Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 24, 2022
    9:00 am
    [PLUS Course] Privacy & Security by Design & Default: Understanding the Convergence of Law, Policy & Technology
    • session level icon
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 119

    9:00-10:30 — [Part 1] Trends in the Law: An Overview of the Regulatory & Legal Landscape
    10:30 – 11:00 — Break
    11:00-12:30 — [Part 2] Privacy by Design & by Default: The Legal & Policy Requirements
    12:30 – 2:00 — Lunch Break
    2:00-4:00 — [Part 3] Operationalizing Privacy by Design & by Default

    Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and security. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. These evolving privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning.

    Often, the concepts of security and privacy by design and by default are built into these legal requirements. But, understanding the requirements of the law, and translating those requirements into technological solutions can be challenging. This workshop will provide in-depth understanding of those legal requirements, and provide a framework to help the industry incorporate these core concepts of design within technology.

    The course will start with an overview of general privacy and security legal and policy principles, and then will focus on two key laws that are pushing the privacy and security laws: the European Union’s General Data Protection Regulation (“GDPR”) and the California Consumer Privacy Act of 2018 (“CCPA”). Using these laws, we will discuss case studies, and how to communicate, plan, and strategize on products and solutions that incorporate privacy and security requirements.

    The course will include both lecture and hands-on exercises. The goal is for attendees to take away tools and strategies to bring this conversation to their teams and departments.

  • Wednesday, May 25, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:00 pm
    Location / Room: Registration Lobby

    Come to the Registration desk in the lobby to check-in and get your badge.

    7:30 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    speaker photo
    Chief Information Security & Privacy Officer, Bed Bath & Beyond
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:20 am
    Location / Room: 119

    This roundtable is for our Advisory Council members only.

    Join Antonio Andrews, CISO of Bed Bath & Beyond, as he leads a discussion exploring the cultural shift of the workforce and how leadership is evolving with the new demands. From staying competitive with working wages to new vulnerabilities in organization strategy, the leadership role for InfoSec is more critical than ever before. Discuss with peers what they wish they would have known prior to the work from home shift, and how they have adapted to the changes in real-time since.

    7:30 am
    InfraGard Atlanta Members Alliance — Meeting open to all attendees
    • session level icon
    Digital Exhaust Exploitation, Activity Based Intelligence, and New Cyber-Social Threat Models
    speaker photo
    Founder & Owner, Motley Matrix LLC
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 8:20 am
    Location / Room: Keynote Theater

    The exploitation of one’s digital footprint/digital exhaust is a primary concern for our country’s key resources and infrastructure personnel as threat actors continue to proliferate data that may be aggregated to identify and track corporate executives, leadership, scientists, and protected subject matter experts. Activity-based intelligence (ABI) gained from today’s social media platforms and IoT devices rapidly secures and identifies data to discover relevant behavioral and location patterns with the end goal of generating decision advantage. This presentation will spotlight the protection of one’s digital exhaust as critical for safeguarding sensitive information, preventing insider threats, and ensuring continued American leadership in the fields of science and technology, while mitigating risks to America’s national and economic security.

     

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:30 am
    [Opening Keynote] Evolution of the CISO Role
    • session level icon
    speaker photo
    SVP, Global Chief Security Officer, Aflac
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote Theater

    No longer is the CISO “just” a senior-level executive responsible for developing, implementing, and overseeing an information security program. The role is changing, evolving, and expanding almost as fast as the sophistication and volume of cyberattacks. In recent years, cybersecurity has become a Board-level topic and has elevated the CISO role to one with Board-reporting responsibilities. The role of a CISO has become much more complex focusing not only on the security program, but on business resiliency and enablement, legal and regulatory compliance, business strategy and financial advisement, cyber assurance, public-private partnerships, evolving threats, cultural shifts, and economic changes. In this session, Tim Callahan, Aflac’s Global CISO, will lead a discussion on the new responsibilities of the CISO, what information needs to be reported to the Board, the policies and regulations impacting CISOs, and the broad set of skills needed by the modern CISO.

    9:15 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:15 am - 9:45 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    9:45 am
    Risk Management: Understanding Management of Cybersecurity Risks
    • session level icon
    speaker photo
    Cybersecurity Technology Director, Gannett Fleming
    Registration Level:
    • session level iconConference Pass
    9:45 am - 10:30 am
    Location / Room: 4

    This interactive session will present a simple model for assessing and managing cybersecurity risks in an organization. This five-step approach is a practical method that anyone can follow in order to assess and manage cybersecurity risks. We will also discuss how to communication risks to executive leadership.

