CyberSecuritySummitAtlanta 2019 Feb. 13, 2019 to Feb. 13, 2019, Atlanta, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Security Briefing with the U.S. Secret Service & FBI Alan Hunt N/A
Keynote Address with ExtraHop Matt Cauthorn N/A
ExtraHop Interactive Presentation Matt Cauthorn Improved breach detection and threat response are good reasons to up level your security operations ...
PANEL 1: Insider Threat - What the CISO and Every IT Security Management Team Must Face & Govern 24/7 Mark Sanders , Karl Gainey , Patrick l. Knight , Todd Berger , Jason Chambers , Sneer Rozenfeld Today 86% of organizations are in the process of building or already have an existing ...
Darktrace Interactive Presentation: Autonomous Cyber Defense: AI and the Immune System Approach Cameron Armstrong From insiders to sophisticated external attackers, the reality of cyber security today is that the ...
Nettitude Interactive Presentation: What does effective cyber threat intelligence look like, and how can you make operational changes that maximize its benefit? Ben Densham Cyber threats are reported every day, but do we know what a cyber attack on ...
Cybraics Interactive Presentation: The Top 12 Security Challenges and How AI/Machine Learning is Evolving Pete Nicoletti In this presentation we’ll discuss a number of issues contributing to the increasing number of ...
PANEL 2: Cloud INsecurity - Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them Rafal wh1t3rabbit Los , Mikal Hass , Mark Thames , Matt Cauthorn , Jim Hollar , Robert Lesieur , Zoe Lindsey For many organizations they are looking at over half of their IT spending being related ...
Ericom Interactive Presentation: Remote Browser Isolation - Eliminate Browser Based Attacks James Lui N/A
SailPoint Interactive Presentation: Best Practices for IAM Assessments, Blueprints & Roadmaps Todd Rossin Organizations process and store huge volumes of sensitive information that belong to their customers and ...
IBM Interactive Presentation: Security Strategies and Realities – Lessons Learned Timothy Appleby IBM Security has helped 1000’s of clients with everything from small scope engagements through to ...
PANEL 3: Incident Response - What to do Before, During and After a Breach David Lee , Patrick Gray , Pete Nicoletti , Luis Guzmán , Adam Tice A common phrase in information security is: “It is a matter of when you will ...