The Keynote

The Keynote

The keynote programme at Cyber Security Atlanta is focused on helping organisations protect themselves and their organisations from cybercrime, cyber terrorism and human factors.

The Keynote Theater at Cyber Security Atlanta invovles a deep analysis on the latest attack vectors and techniques hackers, nation states and social engineers are using against organizations like yours. This unique theater showcases some of the best new technologies and practices in the industry, enabling you understand the impact and capabilities of machine learning and artificial intelligence based defences. There is also be some incredibly valuable insight in to building cyber teams and company culture to ensure that the entire organization are working together to stay protected. The programme for 2018 is a mixture of demonstrations, presentations and panel debates from a world class line up of experts.

Keynote Speakers

Dr. Calvin Nobles
Dr. Calvin Nobles

Cybersecurity Professional / Strategist 

View

Dr. Calvin Nobles
Dr. Gordon Skelton
Dr. Gordon Skelton

President Security and Analytics, LLC

View

Dr. Gordon Skelton
John Summers
John Summers

VP & Chief Technology Officer Akamai

View

John Summers

John oversees the security and technology strategy for Akamai’s web security and web performance solutions.  He is a frequent speaker on the topics of Internet threats, enterprise security and the digital transformation of enterprise infrastructures to become more secure and resilient in the cloud-first, SaaS-first, mobile-first world we live in today.

Prior to his current role, John led the development of Akamai’s Enterprise Security and Web Security products which consist of cloud-based threat protection, identity and access management, web application security and DDoS defense services that leverage Akamai’s unique distributed computing platform to provide a global layer of security that scales on demand. John is a patent holder on Akamai’s distributed web application firewall technology.

John joined Akamai to manage the Web Acceleration products from 2007 until 2011, during which time that business grew 30 fold.

Prior to Akamai, John led Managed Security Services businesses at Unisys and at Genuity.

John holds degrees in physics and computer science from the University of Pennsylvania.  He was a member of the 1980 U.S. Olympic Team and a three time U.S. National Ice Dance Champion.

Kathy Winger
Kathy Winger

Attorney at Law Law Offices of Kathy Delaney Winger

View

Kathy Winger
Kevin Mitnick
Kevin Mitnick

Chief Executive Officer Mitnick Security

View

Kevin Mitnick

Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Kevin's presentations are akin to "technology magic shows" and include live demonstrations of the latest hacks and cyber threats.

Mark Gelhardt
Mark Gelhardt

VP, Global Technology Governance  Elavon

View

Mark Gelhardt

Colonel Gelhardt has had a long successful Army career, the pinnacle of his success was being nominated and selection to work at the White House as the CIO/CISO equivalent, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran.

Since retiring from the service Mark has held multiple leadership positions in IT and InfoSec.  CIO/CSO for World Airways – the largest US wide body long-hall charter airline.  CTO (Global Operations)/CISO for InterCall - the world’s largest conferencing company.  Chief Information Security Officer for TravelClick - a Software as a Service company in the hospitality space.  Consulted as the Interim CISO for the Georgia Lottery & NCR.  Currently Mark is the VP, Global Technology Governance for US Bank/Elavon – Elavon is fifth largest credit card processor.

Mark is the author of “My time at the Clinton White House” which was published the summer of 2018.  Mark’s second and third books are in the making.  Mark’s honors include being a published author, a key note speaker, and panel member in the IT, InfoSec, and political areas.  Mark has been awarded CISO of the year finalist 2013, Global CISO of the year finalist 2014, and a National InfoSec Project award winner in 2013 and a finalist InfoSec Project award winner in 2015.  Marks military honors include the Presidential Service Badge, the Legion of Merit, the Soldiers Medal (highest peace time valor award) and more.

Nicole Eagan
Nicole Eagan

CEO Darktrace

View

Nicole Eagan

As Chief Executive Officer of Darktrace, Nicole Eagan has established the company as the global leader of AI cyber defense. Her extensive career spans 25 years working for Oracle and early to late-stage growth companies. Named 'AI Leader of the Year' in 2017, Nicole has introduced disruptive machine learning to enterprises of all sizes. Today, Darktrace has a valuation of $1.25 billion and counts Insight, KKR, Summit Partners, and Samsung among its investors. Darktrace’s innovative approach to cyber security has won over 100 awards and the company has been named to WSJ’s Tech Companies to Watch, Fast Company's Most Innovative Companies, and the CNBC Disruptor 50.