    9:45 am
    The Silent Scream of Every Network: The Horror that Is Active Directory Security
    • session level icon
    speaker photo
    Chief Technology & Security Strategist, Tenable
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:30 am
    Location / Room: 3

    Lying deep in every network is Active Directory (AD). The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. It rarely is given the attention that it needs to withstand the onslaught from attackers, both inside and outside. Everyone knows it needs attention, but one wrong setting could cause it to stop, causing total disruption of the network. M&A can cause significant security holes if not analyzed thoroughly. Let Derek Melber, 17-time Microsoft MVP, show you how to secure AD, making it capable of withstanding the constant attacks.

    9:45 am
    Déjà Vu All Over Again: The Student Body Left Problem
    • session level icon
    speaker photo
    CISO of North America, Checkmarx
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:30 am
    Location / Room: 5

    Recent Common Vulnerabilities and Exposures (CVE) announcements like Apache Log4j have upended software teams all over the world. Scheduled work comes to a grinding halt, and triage and emergency surgery must be performed on applications. If not prepared, this unplanned work can derail productivity for weeks or even months. The longer it takes, the more pressure is applied by management. You can reduce the impact.

    Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps.

    A potential scenario: the security team has called an emergency meeting. A new vulnerability has been publicly disclosed that impacts not only your software, but your company and your customers. Will the required remediation take hours or even weeks to complete? It depends on your preparedness.

    To improve your readiness and reduce impact, we will look at tips and actions you can take now.

    1. Learn more about the scope of the mess that was created by the Log4j CVE.
    2. Why most companies struggled to address it quickly.
    3. What steps you can take now to be ready for the next one.
    9:45 am
    Best Practices for Cloud Compliance
    • session level icon
    speaker photo
    Global Telco/SI Architects, Americas Sales, Check Point
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:30 am
    Location / Room: C
    10:40 am
    Best Practices for Developing an Enterprise-Wide Approach to Data Security & Privacy Compliance
    • session level icon
    speaker photo
    Privacy Compliance & Digital Accessibility Team Leader, Beckage Law
    Registration Level:
    • session level iconConference Pass
    10:40 am - 11:25 am
    Location / Room: 4

    Key Take-Away:
    The session will illustrate how a comprehensive compliance program can minimize legal risk and assist in improving the overall posture and strength of an organization’s data security and privacy infrastructure.

    Attendees will be provided with a high- level organizational framework for managing the key areas related to the development of a robust data security and privacy compliance program within their organization. Gone are the days that data security and privacy can be addressed in independent silos within segments of a business. The presentation will allow them to understand the purpose of each component specifically as it relates to legal and regulatory obligations, as well as from a cyber security and risk management perspective. Attendees will also walk away with a practical understanding of how to involve key stakeholders at various points in the compliance program development process, and the importance of employee engagement and training as it pertains to the overall data security and compliance culture within an organization.

    Presentation Level: MANAGERIAL (security and business leaders)

    10:40 am
    Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
    • session level icon
    speaker photo
    Sales CTO & Principal Engineer, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:40 am - 11:25 am
    Location / Room: 3

    Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

    • Why breaches are usually occurring
    • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
    • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations

    Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.

    10:40 am
    (ISC)2 Atlanta Chapter Meeting - Open to all attendees
    • session level icon
    Cloud 101: What Is It, Really?
    speaker photo
    President, (ISC)2 Atlanta Chapter
    Registration Level:
    • session level iconOpen Sessions
    10:40 am - 11:25 am
    Location / Room: Keynote Theater

    Chapter meeting and presentation, “Cloud 101: What Is It, Really?”

    10:40 am
    [Panel] Prioritizing the Threats
    • session level icon
    speaker photo
    Technical Evangelist, Synopsys
    speaker photo
    Chief Security Officer, Semperis
    speaker photo
    Sr. Sales Executive, Open Systems
    speaker photo
    Senior Cyber Threat Intelligence Analyst, Digital Shadows
    speaker photo
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    10:40 am - 11:25 am
    Location / Room: 5

    Ransomware, Business emails compromise, Cloud mis-configurations, Social Engineering, Insider Threats… the list goes on and on. The threats are everywhere. Some are new but the old ones work just as well. How do you decide which ones are of the most concern to your organization? Do you report all of these to the board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to prioritize the threats.

