Aug 30
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Atlanta

X Topic Abstract

Blended Threats and Attacks are becoming far more prevalent. Attacks on organizations now quickly traverse traditional network assets and impact IoT-based physical controls.
Additionally, nearly all physical threats, including active shooter scenarios, against the organization are premeditated and 86% have a digital notification before hand. We'll share techniques the audience can use to prevent these events.

Talk format: 45 minutes Presentation with real life examples

Speaker will be punctuating the presentation with life examples throughout

Speaker's Bio:

Patrick Kelley is an Information Security veteran with over 20 years of experience in the field.

He has spoken on panels with members from the FBI, CIA, and NSA. He is a ongoing CyberSecurity Expert for 11 Alive and NBC News.

His research has been covered by FORTUNE, Bleeping Computer, CNN, NBC News, The Guardian, Globe and Mail, and Krebs Security Online.

Further, he has worked extensively in the entertainment and finance, both in the US, Canada, Mexico, and Ireland.

X Topic Abstract

Establishing security governance, policies, processes, etc. is something every company has to do today, and most companies do it well. However, how can they ensure that all those policies and rules will really end up built into the product development process? The research shows that the security divisions in many companies suffer from not being able to control the development process, and that creates heated situation every time a new release is out of the door. The solution is simple - built in the security tools and practices within the CICD process! This way the developers cannot skip the checks, they will not need to struggle manually running various/multiple scannings, the delivery process will properly record all results, and you can establish a Go/No go process if there are critical and high issues to be resolved before the new code is deployed to QA or Prod. This talk will present what we do at Honeywell to ensure our offerings are developed at the best of bread!

X Topic Abstract

Social media can be a gray area for cyber security. Employees are eager to engage and get noticed as thought leaders and are prone to oversharing sensitive materials. This is incredibly damaging from a brand management perspective, but also from a cyber security perspective as well. In this session, organizations will learn strategies on how to protect themselves with an employee social media policy and program including:

• Best practices and tips for creating a social media policy for all employees
• Social listening strategies to monitor for potential leaks
• Deploying an employee social media program that enables employees to be active on social media without putting your organization at risk.

Speaker profile

Andreea Cojocariu creates digital marketing joy at Cojoy Marketing as the CEO and Chief Digital Marketing Officer. She is one of the original social media marketers, developing programs over 13 years ago before marketers realized it was a viable marketing channel. She helps organizations go beyond typical digital marketing strategies and teaches them how to harness the power of employee social media for brand awareness and also brand security by deploying programs that enable social media cyber security.

X Topic Abstract

One of the main goals of RBAC is to establish the Principle of Least Privileges and grant employees only the access they need to do their jobs. Grouping common access permissions into roles provides a secure and efficient way of managing access and helps keep things simple for administrators the users requesting access. RBAC has become the standard for managing access to IT resources in industry and government. Implementation of RBAC in an enterprise often becomes a major and daunting task. Adopting some of the best practices early in the implementation of RBAC program will ensure successful delivery of the program within the enterprise.

Speaker profile

Bhavdip is an experienced cyber security technologist and architect through combined experience in Identity and Access Management. Bhavdip has strong understanding and in-depth experience of Identity and Access Management (IAM) Frameworks and industry best practices. He has developed various technical IAM frameworks for better automation and efficient execution of corporate Identity and Access Management programs across the industry. Bhavdip served as an SME on the largest and most complex IAM Implementations for various retail, financial, healthcare, education and manufacturing organizations in last 10 years. He is passionate about providing innovative solutions to the companies in the field for their most complex challenges in the IAM and Cyber Security areas.
Bhavdip holds a Master of Science degree with Commendation from University of Hertfordshire in UK.”

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Our Sponsors

Media Partners


Association partner

Digital Marketing Partner

Marketing Partner

Promotional & Media Partners

Our Past Sponsors

Media Partner


Our Speakers

Andreea Cojocariu

Chief Digital Marketing Officer

Cojoy Marketing

Bhavdip Rathod

Solution Architect(IAM)


Patrick Kelley


Critical Path Security


Vice President, DevSecOps & Strategy


Our Pricing

Group of 3 or more(Early Bird)
USD 300 Till June 16
Group of 3 or more(Standard)
USD 349 Till August 30
Individual(Early Bird)

USD 409 Till July 30
Individual (Standard)

USD 469 Till August 30

Our Testimonial


Who can attend Cyber Security Summit in Atlanta?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Atlanta?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.