Patricia Long
Patricia Long

Founder & Principal  Long Law Firm

View

Patricia Long
Robert Gibbons
Robert Gibbons

Chief Technology Officer Datto

View

Robert Gibbons

Robert is responsible for managing Datto’s development and infrastructure initiatives in support of its comprehensive data backup and protection platform.

Prior to Datto, Robert spent 15 years as a software engineer and CTO leading teams of developers building high-uptime enterprise applications for Fortune 500 clients, including building one of the highest trafficked web advertising distribution networks and an enterprise digital asset management system deployed to thousands of end-users.

Robert holds a B.S. in Policy Analysis and Management from Cornell University, a J.D. from Fordham University, and an M.S. in Computer Science from New York University.

Rohit Ghai
Rohit Ghai

President  RSA (a Dell Technologies Business)

View

Rohit Ghai

Rohit Ghai most recently served as president of Dell EMC’s Enterprise Content Division (ECD), where he was instrumental in setting a compelling vision, transforming go-to-market and revitalizing the portfolio for the digital era through strategic partnerships and acquisitions.  Ghai was responsible for all aspects of the ECD business, including setting strategic vision, sales and services, channel strategy, product development, marketing, finance, support and customer success. 

Previously, Ghai was chief operating officer of ECD, and responsible for the division's strategy, development and marketing of all products and solutions. He joined EMC in December 2009 to run product development.

He has more than 20 years of experience in IT in both startup and big company settings, with expertise in digital transformation in highly regulated markets, and knowledge across software, and systems and security.  Ghai joined Dell EMC from Symantec, where he held a variety of senior engineering and general management roles. Previously, he was at Computer Associates in a number of senior management roles in the BrightStor and eTrust business units, and led the CA India operations as chief technology officer. Ghai joined CA through the acquisition of Cheyenne Software – a startup in the backup and data protection space. 

Ghai holds a master’s degree in Computer Science from the University of South Carolina and a bachelor's degree in Computer Science from the Indian Institute of Technology (IIT), Roorkee.  

The Keynote Seminars

  • Wed 17th Oct 08:30 - 10:00
  • HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization Kevin Mitnick  |   Mitnick Security  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 08:30 to 10:00

    HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization

    It takes one to know one.

    People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

    Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure.  Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. 

    Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

    Speaker

    Photo Speaker Name Profile
    Kevin Mitnick Kevin Mitnick View Profile
  • Wed 17th Oct 10:10 - 10:40
  • A New Approach to Managing Digital Risk Rohit Ghai  |   RSA (a Dell Technologies Business)  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 10:10 to 10:40

    A New Approach to Managing Digital Risk

    Technology continues to propel entire industries through digital transformations, escalating digital risk, and prompting questions from the C-suite, the BOD, regulators and policy makers. Cyber-risk is the largest facet of digital risk we face going forward. Since cybersecurity is now squarely a business issue; it needs to be managed as such. A business-driven approach to managing digital risk entails taking a risk orientation to designing and operating your security operations. This approach is the only way to ensure that technologies like machine learning and data continue to propel us to our digital future.
     

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Wed 17th Oct 11:30 - 12:00
  • AI-Based Autonomous Response: Are Humans Ready? Nicole Eagan  |   Darktrace  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 11:30 to 12:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Wed 17th Oct 13:00 - 13:30
  • Brought to you by Akamai John Summers   |   Akamai   |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 13:00 to 13:30

    Speaker

    Photo Speaker Name Profile
    John Summers John Summers View Profile
  • Wed 17th Oct 13:40 - 14:10
  • Mind the Gap… Insider Threats & Industry Patricia Long   |   Long Law Firm  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 13:40 to 14:10

    Mind the Gap… Insider Threats & Industry

    This presentation will provide an overview of the various insider activities across industry and identify the financial impact, motivations, behavioral indicators and organizational factors that contribute to insider threats in industry. Insider Threat malicious motivations such as revenge, ego, espionage, etc., will be identified; as well as mistakes, misuse and negligence acts such as phishing, pretexting, privileged users, accidents, weak passwords, etc. The presentation will also address deterrence and detection and set out mitigating factors and preventative measures. Finally, Mind the Gap… Insider Threats & Industry will identify policy and procedures to create an insider threat program for small or large companies.