    11:30 am
    [Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    speaker photo
    Assistant U.S. Attorney, Northern District of Georgia, United States Attorneys' Offices
    speaker photo
    Network Intrusion Forensic Analyst, United States Secret Service
    speaker photo
    Sr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret Service
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:30 pm
    Location / Room: Keynote Theater
    11:30 am
    Advisory Council Roundtable Lunch [VIP / Invite Only]
    • session level icon
    Topic: De-Risking IT/OT Convergence
    speaker photo
    Director, North America Systems Engineering, Skybox Security
    Registration Level:
    • session level iconVIP / Exclusive
    11:30 am - 12:30 pm
    Location / Room: 119

    The convergence of operational technology (OT) and IT systems creates complexity and places organizations at high risk of cyber-attacks. The proliferation of networked sensors (IoT) has increased the attack surface, taxing the responsiveness of network perimeter security and vulnerability management teams. Concepts like ZTA and SASE, while conceptually beneficial, can introduce even more uncertainty to the hybrid environment. These problems used to be confined within the data center walls but Digital Transformation projects have greatly increased the scope of challenges. It’s not just an IT problem anymore as industrial control systems and the like look to leverage the benefits of automation and centralized control via the network.

    We will explore some of these challenges, approaches taken by your fellow leaders, and outcomes.

    Presented by:

    12:30 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:30 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:00 pm
    [Panel] Tales from the Cloud: Doing More with Less
    • session level icon
    speaker photo
    VP, Global Sales Engineering, Beyond Identity
    speaker photo
    Head of Solutions Consulting, DoControl
    speaker photo
    Director, Solutions Engineering, Authomize
    speaker photo
    Field CTO, Arctic Wolf
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:50 pm
    Location / Room: C

    The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.

    1:00 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    Area VP - Security Strategist, Deepwatch
    speaker photo
    CEO, Red Sentry
    speaker photo
    Vice President, Product, Recorded Future
    speaker photo
    Founder & CEO, BlackCloak
    speaker photo
    CISSP, C|EH, Sales Engineering Manager, Proofpoint
    speaker photo
    Senior Solutions Engineer, Automox
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:50 pm
    Location / Room: Keynote Theater

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    2:00 pm
    Incident Response: Look Who's Talking
    • session level icon
    speaker photo
    Americas Lead for Human Cyber Risk and Education, EY
    Registration Level:
    • session level iconConference Pass
    2:00 pm - 2:45 pm
    Location / Room: 3

    Key Takeaway:
    Learn the essential elements of crisis communications and reputation control for the cybersecurity team and the elements not exercised in most Incident Response plans.

    The ability to control the narrative during a cyber event will shape public perception of the company’s preparedness for a cyber event. In a cyber crisis, for everyone outside of the technical teams, perception is reality, and that reality may affect the company’s reputation long after the incident is over. Businesses have a significant reliance on technology; a breach of customer trust can be just as devastating as a network breach. Employees who are unsure of the circumstances will not hesitate to share on social media. Does the Incident Response plan account for reputation control? How will the company handle crisis communications during a cyber incident?

    2:00 pm
    Reducing Implicit Trust in Your Cloud Service Provider
    • session level icon
    speaker photo
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: 5

    As organizations embark on a cloud-first strategy, they often find they’re placing excessive trust in their cloud service provider to protect the sensitivity of their organization’s assets, especially sensitive data. During this presentation, we provide an overview of how the cloud service provider requires you to participate in a shared security model and how your organization can retain control of your sensitive data encryption. In other words: your data, their cloud! We’ll discuss and show how using newer tools and techniques—that include split trust, ubiquitous data encryption, and contextual access—reduce and mitigate implicit trust in your cloud provider along with allowing you to manage your own encryption and manage access to your data in the cloud.

    2:00 pm
    Counter Threat Unit: Applying Threat Intelligence in the Current Threat Landscape
    • session level icon
    speaker photo
    Executive Consultant CTU/IR, Secureworks
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: 4

    How do threats appear in your network and who is behind this malicious activity? What can you do to protect yourselves from this threat and who can help identify malicious activity? In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk. Terry McGraw will take you through real-life threat engagements and show how decades of threat intelligence—earned from real-life IR engagements around the world—can be used as a powerful tool in the fight against cybercriminals.

