googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 21, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 119

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, May 22, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Breakfast Roundtable (VIP / Invite Only)
    • session level icon
    Navigating the Artificial Intelligence Delta of the Cyber Landscape
    speaker photo
    CIO, Esquire Deposition Solutions, LLC
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: 119

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    InfraGard Atlanta Members Alliance Chapter Breakfast and Ransomware Discussion
    • session level icon
    speaker photo
    Senior Investigations and Response Manager, Chainalysis
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Ballroom C

    Join us at SecureWorld for a complimentary IAMA Chapter breakfast, featuring a focused discussion on ransomware led by one of our experienced members. Learn practical strategies to identify and disrupt ransomware operations and assist in recovery efforts. This is also a perfect opportunity to network with fellow IAMA members.

    8:00 am
    ISC2 Atlanta Chapter Meeting
    • session level icon
    A Brief on OWASP Top 10 for AI
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: 115/116
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Drag Racing & Cybersecurity: The Crossover
    • session level icon
    speaker photo
    CISO, United Musculoskeletal Partners
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    You’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Leadership Strategies to Support Talent Development and Retention
    • session level icon
    speaker photo
    Cybersecurity Director, Gannett Fleming
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Ballroom C

    This comprehensive session is designed to provide cybersecurity leaders with the strategies and insights needed to foster talent development and ensure retention in their organizations. Through a blend of practical exercises and interactive discussions, participants will learn how to create an empowering work environment that encourages growth, satisfaction, and loyalty among their teams.

    10:15 am
    Cybersecurity and Artificial Intelligence
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 113/114

    Artificial Intelligence is a wonder-tool for IT and cybersecurity. With AI, you can monitor, analyze, optimize, detect, and respond to IT issues and cybersecurity issues in real-time. It’s a wonderful tool—until it isn’t! Can you say “weaponization”? Let’s chat.

    10:15 am
    Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch
    • session level icon
    speaker photo
    Sr. Technical Director, Skybox Security
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 115/116

    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to the importance of the asset or its exposure to potential attack across the network.

    To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.

    In this session, you will learn:

    • How the visibility of your assets, networks, business, and security data impacts vulnerability risk.
    • What scanners miss in discovery and prioritization, and how to fill in the gaps.
    • How to reduce the scan-and-patch lag from weeks to hours.

    Join Dr. Howard Goodman as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Using People, Process, and Technology to Build a World-Class SOC
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 113/114

    In this session, Michael will discuss People, Process, and Technology and how he has used this methodology for process improvement to SOC operations. Michael will provide examples of the wins he has experienced and share that along with the metrics to measure your progress.

    11:10 am
    Defending AI Attack Surface with Crowdsourced Testing
    • session level icon
    speaker photo
    Sr. Trust & Security Engineer, Bugcrowd
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 115/116

    Crowdsourcing brings up to hundreds of fresh eyes to risk reduction tasks, counterbalancing the massive number of threat actors inspecting the attack surface. It also provides access to virtually any skill set, augmenting security teams on demand for red teaming, pen testing, bug bounty engagements, and vulnerability disclosure programs. This session offers an overview of the emergent AI Attack Surface, and why crowdsourcing is the right solution at the right time for AI Safety.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Principal Solutions Architect, Lacework
    speaker photo
    Sales Specialist, Harmony Enterprise, Check Point
    speaker photo
    Sr. Sales Engineer, Thales
    speaker photo
    Director of Cyber Defense, Cox Communications
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Ballroom C

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] The Vital Importance of Developing Personal Relationships
    • session level icon
    speaker photo
    CISO, State of Georgia
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Why cybersecurity leaders should become invested in the lives of their business unit leaders, vendors, and business partners.

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    GRC: Strategies for Effective Data Governance to Protect Against Evolving Cyber Threats
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: 119

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Tabletop Exercises: The Fun Kind
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: 113/114

    Tabletop exercises are not a new thing in incident response training and compliance requirements. But they can often be dull and it can be difficult to herd all of the proverbial cats into a room.  But what if we could address that problem to some extent?  What if IR tabletops became a game that people enjoyed to play and still accomplished learning objectives? What if we played a game like Dungeons & Dragons (D&D)? But instead of fighting orcs with magic you are fighting a realistic ransomware scenario armed with your D20 playing as the dexterous Deputy CISO (who’s always the scapegoat, right?) along with the rest of your team.