    Speaker

    Photo Speaker Name Profile
    Patricia Long Patricia Long View Profile
  • Wed 17th Oct 14:20 - 14:50
  • Shifting the Human Factors Paradigm in Cybersecurity Dr. Calvin Nobles  |     |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 14:20 to 14:50

    Shifting the Human Factors Paradigm in Cybersecurity

    This presentation emphasizes the need to break the inertia regarding human factors in cybersecurity by leveraging organizational platforms to educate and address human-centric problems in cybersecurity. Shifting the paradigm on human factors in cybersecurity centers on developing an executive-led platform to address (a) human-centered cybersecurity approaches, (b) the need for human factors assessments, (c) increased appreciation for humans factors as a science, and (d) human derailments in information security. Cybersecurity leaders and practitioners continue to admire the human factors problem without exploring the root-level causes of human-enabled mistakes. One way to address human factors is through an organizational platform. 

    Speaker

    Photo Speaker Name Profile
    Dr. Calvin Nobles Dr. Calvin Nobles View Profile
  • Thu 18th Oct 09:30 - 10:00
  • Brought to your by Mark Gelhardt Mark Gelhardt  |   Elavon   |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 09:30 to 10:00

    Speaker

    Photo Speaker Name Profile
    Mark Gelhardt Mark Gelhardt View Profile
  • Thu 18th Oct 10:50 - 11:20
  • Cybersecurity and Data Breaches from a Business Lawyer’s Perspective Kathy Winger  |   Law Offices of Kathy Delaney Winger  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 10:50 to 11:20

    Cybersecurity and Data Breaches from a Business Lawyer’s Perspective

    The session covers recent data breach cases, the significant change to the legal landscape that is occurring in the cybersecurity and data breach arena and the fact that no company, whether small, medium or large, is immune from liability. It  discusses current and future cybersecurity/data breach legislation and the FTC’s role in regulatory and enforcement actions related to cybersecurity and data breaches. It covers steps that businesses can take to protect themselves before, during and after a data breach and the legal significance of cybersecurity best practices. Finally, it discusses liability for third party vendor breaches and the ins and outs of cyber insurance.  

    Speaker

    Photo Speaker Name Profile
    Kathy Winger Kathy Winger View Profile
  • Thu 18th Oct 11:30 - 12:00
  • Machine Learning: Another Tool in Your Arsenal Dr. Gordon Skelton  |   Security and Analytics, LLC  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 11:30 to 12:00

    Machine Learning: Another Tool in Your Arsenal

    Artificial Intelligence is a hot topic today.  Machine Learning and Deep Learning are two different fields in AI.  These fields have the potential to aid in the ongoing fight for cyber security.  Before beginning to employee these in your toolkit, you have to have a good understanding of their strengths and weaknesses.  This presentation will focus on Machine Learning and its applicability to enhance cyber security.  Machine learning will be introduced and examples will be provided illustrating how ML can be applied. Also discussed will be how to start an initial project employing ML for cyber security.

    Speaker

    Photo Speaker Name Profile
    Dr. Gordon Skelton Dr. Gordon Skelton View Profile
  • Thu 18th Oct 13:40 - 14:10
  • In Praise of Private Clouds: A Case Study Robert Gibbons  |   Datto  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 13:40 to 14:10

    In Praise of Private Clouds: A Case Study

    Robert Gibbons, Datto’s CTO, will discuss the security and infrastructure advantages of migrating data from a public to a private cloud based on his own experience. Having recently transferred 12 PB of data out of Amazon Web Service, Gibbons will discuss the motivations, challenges, and lessons learned from moving billions of SaaS data objects, one of the largest data migrations in history.

    Speaker

    Photo Speaker Name Profile
    Robert Gibbons Robert Gibbons View Profile
Top