    2:00 pm
    Cyversity Chapter Meeting - Open to all attendees
    • session level icon
    Evolution of Crypto and DEFI Hacks
    speaker photo
    Engineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: C

    Jovonni Pharr will demonstrate a variety of attack vectors used in real-world crypto hacks and show the evolution of how hackers are exploiting the crypto community over time. The discussion will highlight:

    • Cybersecurity implications of tactics used in some of the largest cryptocurrency hacks
    • The cyber threat landscape in the crypto space
    • How nation state actors are using the space to grow their operations
    • U.S. government responses to the threat landscape

    Hear from leaders of the Atlanta chapter of Cyversity. https://www.cyversity.org/events/category/atlanta/ 

    2:30 pm
    Happy Hour
    • session level icon
    Sponsored by Automox
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beer, wine, and soda. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    Generously sponsored by:

    2:45 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [Closing Keynote] Where Are All the Cyber-nauts?
    • session level icon
    speaker photo
    Principal Security Advisor, AWS; Former CISO, Federal Reserve Bank of Atlanta
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater
Exhibitors
  • Akeyless
    Booth: 130

    Akeyless’ unique combination of innovative technology and cloud-native architecture, enables enterprises to fastly secure DevOps, cloud workloads, and legacy environments, while meeting compliance and regulations.

  • Arctic Wolf Networks
    Booth: 240

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Atlanta Cyber Fraud Task Force (CFTF)
    Booth: 810

    Cyber Fraud Task Forces (CFTFs), the focal point of U.S. Secret Service cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Atlantic Data Security
    Booth: 650

    Since 1993, Atlantic has been representing industry leading security products to help get customers to an acceptable level of IT security risk. Atlantic works extensively with both large enterprises and SMB markets, understanding their business goals before any solution is recommended. Atlantic’s strict focus ensures that customers receive the highest level of both service and support.

  • Authomize
    Booth: 250

    Authomize continuously monitors your identities, access privileges, assets, and activities, in order to secure all your apps and cloud services. Our granular visibility across IaaS, SaaS, and various data services enables organizations to ensure effective control over their access privileges and the security of their assets.

  • Automox
    Booth: 600

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Beyond Identity
    Booth: 220

    The most secure, passwordless authentication platform for tech forward-thinking organizations, globally. Breaking down the barriers between identity, security, and device management, Beyond Identity fundamentally changes the way the world logs in–eliminating passwords and providing users with a frictionless multi-factor login experience.

  • BlackCloak, Inc
    Booth: 700

    BlackCloak provides digital protection for corporate executives, Board Members, and high-profile and high-net-worth individuals and their families. Its award-winning Concierge Cybersecurity & Privacy™ Platform combines proprietary software with white-glove client service to prevent cyberattacks originating in an enterprise leader’s personal life from moving laterally into the organization. The Platform also protects individuals and their families from financial fraud, identity theft, targeted cyberattacks, reputational damage and other threats to privacy and security. Thousands of CISOs, CIOs, CFOs, and General Counsels trust BlackCloak to protect the personal privacy, devices, and homes of their most important personnel so they can continue to focus exclusively on what they do best: protecting the enterprise from cyberattack.

  • Centripetal
    Booth: 550

    Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.

  • Check Point Software Technologies Inc.
    Booth: 200

    Check Point Software Technologies Inc. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Checkmarx Inc.
    Booth: 510

    Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

  • Critical Start
    Booth: 640

    Critical Start is a cybersecurity company with a holistic, customer-focused approach. We work with our customers to understand the impact of IT on their business and determine the associated risks. Using this risk profile, we can offer big-picture guidance on the strategies and controls that will enable them to effectively manage risk and improve security. Critical Start is 100% employee owned by a team of experts who are passionate about security, quality and service. For more information on what sets us apart, visit criticalstart.com.

  • Cybercrime Support Network
    Booth: N/A

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Cynet
    Booth: 150

    Cynet 360 is the world’s first autonomous breach protection platform. Cynet eliminates the need of complex multi-product stacks, making robust breach protection within reach for any organization.

