dataconnectors.com
Open in
urlscan Pro
2606:4700:3031::ac43:ad0c
Public Scan
Submitted URL: http://go.dc-cybersecurityevents.com/lnk/AG8AANMIF_gAAAAAAAAAACBhZscAAAAAXVYAAAAAABKm_wBjSA6bBDzJTfYmTMmoJG5JBlQ0tQASonI/4/9X_4ADfSyw...
Effective URL: https://dataconnectors.com/events/2022/october/atlanta/?aff=MJE6&utm_source=MJE6&utm_medium=Email&utm_campaign=ATL
Submission Tags: falconsandbox
Submission: On March 18 via api from US — Scanned from DE
Effective URL: https://dataconnectors.com/events/2022/october/atlanta/?aff=MJE6&utm_source=MJE6&utm_medium=Email&utm_campaign=ATL
Submission Tags: falconsandbox
Submission: On March 18 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Events UPCOMING EVENTS Mar 30 Kansas City Conference MAR 30 Kansas City Apr 13 Nashville Conference APR 13 Nashville Apr 20 Milwaukee Conference APR 20 Milwaukee View all events FIND AN EVENT All Events Past Events Why Attend? EVENTS BY LOCATION: -- Select --ALAlbuquerqueAnaheimArizonaAtlantaAugustaAustinBaltimoreBaton RougeBillingsBirminghamBoiseBostonBritish ColumbiaBurlingtonCACalgaryCanadaCaribbeanCentral AmericaCharlestonCharlotteCheyenneChicagoClevelandCleveland Marriott Downtown at Key TowerColoradoColumbiaColumbusConcrodCTDallasDCDenverDes MoinesDetroitDurhamEdmontonFLFloridaFort LauderdaleGAHartfordHelenaHilton MemphisHoustonIDIllinoisIndianaIndianapolisJacksonJacksonvilleJersey CityJW Marriott IndianapolisKansas CityLALas VegasLe Meridien Charlotte HotelLos AngelesMarylandMDMEMemphisMiamiMichiganMilwaukeeMinneapolisMontogmeryMontrealMSMTNashvilleNCNevadaNew MexicoNew OrleansNew YorkNew York CityNewportNHNJNVNYNYCOhioOmahaOntarioOROrlandoOttawaPAPennsylvaniaPhiladelphiaPhoenixPittsburghPortlandPRProvidenceQuebecRaleighRIRichmondSacramentoSalemSalt Lake CitySan AntonioSan DiegoSan FranciscoSanta FeSCSeattleSoCalSt. LouisSyracuseTampaTNTorontoTrentonTucsonTXUSVIUtahVAVancouverVirginiaVTWAWashington DCWisconsinWVWY-- Select -- * Partners FEATURED VENDOR PARTNERS View all vendor partners FEATURED AFFILIATE PARTNERS View all affiliate partners View all partners Become a Partner * Vendor Partners * Affiliate Partners * News * Sponsor * Join Join Conference ATLANTA CYBERSECURITY CONFERENCE When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Atlanta Cybersecurity Conference with thought leaders and luminaries face-to-face and gather insights on the latest trends and threats in cybersecurity to help you better navigate whatever cyber threats may come. At the Atlanta Cybersecurity Conference, you will gain unfettered access to many local CISOs, as well as representatives from government agencies and law enforcement, as they provide an in-depth analysis of the current state of cybersecurity with extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities. Whether you’re looking to grow your understanding about cloud security, working on improving your organization’s DevSecOps, or just looking to learn more about the current threat environment, the Atlanta Cybersecurity Conference will give you the knowledge you need to ensure your team’s success. Connect with Data Connectors on LinkedIn here! View Video Atlanta Date THU. OCT 20 Location Atlanta Marriott Marquis 265 Peachtree Center Avenue Atlanta, GA 30303 404-521-0000 Get Directions * Featured Speakers Hadas Cassorla Hadas Cassorla CISO - M1 Finance -------------------------------------------------------------------------------- Nobody Cares That You Can Do Your Job: And How To Fix That Philip Wislar Philip Wislar Assistant Special Agent in Charge at FBI, Atlanta Field Office -------------------------------------------------------------------------------- Ransomware, Cyber Hygiene & Partnering with the FBI Chad Hunt Chad Hunt Supervisory Special Agent at FBI, Atlanta Field Office -------------------------------------------------------------------------------- Ransomware, Cyber Hygiene & Partnering with the FBI Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com -------------------------------------------------------------------------------- Cyber Inter-Agency Collaboration Panel Philip Wislar Philip Wislar Assistant Special Agent in Charge at FBI, Atlanta Field Office -------------------------------------------------------------------------------- Cyber Inter-Agency Collaboration Panel Chad Hunt Chad Hunt Supervisory Special Agent at FBI, Atlanta Field Office -------------------------------------------------------------------------------- Cyber Inter-Agency Collaboration Panel Dean Glore Dean Glore Special Agent, USSS -------------------------------------------------------------------------------- Cyber Inter-Agency Collaboration Panel Zach Bulliner Zach Bulliner ATSAIC, USSS -------------------------------------------------------------------------------- Cyber Inter-Agency Collaboration Panel Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com -------------------------------------------------------------------------------- Keynote Presentation: Joye Purser Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com -------------------------------------------------------------------------------- Cyber Executive Panel Michael F. D. Anaya Michael F. D. Anaya Head of Attack Surface Analysis at Palo Alto Networks -------------------------------------------------------------------------------- Cyber Executive Panel Steven Ferguson Steven Ferguson CIO - Technical College System of Georgia (TCSG) -------------------------------------------------------------------------------- Cyber Executive Panel Jameeka Green Aaron Jameeka Green Aaron CISO at Auth0 -------------------------------------------------------------------------------- Cyber Executive Panel Collapse This Item EVENT SCHEDULE Times for the Atlanta Cybersecurity Conference are in Eastern Time (CDT/CST). The Conference will be open from 8:00 AM to 6:30 PM Thursday, October 20th. * Welcome to the Atlanta Cybersecurity Conference * The State of Phishing: An Under the Hood Look at the Latest Phishing Tactics 8:30 am Presented by INKY Account Takeover Attacks (ATO), Business Email Compromise (BEC) and Ransomware attacks are most definitely on the rise and some of the biggest problems facing security teams in 2022. You could say 2022 is the year that phishing became an ‘industry’. The volume, variety, sophistication, and impact of phishing attacks have risen dramatically as black-hat players have organized themselves around what they see as a fast-growing opportunity. Specialists have risen in all areas as phishing/malware/ransomware-as-a-service have become a reality. The impact of ransomware payloads attached to phishing exploits have been felt worldwide. Such attacks are the main driver behind the dramatic increase in financial penalties suffered by corporate victims. Criminals are using sophisticated tactics that are designed to slip through legacy gateway protection. Dave Baggett, CEO of INKY Technology will take you on an in-depth look, using real world examples of the latest deceptive tricks been used to circumvent these secure email gateways. Click to Expand Speaker: Dave Baggett Dave Baggett Chief Executive Officer at INKY Collapse This Item * The Battle of Algorithms: How AI Is Beating AI at Its Own Game 8:50 am Presented by Darktrace Presentation Abstract: Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike. In this session, discover: – How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons – What an AI-powered spoofing threat may look like, and why humans will not be able to spot them – Why defensive AI technologies are uniquely positioned to fight back Click to Expand Speaker: Dillon Hawrylak Dillon Hawrylak Senior Cyber Technology Specialist at Darktrace Collapse This Item * Identity: The Core of Zero Trust 9:30 am Presented by Okta Identity powers cyber resilience, and acts as the basis for the secure adoption of modern IT innovations, and for the pursuit of digital transformation initiatives that are essential for business competitiveness. Identity is the core of a Zero Trust strategy: people are the critical component of a Zero Trust ecosystem. Identity isn’t the new perimeter – it’s the foundation of the modern business in a world without perimeters. Join us for this session to learn more about taking an identity-first approach to your zero trust strategy, how you can successfully integrate identity into your existing security practice and why adopting identity-first security will help you realize your zero trust goals. Click to Expand Speaker: Marko Prudnikov Marko Prudnikov Solutions Engineer at Okta Collapse This Item * Is It Finally the Time to Let AI Drive Our Cyber Defenses and Security Operations? 