Panel Discussion Hosted by TAG

Time

7:00 AM -9:00 AM

Room

Chastain – 6th floor



Join the Young Professional’s Group to discuss how to protect you brand. We will be having a panel discussion with industry experts to discuss how employees are exposing their employers to risk unknowingly, how individuals can protect their own personal brand, and how individuals can help improve their organizations security through brand protection. We will show users tools that hackers use to conduct reconnaissance and identify information out about their targets and how that information could be used to launch a successful attack. In addition, we will have branding experts that can help you in crafting your personal brand.

Panelists:

Laura Withers – RiskIQ and Technology Association of Georgia Information Security Society Board Member

Lurleen Sargent – SertintyOne and Women in Technology Tennessee

Joe Gray – Sword & Shield and Winner of DerbyCon SECTF

Additional Panelists Pending

Hacker Halted Agenda

Time

9:00AM-9:50AM

Room

Peachtree C&D


Keynote

IoT Security – Executing an Effective Security Testing Process


Deral Heiland, Research Lead – Rapid7

Read Bio

Time

9:55AM-10:40AM

Room

Peachtree C&D


Keynote

W.A.R. (WordsAreRisk)


Deidre Diamond, Founder and CEO, CyberSN and #brainbabe

Read Bio

10:45AM-10:55AM

Break

Time

11:00AM-11:45AM

Room

Peachtree C&D


Keynote

Phishing: It’s Not Just for Pentesters – Using Phishing to Build a Successful Awareness Program


Joe Gray, Enterprise Security Consultant, Sword & Shield Enterprise Security, Inc.

Read Bio

11:55AM-1:25PM

Lunch

Breakout Session One

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

1:35PM – 2:15PM

Room

Chastain


The Anarchist’s Guide to Security Management – A Strategy To Apply Infosec Skills To A Human Challenge


Spencer Wilcox, Direcotr of Operational Technology Cyber Security, Exelon

Read Bio

PHILOSOPHY OF CYBER WAR

Time

1:35PM – 2:15PM

Room

Chastain F & G


The Tao of Cyber Warfare: Introducing an Innovation Frame that Will Dramatically Bolsters Cyber Defense (& Offense)


LTC Ernest Wong, Miltary Intelligence Officer in the US Army

Read Bio

THE TECH BEHIND CYBERWAR

Time

1:35PM – 2:15PM

Room

Chastain I & J


Challenges in Reversing a Polymorphic Ransomware


Raul Alvarez, Senior Security Researcher, Malware Reverse Engineering Trainer at Fortinet

Read Bio

Breakout Session Two

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

2:25PM – 3:05PM

Room

Chastain


How to Patch Stupid – A modern approach to remediating user risk


Joshua Crumbaugh, CEO @ PeopleSec, LLC

Read Bio

PHILOSOPHY OF CYBER WAR

Time

2:25PM – 3:05PM

Room

Chastain F & G



Aamir Lakhani, Global Security Strategist & Researcher, Fortinet

Read Bio

THE TECH BEHIND CYBERWAR

Time

2:25PM – 3:05PM

Room

Chastain I & J


Turning Intelligence Into Action: Security Strategies for Enabling Threat Intelligence


Jess Parnell, Director of Information Security, Centripetal

Read Bio

3:05PM-3:20PM

Closing & Raffle

Peachtree A