    There is ample evidence that learning happens more effectively when there is fun and laughter involved.  Not only that, if people are excited about participating, aligning schedules and getting people into a room (or e-room) is much easier.  I’ll tell you about my path to IR role playing games, my experiences, and how you can get started doing your own gamified IR tabletops right away!

    1:15 pm
    Using Cloud Automation to Supercharge Your Security Program
    • session level icon
    speaker photo
    Enterprise Security Architect, Delta Air Lines
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: 115/116

    As organizations move to the cloud, it is becoming more difficult to manage the breadth of security tools and controls, including on-prem, in the cloud, and SaaS solutions. In this presentation, we will provide real-world practical ideas for using (cheap) serverless automation in the cloud to manage your security program.

    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    speaker photo
    Board of Directors, Vice President, InfraGard Atlanta Members Alliance
    speaker photo
    Cybersecurity Director, Gannett Fleming
    speaker photo
    CISO, Needling Worldwide
    speaker photo
    CIO, Esquire Deposition Solutions, LLC
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Ballroom C

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    The Future of Encryption: Quantum Computing and AI
    • session level icon
    speaker photo
    Sr. Intelligence Analyst, Expedia Group
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: 113/114
    “The Future of Encryption: Quantum Computing and AI” explores the impending impact of quantum computing on current encryption methodologies and how AI can offer solutions. This presentation highlights quantum-resistant encryption algorithms, preparing audiences for the significant changes quantum advancements will bring. Case studies from startups and tech firms developing quantum-safe encryption solutions will provide practical insights. The key takeaway will emphasize the urgency of adapting to quantum computing developments to ensure robust, future-proof encryption strategies. This topic is crucial for understanding the evolving landscape of cybersecurity in the quantum/AI era.
    2:10 pm
    Cyversity Atlanta Chapter Meeting
    • session level icon
    Artificial Intelligence: Threat, Opportunity, or Both?
    speaker photo
    Education Working Group Lead, HISPI AI Think Tank - Project Cerebellum
    speaker photo
    CISO, State of Georgia
    speaker photo
    Field CISO, Veritas Technologies
    speaker photo
    Founder, HISPI AI Think Tank - Project Cerebellum
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Ballroom C

    The increasing adoption of AI and related technologies globally provides a massive opportunity for humanity. However, as is the case with any disruptive technology, there are also threats that introduce significant risks. Effectively managing these inherent risks is key to leveraging AI in a balanced way.

    2:10 pm
    ISSA Metro Atlanta Chapter Meeting
    • session level icon
    Moments, Movement, and Magnificent Maxims
    speaker photo
    Director, Privacy Program, GoTo Foods
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: 115/116

    Inside Cybersecurity, we often find that life can turn in a moment. Which moment is going to be the lynchpin? It is anybody’s guess.  As members of ISSA, we deal with all manifestations of malware and malicious miscreants. We love to bring order from chaos and to attempt to do good in the world.  This presentation will give a new perspective on some old thoughts and try to make matters more meaningful here on the third rock from the Sun.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] Lessons Learned from the Life of a CISO
    • session level icon
    speaker photo
    CISO, Lyric
    speaker photo
    CISO, Paradies Lagardère
    speaker photo
    Deputy CISO, GreenSky
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    Join us for our closing keynote panel, where seasoned cybersecurity experts reflect on the invaluable lessons gleaned from their journeys as Chief Information Security Officers (CISOs). Explore the triumphs, challenges, and pivotal moments that shaped their careers, offering insights and strategies vital for navigating the ever-evolving landscape of digital security.

Exhibitors
  • Axonius
    Booth: 230

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Bugcrowd Inc.
    Booth: 210

    By combining the world’s most experienced team of bounty experts and the market’s only enterprise-grade bug bounty platform, Bugcrowd connects organizations to a global crowd of trusted security researchers to identify vulnerabilities—before the  adversaries do.

  • Check Point Software Technologies
    Booth: 175

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cloud Security Alliance (CSA)
    Booth: n/a

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Cribl
    Booth: 280

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • Cyera
    Booth: 100

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Cyversity Atlanta Chapter
    Booth: 120

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • InfraGard Atlanta Members Alliance
    Booth: 150

    InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.

    InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.

    IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.

  • ISACA Atlanta
    Booth: 130

    The aim of the ISACA Atlanta Chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help further promote and elevate the visibility of the IT audit, risk, control and security professions throughout the local area.

    Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology.

  • ISC2 Atlanta
    Booth: 225

    ISC2 Atlanta chapter encompasses the Atlanta Metro area. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.

    Our mission is to advance information security in local communities throughout Atlanta, Georgia, by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. ​

  • ISSA Metro Atlanta Chapter
    Booth: 235

    The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Lacework
    Booth: 275

    Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

  • Mission Critical Systems
    Booth: 290

    Mission Critical Systems is an information technology security reseller and integrator, providing information, network, and data security solutions since 1997 throughout the Southeast United States and Caribbean. Because information security is our only business, we can fully focus on helping your organization find effective solutions to the unique security challenges businesses confront in today’s ever changing cybersphere.

    We offer a wide range of products from the world’s leading manufacturers including firewalls, email security services, network access control, auditing tools, strong authentication, endpoint security, database security, malware protection and secure wireless solutions.

    Our knowledgeable, experienced sales consultants and highly trained engineers maintain the latest manufacturer certifications to ensure that our clients get the most accurate and up-to-date information available today. From assessment and implementation services through installation, maintenance and upgrades, our skilled engineers can save you time and maximize the value of your technology. We have the resources to provide unparalleled support on the products we provide. Allow us to become your trusted security advisors.

  • One Identity + iC Consult
    Booth: 220

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

    iC Consult is the world’s leading independent consultancy, systems integrator, and managed services provider for Identity & Access Management with 850+ employees worldwide. Our service portfolio covers Managed Services for IAM including advisory, architecture, implementation, integration, support, and operations. For more information, visit https://ic-consult.com.

  • ProcessUnity
    Booth: 110

    ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources.

  • Skybox Security
    Booth: 185

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Thales
    Booth: 285

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 170

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Jim Ballowe, Moderator
    CIO, Esquire Deposition Solutions, LLC
  • speaker photo
    Willis McDonald
    Senior Investigations and Response Manager, Chainalysis
  • speaker photo
    Krista Arndt
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security program in alignment with the business objectives. Additionally, Krista provides oversight of the security program's day to day operational effectiveness.

    Prior to joining UMP, Krista served as the Director of Security Governance, Risk and Compliance for Voyager Digital, a leading cryptocurrency trading platform, where she was responsible for the development, maturation, and maintenance of Voyager's security program. Krista has served in various leadership and operational roles within the information security profession for 14 years within the financial and defense sectors, bringing a deep understanding of how strong security and privacy practices can help enable best in class care and peace of mind for UMP and its practices' patients.

    Krista has a Bachelors Degree in Biology from Felician College and currently holds her Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM) certifications.

    Krista is an active member of ISACA, Infragard's Philadelphia Chapter, as a member of both Neumann University's Business Advisory Council and Women in Cybersecurity-Delaware Valley Affiliate's Membership and Education Committees. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Stanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.

    He has more than 35 years of cyber security/e-privacy experience in cyber security program management and strategic planning, executive leadership, including the U.S. federal, state, local, territorial, tribal governments, higher education, and several top-10 global corporations.

    Gatewood is also a USAF veteran and has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University.

    Stanton has built 2 centers of excellence, (1) cryptography and (2) cyber awareness & training.

  • speaker photo
    Dr. Howard Goodman
    Sr. Technical Director, Skybox Security

    Howard Goodman, with a distinguished career spanning two decades, has emerged as a pivotal figure in cybersecurity, seamlessly integrating strategic planning with hands-on cybersecurity applications across numerous sectors. His significant contributions to organizations like Skybox Security highlight his prowess in navigating through the intricate realms of cybersecurity. A U.S. Navy veteran and holder of a Ph.D. in Cyber Operations, specializing in meticulously formulating and implementing security strategies.

