders and teams
   feeling disconnected and ineffective. This keynote will provide the tools and
   solution on how to tell the security story so that you are better heard and
   more successful.
   
   Click to Expand
   
   Speaker:
   
   Hadas Cassorla
   
   Hadas Cassorla
   
   CISO - M1 Finance
   
   Collapse This Item

 * Look Your Enemy in Their Eyes 1:20 pm
   
   Presented by Redacted
   
   It’s easy to get wrapped up in the technology questions: What are the
   products and services to ensure network security? Understanding the who and
   why of bad actors can drive better decisions—before, during, and after an
   attack. Learn how getting at the human side of cybersecurity can reduce
   threats and help remediate the inevitable breach.
   
   Click to Expand
   
   Speakers:
   
   Ryan Jamieson
   
   Ryan Jamieson
   
   Head of Advisory Services, Redacted
   
   Collapse This Item

 * Creating the Human Centric Network with Adaptive Trust 1:40 pm
   
   Presented by Axis
   
   Zero Trust and ZTNA have become a victim of vendor technical marketing. This
   session will break down the meaning of zero trust based on the founders of
   the movement and show you how to use this security framework to create a
   human centric network based on adaptive trust. This will enable you to unlock
   your network and security solutions to become a business enabler vs slowing
   down your organization.
   
   Click to Expand
   
   Speaker:
   
   John Spiegel
   
   John Spiegel
   
   Field CTO at Axis Security
   
   Collapse This Item

 * 2022 Trends & Directions 2:00 pm
   
   If 2022 has taught us anything so far, it’s that cybercriminals are still
   coming up with new ways to cash in. But with nearly half the year behind us,
   what can we anticipate for the rest of the year? Following a Shields Up
   warning from the Cybersecurity and Infrastructure Security Agency (CISA) in
   February, organizations and individuals have been encouraged to be more
   vigilant than ever. 
   
   Get insights on the latest in security from experts who live on the leading
   edge of cybersecurity technology. You’ll hear from industry luminaries on
   some of the newest tactics for defending against unprecedented attacks. Get a
   better sense of how your organization can spend the rest of 2022 with a
   security strategy that will set you up for success during this insightful
   discussion. 
   
    
   
   Click to Expand
   
   Panel Participants:
   
   Jay Stewart
   
   Jay Stewart
   
   Vice President at CORL Technologies
   
   Joe Potraza
   
   Joe Potraza
   
   Security Strategist at Mimecast North America
   
   Frank Kyazze
   
   Frank Kyazze
   
   Privacy Director at Kintent
   
   Collapse This Item

 * What You Don’t See Will Hurt You: Network Blind Spots, Visibility, and the
   importance of Being Proactive 2:45 pm
   
   Presented by Keysight
   
   Please join Keysight to discuss network blind spots, visibility, and the
   importance of ongoing network test. As networks continue to grow more complex
   and move into cloud and multi-cloud environments, getting an accurate view
   into your network has never been harder or more important. Security tools are
   only part of the answer as they are only as good as they data they receive.
   Learn how network visibility and testing are key aspects to a successful
   network security strategy.
   
   Click to Expand
   
   Speaker:
   
   Bill Canter
   
   Bill Canter
   
   Healthcare Business Development, Keysight Technologies
   
   Collapse This Item

 * Ransomware, Cyber Hygiene & Partnering with the FBI 3:05 pm
   
   Drawing from over 20 years of experience with cyber criminal and cyber
   national security investigations that have spanned the globe, this session
   will highlight lessons learned and best practices attendees can consider for
   themselves, their companies, agencies, or schools to help protect them from
   becoming victims at home or at work, along with helping to mitigate threats
   in their environments.  This session will also discuss how these best
   practices can be applied to cyber threats such as ransomware, supply chain
   attacks, extortion, and Business Email Compromise (BEC) in the year 2022 and
   beyond.  Moreover, this session will touch on cyber criminal and cyber nation
   state actors who are responsible for cyber attacks, giving attendees further
   insights on what to protect both in the real world and online.  The session
   will also offer insights on working with law enforcement, and the importance
   of proactively establishing relationships.
   
   Click to Expand
   
   Speakers:
   
   Philip Wislar
   
   Philip Wislar
   
   Assistant Special Agent in Charge at FBI, Atlanta Field Office
   
   Chad Hunt
   
   Chad Hunt
   
   Supervisory Special Agent at FBI, Atlanta Field Office
   
   Collapse This Item

 * Cyber Inter-Agency Collaboration Panel 3:35 pm
   
   Moderator:
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   Panel Participants:
   
   Philip Wislar
   
   Philip Wislar
   
   Assistant Special Agent in Charge at FBI, Atlanta Field Office
   
   Chad Hunt
   
   Chad Hunt
   
   Supervisory Special Agent at FBI, Atlanta Field Office
   
   Dean Glore
   
   Dean Glore
   
   Special Agent, USSS
   
   Zach Bulliner
   
   Zach Bulliner
   
   ATSAIC, USSS
   
   Collapse This Item

 * Keynote Presentation: Joye Purser 4:25 pm
   
   Cyberwars and the New Target: US Critical Infrastructure
   
   The explosion of ransomware and other cyber attacks have forever changed the
   strategic and business importance of the CISO. Dr. Joye Purser shares how and
   why the landscape has shifted, and what companies can do to better prepare
   for and respond to the inevitable cyber breach.
   
   Click to Expand
   
   Speaker:
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   Collapse This Item

 * Cyber Executive Panel 4:55 pm
   
   Submit your bio for consideration to participate in one of our Cyber
   Executive Panels
   
   to ciso@dataconnectors.com or fill out our Call for Speakers form here.
   
   Click to Expand
   
   Moderator:
   
   Joye Purser
   
   Joye Purser
   
   CEO and Founder at eastbysouthsolutions.com
   
   Panel Participants:
   
   Michael F. D. Anaya
   
   Michael F. D. Anaya
   
   Head of Attack Surface Analysis at Palo Alto Networks
   
   Steven Ferguson
   
   Steven Ferguson
   
   CIO - Technical College System of Georgia (TCSG)
   
   Jameeka Green Aaron
   
   Jameeka Green Aaron
   
   CISO at Auth0
   
   Collapse This Item

 * Conference Closing Session 5:20 pm
   
   Collapse This Item

 * Atlanta Cybersecurity Conference Networking Reception & Happy Hour 5:30 pm
   
   Collapse This Item

 * Partners
   
   Gold Partners
   
   
   
   Silver Partners
   
   
   
   Bronze Partners
   
   
   
   Exhibiting Partners
   
   
   
   Affiliate Partners
   
   
   
   Collapse This Item

Partners Register

500 Chesterfield Center
Suite 200
Chesterfield, MO 63017

636-778-9495

info@dataconnectors.com



ABOUT

 * Events
 * Sponsor
 * Partners
 * News

CONNECT

 * FAQ
 * Terms
 * Privacy Policy
 * Contact Us

Menu
 * Events
 * Partners Open submenu
 * News
 * Sponsor
 * Join

Close submenuPartners
 * Vendor Partners
 * Affiliate Partners

We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept”, you
consent to the use of ALL the cookies.
Cookie settingsACCEPT
Do not sell my personal information
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.

Analytics
analytics

Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

Functional
functional

Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

Advertisement
advertisement

Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.

Save & Accept