hh app

Panel Discussion Hosted by TAG

Time

7:00 AM -7:30 AM
Networking/Breakfast

7:30 AM -8:30 AM
Panel

8:30 AM -8:45 AM
Q&A from the Audience

Room

Chastain – 6th floor


tag


Join TAG as Atlanta CISOs engage in a moderated panel discussion IOT, Data Sharing and vendor party risks, Threat Intelligence, Incident Response preparedness, and concepts of Kill Chain.

Panelists:

Bob Varnadoe is Chief Information Security Officer for NCR Corporation. His duties include overall information security and operational/IT aspects of NCR’s privacy program, IT risk management, and compliance company-wide, training and awareness for information security, and oversight of the deployment of security technologies.

Julie Talbot-Hubbard is the Head of Information Security Operations at SunTrust where she is accountable for leading both the enterprise wide information security operations strategy and organization; encompassing Security Design & Engineering, Identity & Access Management, Information Protection, Threat & Vulnerability Management, and the Security Operations Center.

Hacker Halted Agenda

Time

9:00AM-9:15AM

Room

Peachtree C&D


Conference Kick Off


Eric Lopez

Eric Lopez

Time

9:15AM-10:05AM

Room

Peachtree C&D


Keynote


Jay Bavisi

Jay Bavisi, EC-Council CEO

Time

10:05 AM – 11:30 AM

Room

Peachtree C&D


Debate

Hackers, The Media, Truth, Trust, and Alternative Facts


Winn Shwartau

Moderator: Winn Shwartau

Founder, The Security Awareness Company

Read Bio

Gregory Carpenter

DrPH Gregory Carpenter

COO of Pragmatick IO, Inc

Read Bio
Michael J. Masucci

Michael J. Masucci

Hollywood Producer

Read Bio
Mark Rasch

Mark Rasch

Chief Security Evangelist at Verizon

Read Bio

11:35AM-11:50AM

Break

Time

11:50AM-12:25PM

Room

Peachtree C&D


Keynote

Leave your zero days at the door, leave your latest hacks behind, AND bring your playbook for the blue team


Chris Roberts

Chris Roberts, Chief Security Architect at Acalvio Technologies

Read Bio

12:30PM-2:00PM

Lunch

Breakout Session One

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

2:10PM – 2:50PM

Room

Chastain


When Current Ransomware and Payload of the Day (CRAP of the day) Hits the Fan: Breaking the Bad News


Catherine Ullman

Dr. Catherine Ullman, Senior Information Security Analyst, University at Buffalo

Read Bio

PHILOSOPHY OF CYBER WAR

Time

2:10PM – 2:50PM

Room

Chastain F & G


A Functional Taxonomy of Information Warfare and Cyberweapons


Winn Schwartau

Winn Schwartau, Founder, The Security Awareness Company, InfowarCon and Securityexperts.com

Read Bio

THE TECH BEHIND CYBERWAR

Time

2:10PM – 2:50PM

Room

Chastain I & J


A Corporate Guide to Surviving Cyberwarfare Through Cyber Resiliency


Dr. John Johnson

Dr. John Johnson, CEO and Founder of Aligned Security

Read Bio

Breakout Session Two

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

3:00PM – 3:40PM

Room

Chastain


Deception, perception, and how to lose the cyberwar


Fred Cohen

Dr. Fred Cohen, CEO, Management Analytics

Read Bio

PHILOSOPHY OF CYBER WAR

Time

3:00PM – 3:40PM

Room

Chastain F & G


Hacking Drones: Cyberspace and Interconnected Systems


Laura Samso Pericon

Laura Samso Pericon

Read Bio

THE TECH BEHIND CYBERWAR

Time

3:00PM – 3:40PM

Room

Chastain I & J


Hidden in plain sight; How possibly could a decades old standard be broken?


Paul Mellen

Paul Mellen

Read Bio

Breakout Session Three

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

3:50PM – 4:30PM

Room

Chastain


The Hidden Sun Tzu: Deceiving the Master


Gregory Carpenter

DrPH Gregory Carpenter, COO of Pragmatick IO, Inc.

Read Bio

PHILOSOPHY OF CYBER WAR

Time

3:50PM – 4:30PM

Room

Chastain F & G


Decoding Cyber Counterintelligence (CCI) for the Private Sector


Jonathan Creekmore

Jonathan Creekmore, Executive Director, Cyber Discvoery Group Inc.

Read Bio

THE TECH BEHIND CYBERWAR

Time

3:50PM – 4:30PM

Room

Chastain I & J


Bypassing iOS Security using Enterprise Provisioning Hooks?


Georgia Weidman

Georgia Weidman, Founder and CTO at Shevirah and Bulb Security LLC

Read Bio

Breakout Session Four

ALL CYBER WARFARE IS BASED ON DECEPTION

Time

4:40PM – 5:20PM

Room

Chastain


Proactive Defense: Leveraging Red Team reconnaissance to reduce your asset exposure


Joshua Hiller

Joshua Hiller, Principal Information Security Officer of Community Brands

Read Bio

PHILOSOPHY OF CYBER WAR

Time

4:40PM – 5:20PM

Room

Chastain F & G


Application of Sun Tzu Art of War Principles to the Cyber Warfare Domain


Roy E. Wilson

Roy E. Wilson, Professor of Acquisition Cybersecurity, Defense Acquisition University, Mid-Atlantic Region

Read Bio

THE TECH BEHIND CYBERWAR

Time

4:40PM – 5:20PM

Room

Chastain I & J


Incident Response in Hybrid Cloud


Yuri Diogenes

Yuri Diogenes, Senior Content Developer at Microsoft CSI Enterprise Mobility and Security Team

Read Bio

5:30PM-5:45PM

Closing & Raffle

Peachtree A

Hacker Halted Happy Hour

Time

5:30 PM – 8:00 PM

Room

Savannah Ballroom – 10th floor


cybersec jobs


Join us for the Hacker Halted Happy Hour for drinks, food, and fun and stop by the CyberSecJobs.com Hiring Fair! Click to learn more and upload your resume.