  • Cyversity Atlanta Chapter
    Booth: 830

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • deepwatch
    Booth: 630

    deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry. Designed to be different, deepwatch provides customers with world-class managed security services and unrivaled value by extending their cybersecurity teams, curating leading technologies into deepwatch’s cloud SecOps platform, and proactively driving their SecOps maturity.

  • Digital Shadows
    Booth: 540

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation.

  • DoControl Inc.
    Booth: 350

    DoControl’s mission is to build a future where SaaS application-based business enablement and security are balanced through technology, automation, and simplicity. We work hand-in-hand with our customers and partners to deliver automated security solutions that are purpose-built for today’s fast paced business environment.

  • Exabeam
    Booth: 300

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • FortifyData
    Booth: 800

    The FortifyData platform enables Enterprises to identify and manage their risk exposure across their entire attack surface – This includes external, internal, cloud configuration, and also third party risks. This information is then published as a Security Rating, translated into Cyber Risk Quantification and can further be customized with configurable risk models driving the most insightful cybersecurity risk indications on any company.

  • ISACA Atlanta
    Booth: 875

    The aim of the ISACA Atlanta Chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help further promote and elevate the visibility of the IT audit, risk, control and security professions throughout the local area.

    Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology.

  • ISSA Metro Atlanta Chapter
    Booth: 840

    The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • (ISC)2 Atlanta
    Booth: 850

    (ISC)² Atlanta chapter encompasses the Atlanta Metro area. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.

    Our mission is to advance information security in local communities throughout Atlanta, Georgia, by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. ​

  • InfraGard Atlanta Members Alliance
    Booth: 820

    InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.

    InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.

    IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.

  • Legit Security
    Booth: 500

    Legit Security is a cyber security company offering a SaaS-based solution that secures an organization’s software supply chain to prevent sensitive data leaks and insecure software releases. Legit provides enterprise security leaders with the visibility and contextual information they need to minimize risk, and provides software development and DevOps leaders with tools to ensure their teams and build processes adhere to best practices. With Legit Security, your business can stay secure while releasing software fast.

    Software supply chain attacks and security incidents involving the SDLC are growing rapidly, and can result in devastating damage including an unfortunate multiplier effect on downstream software consumers all with one attack. The team at Legit Security is on a mission to protect companies from this rapidly growing threat with a SaaS solution that supports both cloud and on-prem resources and is very easy to implement. Contact us to learn more about our solution and career opportunities at Legit.

  • Mimecast
    Booth: 610

    Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.

  • Netskope
    Booth: 620

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Open Systems
    Booth: 410

    The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.

    We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.

    The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.

  • Proofpoint
    Booth: 520

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Recorded Future
    Booth: 340

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • Red Canary
    Booth: 530

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • Red Sentry
    Booth: 140

    Red Sentry is a next-gen vulnerability scanning and penetration testing company that actually mimics hackers, finding companies’ vulnerabilities before attackers can. With Red Sentry’s unique approach, companies are notified of new threats to their cyber environment 24 hours a day, 365 days a year.

  • RiskRecon
    Booth: 110

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • Secureworks
    Booth: 170

    Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

  • Security Innovation
    Booth: 320

    For almost two decades, global clients have trusted Security Innovation to help them learn how to defend software applications and sensitive data from cyber-threats and attacks. We understand the challenges facing today’s enterprise, where reputation and customer trust is on the front lines. That’s why we continually work to discover and overcome the latest security threats with our Centers of Excellence, and integrate this knowledge into every training and assessment solution we deliver.

  • Semperis
    Booth: 230

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • Skybox Security
    Booth: 210

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Sonatype
    Booth: 310

    Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally

  • Synopsys
    Booth: 120

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tenable
    Booth: 160

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • Tessian
    Booth: 100

    Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like March Capital, Sequoia, Accel, and Balderton and has offices in San Francisco, Boston and London.

  • Thales
    Booth: 400

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • WiCyS Georgia Affiliate
    Booth: N/A
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Instructor: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law

    Jordan Fischer leads Beckage's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Moderator: Antonio Andrews
    Chief Information Security & Privacy Officer, Bed Bath & Beyond
  • speaker photo
    Dana K. Motley
    Founder & Owner, Motley Matrix LLC

    Motley Matrix is a unique digital marketing, social media and cyber intelligence small business. Current contracts support defense community collaborations, organizations within the CVE space, law enforcement and homeland security directives. Presentations and products leverage social media intelligence, cyber-social threat investigation, open source intelligence and facial recognition subject matter expertise. Registered Federal Contractor.