    Throughout his journey, he has consistently demonstrated a steadfast ability to deliver tangible results, adeptly crafting strategies while precisely evaluating the risks, issues, and benefits of long-term initiatives. His unique talent lies in skillfully communicating complex technical concepts to both senior executives and non-technical stakeholders, ensuring a thorough understanding of the projects and strategies under his leadership. Dr. Goodman's trajectory in the field reveals a leader who not only navigates through the complexities of the digital and cybersecurity domain but also stands as a reliable guide, ensuring strategic and secure operations in all his endeavors.

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Jacob Martel
    Sr. Trust & Security Engineer, Bugcrowd
  • speaker photo
    Carlos Bacquet
    Principal Solutions Architect, Lacework

    Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bachelor of Computer Science and a Master in Computer Science with focus on machine Learning applied to Security applications. His areas of expertise include Kubernetes security and machine learning security applications applied to cloud infrastructure.

  • speaker photo
    Daniel Pollack
    Sales Specialist, Harmony Enterprise, Check Point

    Daniel is a 25-year veteran within the Security, Mobile Services, and Networking industry. Daniel helps businesses understand the risk and impact of cyberthreats that enterprises face in today’s always changing environment. As security risks continue to evolve from signature-based attacks to behavioral attacks, it is imperative that organizations have layers of security to detect these anomalies. It is just as important to have organizational processes and expertise in place to assess data from multiple sources and the ability to take action.

  • speaker photo
    Dana Tannatt
    Sr. Sales Engineer, Thales

    Dana Tannatt graduated from Norwich University with a master’s degree in information security and assurance. He is also a member of the Upsilon Pi Epsilon honor society for Computing and Information Disciplines. He has been a Security and Privacy software specialist for more than 18 years. He has extensive experience with Identity Access Governance and Data Security. He is now at Thales as one of their premiere Data and Application Security Specialists.

  • speaker photo
    Jacob Prosser, Moderator
    Director of Cyber Defense, Cox Communications

    Jacob Prosser is a seasoned cybersecurity professional with more than 14 years of experience in the field. As a Director of Cyber Defense at Cox Communications, he and his team play a critical role in keeping the company and its customers safe from cyber threats. His expertise spans various domains within cybersecurity including application security, identity and access management, security architecture, detection engineering, and incident response.

    Jacob graduated from the University of Georgia with a degree in Management Information Systems, and he holds a CISSP certification.

  • speaker photo
    Steve Hodges
    CISO, State of Georgia

    Steve Hodges serves as the Chief Information Security Officer (CISO) for the State of Georgia, where he leads the charge in safeguarding critical digital assets and infrastructure against cyber threats. With a career spanning more than three decades in information technology and cybersecurity, Steve brings a great deal of experience and expertise to his role.

    Before assuming his current position, Steve held various leadership roles in both the public and private sectors, honing his skills in risk management, compliance, and incident response. Prior to becoming the State Chief Information Security Officer, Steve served as the Disclosure Officer and senior IT Security Manager for the Department of Revenue.

    During his nearly 22-year tenure at the Department Revenue, he served in a variety of roles: Server Platform Manager, Network Support and Security Manager, IT Operations Manager, Database Support Manager, and Disclosure. In addition to cybersecurity, he also was responsible for business continuity planning and disaster recovery planning. Prior to joining the Department of Revenue. Steve worked at the Department of Administrative Services, beginning as a contractor and later becoming a state employee.

    Throughout his career, Steve has been involved in information security. Early in his career, he worked with a talented group of people to develop one of the first commercially marketed disk encryption and access control system for early IBM-compatible computers. He has experience with a wide variety of information technology systems and configurations.

    Steve lives in the North Georgia mountains with his wife and children.

  • speaker photo
    Glen Sorensen
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Stuart Smith
    Enterprise Security Architect, Delta Air Lines

    Stuart Smith is the Enterprise Security Architect for Delta Air Lines reporting to the CISO. He is one of the senior security advisors to the security organization and is responsible for providing security input into various business and technology initiatives across the company. Stuart has over 23 years of professional experience in the cybersecurity field for both the Department of Defense and the private sector. He is a U.S. Army combat veteran, has a Masters in cybersecurity, and holds CISSP and CISM certifications.