9:50 am Presented by IRONSCALES AI has made significant advancements in recent years. Cybersecurity teams struggle to keep up with threats and a substantial skills shortage, making it an ideal space for AI-based tools to have a significantly positive impact. Join IRONSCALES as we share how AI has become powerful enough to detect and remediate around 99% of even the most advanced phishing attacks. But why is it not enough? Are we at the point where we can finally trust AI to take over cyber defenses and security operations, especially against phishing and account takeover attacks? Join us as we discuss: • Why 99% isn’t good enough when considering how many emails the average organization. • Adding tools to the security stack can create efficiency, but also risk. Listen as we share our experience with how we help our customers mitigate system risk, while also leveraging scalability through AI. • How humans can be part of the solution and not be viewed as a liability when it comes to cyber defenses. In conclusion, we hope you walk away with a better understanding of what the power of AI means to your security strategy and why it shouldn’t sideline humans just yet. Click to Expand Speaker: Eyal Benishti Eyal Benishti CEO and Founder at IRONSCALES Collapse This Item * Protecting Against Cyber Attacks 10:20 am We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors. Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session. Click to Expand Panel Participants: Paul Lewis Paul Lewis CEO at Calamu Technologies Corporation Jason Miller Jason Miller Founder & CEO at BitLyft Sam McHugh Sam McHugh MDR Specialist at Open Systems Collapse This Item * Three Myths of the Modern Attack Surface 11:05 am Presented by Cyberpion With Attack Surface Expansion first on Gartner’s Top Risk and Security Trends for 2022, one would assume that there is a broad understanding of the risk factors. These three widely believed myths are preventing security teams from effectively addressing this growing concern. In this presentation, Ran Nahmias, Cyberpion’s Co-Founder & CBO will take a deep dive into three myths of the Modern Attack Surface based on findings and industry trends backed by real-life anonymized customer data. If you are part of most security leaders, who are seeking more effective ways to combat this growing threat, this is a presentation you can’t afford to miss. Click to Expand Speaker: Ran Nahmias Ran Nahmias Co-Founder & CBO at Cyberpion Collapse This Item * Immutable Storage: Level-Up Your Ransomware Readiness 11:25 am Presented by Arcserve Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense. Click to Expand Speaker: Stacey Budd Stacey Budd Principal Solution Consultant at Arcserve Collapse This Item * Conference Lunch Break * Scaling Application Security to the speed of DevSecOps 12:10 pm Presented by ArmorCode Agile DevOps, Cloud Deployment, Microservices, and Open Source have all dramatically accelerated application delivery and complexity. Today’s AppSec teams depend on a collection of point security products and siloed manual processes. This makes it harder for AppSec teams and developers to gain visibility into the application risk surface and remediate it without slowing software releases. The resulting AppSec chaos means applications ship fast without the assurance of shipping securely, leaving the organization at risk of breaches and losses. With an effective AppSecOps program, companies can continue to ship software fast but without the unmanaged risk because their AppSec team has the automation practices to ensure risk reduction keeps pace with business demands. Click to Expand Speaker: Chipper Jones Chipper Jones Regional Director Collapse This Item * Nobody Cares That You Can Do Your Job: And How To Fix That 12:30 pm A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful. Click to Expand Speaker: Hadas Cassorla Hadas Cassorla CISO - M1 Finance Collapse This Item * Look Your Enemy in Their Eyes 1:20 pm Presented by Redacted It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach. Click to Expand Speakers: Ryan Jamieson Ryan Jamieson Head of Advisory Services, Redacted Collapse This Item * Creating the Human Centric Network with Adaptive Trust 1:40 pm Presented by Axis Zero Trust and ZTNA have become a victim of vendor technical marketing. This session will break down the meaning of zero trust based on the founders of the movement and show you how to use this security framework to create a human centric network based on adaptive trust. This will enable you to unlock your network and security solutions to become a business enabler vs slowing down your organization. Click to Expand Speaker: John Spiegel John Spiegel Field CTO at Axis Security Collapse This Item * 2022 Trends & Directions 2:00 pm If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. Click to Expand Panel Participants: Jay Stewart Jay Stewart Vice President at