  • speaker photo
    Tim Callahan
    SVP, Global Chief Security Officer, Aflac

    Timothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for directing Aflac’s global security strategy and leading the information security, business continuity and disaster recovery functions across the company to prioritize security initiatives and allocate resources based on appropriate risk assessments.

  • speaker photo
    Tamika Bass
    Cybersecurity Technology Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Derek Melber
    Chief Technology & Security Strategist, Tenable

    Derek Melber is an accomplished Chief Technology and Security Strategist, Advisor, and Professional Speaker with more than 25 years of success across the computer & network security industries. As a 17X Microsoft MVP, leveraging extensive experience in unifying products, marketing, sales, and content, he is a valuable advisor for any organization trying to achieve success and exceed company goals around identity security and management. His broad areas of expertise include Active Directory, Group Policy, identity security, network security, and information technology management.

  • speaker photo
    Peter Chestna
    CISO of North America, Checkmarx

    Pete Chestna serves as the CISO of North America at Checkmarx, where he provides customers and prospects with practical advice for building successful application security programs. Bringing more than 15 years of direct AppSec practitioner experience, Pete has held roles ranging from developer and development leader to his most recent position as the Global Head of AppSec for the Bank of Montreal.

    Over the years, Pete has led organizational transformations from Waterfall to Agile to DevOps and from monolith to microservice architectures. He is certified as both a scrum master and product owner. Stemming from his experience as both an avid practitioner and consultant, Pete has spoken internationally at numerous prominent security and developer conferences including DevOpsDays, All Day DevOps, OWASP AppSec, and DevSecCon.

    Pete has been granted three patents. He enjoys whiskey tourism, astronomy model rocketry, and listening to Rush in his spare time.

  • speaker photo
    Rodrique Boutros
    Global Telco/SI Architects, Americas Sales, Check Point

    Rodrique has been with Check Point Software for nine years. He has more than 18 years of industry experience in IT networking and network security. The past four years, he has been focused on cloud security, supporting the Check Point field as a Data Center Virtualization and Cloud Security Solution Architect within the Americas.

  • speaker photo
    Kara L. Hilburger, Esq.
    Privacy Compliance & Digital Accessibility Team Leader, Beckage Law

    Kara advises and counsels clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state and international privacy laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Virginia Consumer Data Protection Act (VCDPA) and the Colorado Privacy Act (CPA), the Fair Credit Reporting Act (FCRA) and the Telephone Consumer Protection Act (TCPA). The scope of her work includes data privacy regulatory assessments, information privacy protocols & policies, external policies & data collection, data mapping, information security protocols & policies, employee data security policies and incident response plan development.

    Kara concentrates a portion of her practice in the representation of clients in consumer facing technology and privacy regulatory matters, such as digital accessibility requirements under the ADA, and website compliance and disclosure requirements pertaining to privacy policies and cookie consent notices. She has successfully defended numerous clients in ADA website accessibility class action proceedings, providing proactive counsel regarding website remediation, litigation strategy, defense and settlement. She develops comprehensive operational procedures, training and compliance protocols in these areas, and assists clients in navigating the legal and practical implications in developing comprehensive digital accessibility infrastructures. Kara draws on her experience in labor and employment law to advise on technology and privacy matters in the workplace and in the development of organization wide procedures and training programs that engage stakeholders and employees as active partners in the data privacy & compliance process. She provides innovative and thoughtful guidance in areas such as bring-your-own-device (BYOD) policies, social media and technology-use issues, and workplace privacy concerns.

    Kara is a Certified Information Privacy Professional, United States (CIPP/US) as certified by the International Association of Privacy Professionals (IAPP).

  • speaker photo
    Bob Reny
    Sales CTO & Principal Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.

