Date & Time:
Tuesday, June 17
09:30 - 17:00
Venue:
Ambient + Studio
585 Wells St SW
Atlanta, GA 30312
Agenda
Registration & Breakfast
09:30 - 10:20
Opening Remarks
10:20 - 10:25
Tabletop Exercise
10:25 - 11:25
Omni-channel threat response: A Tabletop Exercise for Business Resilience
Organizations are global engines with many disparate systems and critical moving parts. The threat landscape is vast and the attack surface is growing in complexity. Your customers look to you, to lead in times of disruption and crisis. This exercise will challenge traditional thinking and disrupt the approach to incident and crisis management.
11:30 - 12:00
Workshops
Session #1: Building Cultures for Mental Wellbeing and Resilience
In this interactive workshop, participants will explore approaches for building cybersecurity team cultures that prioritize mental wellbeing to prevent burnout. Drawing from organizational psychology and industry best practices, we'll examine the factors - both expected and unexpected- that impact mental health in security operations. Participants will develop practical strategies for cultivating team cultures that proactively prioritize mental wellbeing rather than waiting to react to mental health crises and burnout.
Session #2: Mastering Social Engineering: Tactics, Techniques, and Countermeasures
In an era where human behavior is often the weakest link in cybersecurity, social engineering attacks have become a major threat. This session will delve into the latest strategies used by cybercriminals to manipulate individuals and organizations, from phishing and spear-phishing to pretexting and baiting. Participants will gain insights into how attackers exploit psychological vulnerabilities and the social dynamics that make these tactics so effective. Attendees will also learn proactive countermeasures and best practices to recognize, resist, and mitigate the impact of social engineering attacks. Whether you're a security professional or a business leader, this session provides actionable knowledge to defend against the most insidious threat in cybersecurity.
Session #3: Cloud-Native Detection and Response: Advancing Security in a Dynamic Landscape
As organizations rapidly transition to cloud-native environments, the traditional methods of detection and response are increasingly inadequate. This session will explore the unique challenges and opportunities presented by securing cloud-native infrastructures. Attendees will gain an understanding of how to leverage modern tools and techniques for continuous monitoring, threat detection, and automated response within dynamic cloud environments.
Networking Lunch
12:00 - 12:55
Roundtable Exercise
13:00 - 14:00
What are the most significant challenges we're facing with non-human identities, and how can we make this a strategic priority?
Non-Human Identities (NHIs) are growing exponentially faster than human identities as organizations create ever more API keys, access tokens, traditional service accounts, and vaulted secrets. Do you know how many times people in your organization have clicked “authorize” to let an app access your systems and data? Do you know how your suppliers are using the access you’ve granted to deliver their promised value? As AI agents increasingly leverage NHIs to interact with your data, is this trend a passing fad, or is NHI here to stay—powering AI and shaping the future of your organization?
Workshops
14:05 - 14:35
Session #1: Let’s explore the convergence of the CISO and CIO
Traditionally, security has fallen under IT, with the CISO reporting to the CIO. However, we’re now seeing a growing trend of CISOs becoming CIOs and taking over IT. This session will delve into various aspects of this topic, including the reasons behind this shift, the circumstances in which it occurs, and how CISOs can determine if this is the right career move for them. We’ll also explore the benefits and challenges of this convergence, strategies for approaching the transition, and key factors that contribute to a CISO’s success in a CIO role.
Session #2: Through the Hacker's Eyes
For years, security teams have focused on defensive measures—reacting to threats instead of anticipating them. But attackers don’t play by the rules. They adapt, innovate, and exploit unknown weaknesses. To stay ahead, organizations must think like hackers and continuously test their external attack surface.
This session will explore how automation and offensive security strategies uncover real-world vulnerabilities before they can be exploited.
Session #3: Telemetry sprawl is eating your budget, time – and peace of mind.
Like most security teams, you’re probably grappling with an expanding attack surface and deluge of security log data (cloud, SaaS, etc.). The consequences? Greater noise and complexity, increased ingestion costs, and a heightened risk of missing critical security events.
So let’s fix it!
Roundtable Exercise
14:40 - 15:40
How can we create a viable defense strategy against zero days and supply chain risks?
As cyber threats continue to evolve, two of the most insidious risks that keep CISOs up at night are zero-day vulnerabilities and supply chain attacks. Zero-day exploits, which take advantage of unpatched vulnerabilities, and supply chain risks, which involve compromises within third-party vendors, pose significant threats to enterprise security.
This session will delve into how organizations can proactively defend against these increasingly sophisticated and evolving risks.
15:40 - 15:50
Refreshment Break
Workshops
15:55 - 16:25
Session #1: Buying Down Risk Through Strategic Technology Investments
Today’s CISOs are increasingly called upon to communicate in terms of business risk, bridging the gap between cybersecurity and executive decision-making.But what if you could extend that clarity to your technology purchasing decisions as well? Let’s explore a fresh perspective that empowers you to achieve exactly that.
Session #2: So, You Want to Be a Security Advisor? What You Need to Know Before You Start
Many professionals in the information security space consider taking on advisory roles for startups and growing companies seeking guidance. But what does it really take to be an effective advisor? This session will explore key considerations, potential challenges, and best practices for those looking to step into an advisory role. From understanding expectations to building strong partnerships, we’ll discuss what you need to know to make informed decisions and provide real value as a trusted security advisor.
16:30 - 17:00
Anti-Keynote
16:30 - 17:00
To be announced….
18:00 - 21:00
After-Summit Dinner
Time to unwind and enjoy some great company after a successful day. No more work related discussions, just good food and good people. Perfect.