CORL Technologies Joe Potraza Joe Potraza Security Strategist at Mimecast North America Frank Kyazze Frank Kyazze Privacy Director at Kintent Collapse This Item * What You Don’t See Will Hurt You: Network Blind Spots, Visibility, and the importance of Being Proactive 2:45 pm Presented by Keysight Please join Keysight to discuss network blind spots, visibility, and the importance of ongoing network test. As networks continue to grow more complex and move into cloud and multi-cloud environments, getting an accurate view into your network has never been harder or more important. Security tools are only part of the answer as they are only as good as they data they receive. Learn how network visibility and testing are key aspects to a successful network security strategy. Click to Expand Speaker: Bill Canter Bill Canter Healthcare Business Development, Keysight Technologies Collapse This Item * Ransomware, Cyber Hygiene & Partnering with the FBI 3:05 pm Drawing from over 20 years of experience with cyber criminal and cyber national security investigations that have spanned the globe, this session will highlight lessons learned and best practices attendees can consider for themselves, their companies, agencies, or schools to help protect them from becoming victims at home or at work, along with helping to mitigate threats in their environments. This session will also discuss how these best practices can be applied to cyber threats such as ransomware, supply chain attacks, extortion, and Business Email Compromise (BEC) in the year 2022 and beyond. Moreover, this session will touch on cyber criminal and cyber nation state actors who are responsible for cyber attacks, giving attendees further insights on what to protect both in the real world and online. The session will also offer insights on working with law enforcement, and the importance of proactively establishing relationships. Click to Expand Speakers: Philip Wislar Philip Wislar Assistant Special Agent in Charge at FBI, Atlanta Field Office Chad Hunt Chad Hunt Supervisory Special Agent at FBI, Atlanta Field Office Collapse This Item * Cyber Inter-Agency Collaboration Panel 3:35 pm Moderator: Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com Panel Participants: Philip Wislar Philip Wislar Assistant Special Agent in Charge at FBI, Atlanta Field Office Chad Hunt Chad Hunt Supervisory Special Agent at FBI, Atlanta Field Office Dean Glore Dean Glore Special Agent, USSS Zach Bulliner Zach Bulliner ATSAIC, USSS Collapse This Item * Keynote Presentation: Joye Purser 4:25 pm Cyberwars and the New Target: US Critical Infrastructure The explosion of ransomware and other cyber attacks have forever changed the strategic and business importance of the CISO. Dr. Joye Purser shares how and why the landscape has shifted, and what companies can do to better prepare for and respond to the inevitable cyber breach. Click to Expand Speaker: Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com Collapse This Item * Cyber Executive Panel 4:55 pm Submit your bio for consideration to participate in one of our Cyber Executive Panels to ciso@dataconnectors.com or fill out our Call for Speakers form here. Click to Expand Moderator: Joye Purser Joye Purser CEO and Founder at eastbysouthsolutions.com Panel Participants: Michael F. D. Anaya Michael F. D. Anaya Head of Attack Surface Analysis at Palo Alto Networks Steven Ferguson Steven Ferguson CIO - Technical College System of Georgia (TCSG) Jameeka Green Aaron Jameeka Green Aaron CISO at Auth0 Collapse This Item * Conference Closing Session 5:20 pm Collapse This Item * Atlanta Cybersecurity Conference Networking Reception & Happy Hour 5:30 pm Collapse This Item * Partners Gold Partners Silver Partners Bronze Partners Exhibiting Partners Affiliate Partners Collapse This Item Partners Register 500 Chesterfield Center Suite 200 Chesterfield, MO 63017 636-778-9495 info@dataconnectors.com ABOUT * Events * Sponsor * Partners * News CONNECT * FAQ * Terms * Privacy Policy * Contact Us Menu * Events * Partners Open submenu * News * Sponsor * Join Close submenuPartners * Vendor Partners * Affiliate Partners We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. Cookie settingsACCEPT Do not sell my personal information Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Analytics analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Functional functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Advertisement advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Save & Accept