  • speaker photo
    Mikal Hass
    President, (ISC)2 Atlanta Chapter
  • speaker photo
    Jonathan Knudsen
    Technical Evangelist, Synopsys
  • speaker photo
    Jim Doggett
    Chief Security Officer, Semperis

    Jim Doggett is high energy leader focused on embedding risk management, security, and compliance into the business fabric to efficiently manage risks. Retired partner from EY where he spent 27 years helping clients through financial audits and building and sustaining security, risk and controls. Served as global leader of Information Risk and Resiliency for the Treasury and Security Services division of JP Morgan, Chief Security Officer (CISO) and Chief Technology Risk Officer for Kaiser Permanente, and Chief Technology Risk Officer and CISO for AIG. Subsequently, helped start up Panaseer in building the first continuous controls monitoring platform (remain as Board Advisor) and presently CISO at Semperis.

  • speaker photo
    Sam McHugh
    Sr. Sales Executive, Open Systems
  • speaker photo
    Ivan Righi
    Senior Cyber Threat Intelligence Analyst, Digital Shadows

    Ivan Righi is a Senior Cyber Threat Intelligence Analyst at Digital Shadows, where he conducts research on cyber-threats affecting Digital Shadows' customers. Ivan earned his Master of Science degree in Cybersecurity from the University of Dallas, and holds a Bachelor of Science degree from Abilene Christian University. He also has a graduate certificate, CompTIA certification, and three microcredentials in Cybersecurity.

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Laura D. Pfister
    Assistant U.S. Attorney, Northern District of Georgia, United States Attorneys' Offices

    As a federal prosecutor in the United States Attorney’s Office for the Northern District of Georgia, Laura is a member of the Cyber and Intellectual Property Section. She has investigated and prosecuted a variety of cyber-enabled crimes, including ransomware attacks, corporate sabotage, and computer hacking, as well as cyber fraud schemes, such as business email compromises. Laura co-leads a multi-jurisdictional task force dedicated to addressing the laundering of cyber-enabled fraud proceeds in the Metro-Atlanta area, and presents to industry, private, and law enforcement groups on cyber-enabled fraud and the investigative tools available to address it. Laura previously served as a Senior Assistant Attorney General at the Georgia Attorney General’s Office and she is CIPP/US certified.

  • speaker photo
    Joshua Reed
    Network Intrusion Forensic Analyst, United States Secret Service

    Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He is an instructor at the National Computer Forensic Institute (NCFI) and has testified multiple times in state, local, and federal courts in digital forensic cases.
    Josh specializes in Network Incident Response and is actively engaged in complex Ransomware, Point-of-Sale, Business Email Compromise, and Unauthorized Access cases. Josh currently oversees the United States Secret Service Atlanta Field Office Digital Evidence Forensic Laboratory (DEFL).

  • speaker photo
    Zach Bulliner
    Sr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret Service

    Zach Bulliner has been a Special Agent with the Secret Service since 2002, when he started in the Nashville Field Office. In 2008, he was transferred to Washington D.C., where he spent three years in the Cyber Intelligence Section (CIS) at Secret Service Headquarters before spending six years on Presidential Protection. He served on President Obama's Detail for four years and President Trump's Detail for two years. In 2018, he transferred to the Atlanta Field Office, where he works in the Digital Evidence Forensic Laboratory (DEFL) conducting Computer and Mobile Phone forensics and assisting in cyber cases.

  • speaker photo
    Moderator: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law

    Jordan Fischer leads Beckage's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Moderator: Terry Olaes
    Director, North America Systems Engineering, Skybox Security

    Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security teams have provided Terry with a unique perspective on fortifying IT/OT security posture. Terry specializes in helping organizations devise the right cybersecurity strategies to help manage vulnerabilities and mitigate risks across IT, OT, and hybrid cloud environments. Previously, he has served in security management roles at Neiman Marcus and IBM. Terry has a BA in Business Administration and Management from the University of Phoenix.

  • speaker photo
    Husnain Bajwa
    VP, Global Sales Engineering, Beyond Identity
  • speaker photo
    Tim Davis
    Head of Solutions Consulting, DoControl
  • speaker photo
    Peter Clark
    Director, Solutions Engineering, Authomize
  • speaker photo
    Christopher Fielder
    Field CTO, Arctic Wolf

    Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government, and corporate environments. Christopher holds 18 industry certifications including the CISSP, GPEN, GISP, GCFE, GSEC, GCIH, CEH, and more; along with a Master’s Degree in Information Security. Today he is the Field CTO for Artic Wolf where he enjoys researching emerging security trends and highlighting the expertise of the Arctic Wolf team.