  • speaker photo
    Chris Sullivan
    Board of Directors, Vice President, InfraGard Atlanta Members Alliance

    Mr. Sullivan is a seasoned leader with over 20 years of cybersecurity experience. He has a robust track record in developing and deploying cybersecurity solutions at scale for the world’s leading companies. Christopher currently serves as the Managing Director at VoSec, a management consulting firm, and holds key positions as Vice President and Financial Services Sector Chief at InfraGard Atlanta. He is also a member of the AI Cross-Sector Counsel at InfraGard Atlanta.

    At VoSec, Chris has spearheaded AI security governance strategy work for a Fortune 500 company, designed and run large-scale tabletop exercises with the FBI, DHS, Federal Reserve, and major financial, medical, and academic institutions. Additionally, he serves as the vCISO and vCOO for an AI-as-a-Service company that is currently in stealth mode. His extensive experience spans across cybersecurity risk and compliance, organizational design, and business management.

    Chris's professional experience includes leading Nymi as CEO, where he transformed the biometric security wearables company to achieve global success. As SVP, CTO, and CISO at SecureAuth, he directed the integration of multiple security entities and led the company's technical strategy, resulting in significant advancements in AI-based threat detection and security solutions. He has briefed a US Congressional Subcommittee on Cybersecurity and the US Army Cyber School, and led the cybersecurity R&D labs for three different companies, driving significant advancements in the field. In 2022, he sold his last cybersecurity company and continues to advise boards and CEOs on business and cyber strategies.

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Wes Knight
    CISO, Needling Worldwide
  • speaker photo
    Jim Ballowe, Moderator
    CIO, Esquire Deposition Solutions, LLC
  • speaker photo
    Bidemi Ologunde
    Sr. Intelligence Analyst, Expedia Group

    Bid is a seasoned intelligence analyst with years of experience and industry certifications in security operations, threat intelligence, cybercrime investigations, inter-agency collaboration, and lots more. He's currently a Senior Intelligence Analyst at Expedia.

  • speaker photo
    Angela Hinton
    Education Working Group Lead, HISPI AI Think Tank - Project Cerebellum

    Angela M. Hinton was the first Chief Counsel to the City of Atlanta’s Department of Information Technology. Over 13 years, Ms. Hinton served the City’s CISO and the Information Security Governance Board. She tailored Information Security policies, and related compliance and education strategies for all levels of City Government. As Senior Corporate Counsel at VMware, Ms. Hinton leveraged her cybersecurity and privacy experience in a unique role supporting the U.S. Government Relations Team with analysis of twenty-two States’ legislative initiatives regarding data privacy, cybersecurity and algorithmic regulation. She also advised the Information Security Team in negotiating customer security requirements and drafted publicly facing privacy datasheets for a portfolio of cloud and SaaS offerings. Currently, Ms. Hinton is the Education Lead on Project Cerebellum, an AI Think Tank to establish best practices, standards, and frameworks for AI and related technologies.

    Ms. Hinton held several positions in the American Bar Association and was the only State/Local attorney on the ABA Standing Committee on Law and National Security, where she is a member of the Sub-Committee for Cybersecurity. She is also on the AI Committee of the ABA Section of Science and Technology. She earned her J.D. from Duke University School of Law and received her B.A., with distinction, from State University of New York in Albany.

  • speaker photo
    Steve Hodges
    CISO, State of Georgia

    Steve Hodges serves as the Chief Information Security Officer (CISO) for the State of Georgia, where he leads the charge in safeguarding critical digital assets and infrastructure against cyber threats. With a career spanning more than three decades in information technology and cybersecurity, Steve brings a great deal of experience and expertise to his role.

    Before assuming his current position, Steve held various leadership roles in both the public and private sectors, honing his skills in risk management, compliance, and incident response. Prior to becoming the State Chief Information Security Officer, Steve served as the Disclosure Officer and senior IT Security Manager for the Department of Revenue.

    During his nearly 22-year tenure at the Department Revenue, he served in a variety of roles: Server Platform Manager, Network Support and Security Manager, IT Operations Manager, Database Support Manager, and Disclosure. In addition to cybersecurity, he also was responsible for business continuity planning and disaster recovery planning. Prior to joining the Department of Revenue. Steve worked at the Department of Administrative Services, beginning as a contractor and later becoming a state employee.