  • speaker photo
    Neal Humphrey
    Area VP - Security Strategist, Deepwatch

    Neal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security Operation issues and to help to understand and mature Security Architectures and processes. Neal has always taken a human based approach to Security that allows for faster improvement and effective determination of tool use and capabilities.

  • speaker photo
    Valentina Flores
    CEO, Red Sentry

    Valentina Flores is CEO of Red Sentry, a vulnerability scanning and penetration testing company that keeps organizations secure 24/7/365 by actually mimicking hackers. Formerly a cybercrime detective on a federal task force, Valentina fought against these criminals her whole career, and has unique insight into the minds and tactics of attackers. She has a Bachelor's degree in Criminology and a Master's degree in Business Management. Having seen the dark side of cybercrime victimization and how easily it can destroy organizations, she is passionate about protecting people and companies from malicious hackers.

  • speaker photo
    Jamie Zajac
    Vice President, Product, Recorded Future

    Jamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.

  • speaker photo
    Dr. Christopher Pierson
    Founder & CEO, BlackCloak

    Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the Department of Homeland Security, Chris served as a special government employee on their Cybersecurity and Privacy Committees. He’s also spent time as the Chief Privacy Officer for Royal Bank of Scotland, the world’s 3rd largest bank, as the Chief Information Security Officer for two prominent FinTechs, and as President of the Federal Bureau of Investigation’s Arizona InfraGard. Chris is also a Distinguished Fellow of the Ponemon Institute, a globally recognized keynote speaker & cybersecurity thought leader, and is frequently quoted by the media on cybersecurity & privacy topics.

  • speaker photo
    Iván Hernández
    CISSP, C|EH, Sales Engineering Manager, Proofpoint
  • speaker photo
    Michael Stone
    Senior Solutions Engineer, Automox

    Michael Stone is a Senior Solutions Engineer and joined Automox in 2021. His passion is helping organizations reduce their potential attack surfaces beginning with a simple philosophy: Start by Locking the Front Door! Michael has focused on the field of cybersecurity with a focus on endpoint management for over 15 years with a number of industry leading companies, including HCL, IBM, and Trend Micro. Michael has also held senior positions at Cisco, Proofpoint, and Oracle.

  • speaker photo
    Alexandra Panaretos
    Americas Lead for Human Cyber Risk and Education, EY

    With a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and education strategies in Fortune 50/100 companies and other global enterprises. Alex is OPSEC Manager II Certified by the U.S. Army and the Joint Information Operations Warfare Center (JIOWC). She volunteers with local law enforcement agencies educating parents, community groups, and youth organizations on information security and social media safety in her free time.

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.

  • speaker photo
    Terry McGraw
    Executive Consultant CTU/IR, Secureworks

    Terrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as a senior executive Incident Response Consultant. He has more than 20 years of experience providing expertise in cybersecurity architectural design and operations in both commercial and government sectors.

    Terry previously served as president and principal consultant for Cape Endeavors, LLC, and was the Vice President of Global Cyber Threat Research and Analysis for Dell SecureWorks. He retired from the United States Army in 2014, completing 27 years of service; the last 10 years of his Army career were leading key Cyber initiatives for the Army’s Network Enterprise and Technology Command, Army Cyber Command and the National Security Agency (NSA). He has multiple combat tours with his culminating assignment, serving as the Director of Operations, Task Force Signal Afghanistan, 160th Signal Brigade (FWD), providing all strategic communications infrastructure in the theater of operations.

  • speaker photo
    Jovonni Pharr
    Engineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)

    Jovonni Pharr is a software/hardware engineer with a focus on Research & Development (R&D) in emerging technologies. He enjoys building solutions in Electronics, Materials Science, and Intelligent Systems. Some of his research focuses on areas in Computer Science, Human Behavioral Psychology, and Artificial Intelligence. He Graduated from Gordon State College with a degree in Finance & from Georgia State University with a degree in Computer Information Systems and has been engineering solutions for over a decade. Currently, he is a PhD student at Georgia State University in Computer Science, with a focus on privacy-preserving computations, and is the cofounder of the Georgia Cyber Warfare Range in Atlanta. GA.

  • speaker photo
    Happy Hour
  • speaker photo
    Allen Sautter
    Principal Security Advisor, AWS; Former CISO, Federal Reserve Bank of Atlanta
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Don't miss out!

Join us for high-quality, affordable cybersecurity training and networking. Sign up today!