    Throughout his career, Steve has been involved in information security. Early in his career, he worked with a talented group of people to develop one of the first commercially marketed disk encryption and access control system for early IBM-compatible computers. He has experience with a wide variety of information technology systems and configurations.

    Steve lives in the North Georgia mountains with his wife and children.

  • speaker photo
    Dr. Joye Purser, CISSP
    Field CISO, Veritas Technologies

    Dr. Joye Purser is Field CISO at Veritas Technologies, the number-one maker of data backup systems. She is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.

    In 2022, Dr Purser was the first-ever senior executive Regional Director in CISA Region 4, the U.S. Cybersecurity and Infrastructure Security Agency. Before CISA, Dr. Purser worked at a big-4 management consulting firm, leading enterprise risk as well as recovery operations, enabling a county of 4.7 million people to prioritize and expend $426 million in pandemic aid.

    Dr. Purser served in the White House at the Office of Management and Budget (OMB), where she guided development of the $95 billion Department of Defense technology budget and led an effort that galvanized global focus on the semiconductor supply chain.

    For nearly a decade, Dr. Purser led audit activities at the Pentagon, overseeing the design and deployment of multi-billion dollar IT programs for its two-million-person workforce. She worked for seven years as a congressional staffer and also had stints in the nonprofit and lobbying arenas, always focused on promoting technology development.

    A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. She resides in Atlanta with her spouse and children.

  • speaker photo
    Taiye Lambo, Moderator
    Founder, HISPI AI Think Tank - Project Cerebellum

    Taiye Lambo is a Serial Entrepreneur, Cybersecurity, and Risk Management Pioneer. He co-founded HISPI, eFortresses, CloudeAssurance, and recently LamboPublishing.com. He is a Self-Published Author of Attribution: Social and Cyber Spaces, a fictional novella available on Amazon.

    He has 33 years of experience in the area of Information Technology across 4 continents – including 26 years of experience assisting organizations to build robust, comprehensive, effective, and sustainable information security programs through the integration of internationally accepted best practices.

    Taiye has held executive leadership roles (Deputy CIO, CISO, Director) for the City of Atlanta, John H. Harland (now Harland Clarke), as well as the Atlanta Federal Reserve Bank.

    Taiye received his Bachelors of Electrical Engineering from the University of Ilorin, Nigeria, and Masters in Business Information Systems from the University of East London, United Kingdom.

  • speaker photo
    Phillip Mahan
    Director, Privacy Program, GoTo Foods

    A standard biography for Phillip would mention his years of experience in Privacy, Security, Governance, and Audit. It would tell of the business sectors he has worked with, and perhaps even the companies and professional organizations he’s been affiliated with for the last 25+ years. This is not the standard bio.

    Telling stories and pulling connections together from places unexpected.

    Using Poetry, Literature, and Fairy Tales to make points understood by those not in the tech field. When speaking at conferences, he aims to take the listeners on a journey leading them somewhere they weren’t expecting when the story began.

    Phillip prefers people thinking of him more as someone who looks at the world differently but will help to get you where you need to be.

  • speaker photo
    Happy Hour
  • speaker photo
    Kevin Heineman
    CISO, Lyric

    A forward-thinking Chief Information Security Officer with more than 20 years of progressive success in leading NIST cybersecurity, engineering, and operations functions and developing business-aligned strategies to mitigate enterprise cyber risk. A respected visionary leader recognized for expertise in enterprise risk, cybersecurity, compliance, data privacy, and operations, while driving to profitability. Noted for acumen in engaging diverse teams and resolving challenging issues while reducing costs through process optimization.

  • speaker photo
    Michael Marsilio
    CISO, Paradies Lagardère

    Michael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy and compliance. Michael plays a strategic role in protecting Paradies Lagardère IT resources, infrastructure and information assets, and helps drives global security initiatives. He has more than 25 years of experience in building and managing security and compliance programs for both public and private companies and has a substantial track record in PCI, PII, PHI, IT General Controls and developing cybersecurity policy for financial, retail and legal organizations.

    Prior to joining Paradies Lagardère, Michael was the Global Director and CISO at DTI (now Epiq), the industry leader in the legal e-discovery space. Taking the organization’s security program from a green field to ISO 27001 certified data centers globally.

  • speaker photo
    Lori Temples
    Deputy CISO, GreenSky
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes