Spring 2025

Please note that the session will start at 7 PM Eastern Time and that each speaker after the first will start at the completion of the prior speaker's presentation.

DATE ACCESS SPEAKERS
Wednesday, January 15

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: Herb Mattord

1.

Tuesday, January 28

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: TBD

1.

Wednesday, February 12

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: TBD

1. 

Tuesday, February 25

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: TBD

1.
Wednesday, March 19

 

Zoom Meeting
Meeting ID: 5
Passcode: 石榴直播Cybr25

Host: TBD

1.

Tuesday April 1

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: TBD

1.

Wednesday April 16

Zoom Meeting
Meeting ID:
Passcode: 石榴直播Cybr25

Host: TBD

1.

Cybersecurity Speakers From Prior Sessions

Cybersecurity speakers from prior sessions - Note links to presentations will require authentication with 石榴直播 credentials:

    
    • August 21, 
      Dustin Sachs, "", Fred Roth, ""

      September 3, Nia Luckey, "", Bryan Albertson, Patrick Sullivan, ""

      September 18
      Sundari Parekh, "Control Rationalization to Manage Audit Fatigue", Alan Greenberg, " Cyber Security in the Public Sector", Morgan Hague, ""

      October 1, 
      Jack Healey, "", Mollie Cavenaugh, "", Yosef Beck, ""

      October 16, Tim Cullen, "", Chris Silvers, "", James Grisham, ""

      October 29, Stephen Omorogbe and Michael MacDonald, "", Kyle Smith, "", Stephen Gay, ""

      November 13, Dusty Thibodeaux, "", Greg Schaffer, "", Joy Toney, ""

    • Tue, August 22, 2023, Dustin Sachs, WFS, 鈥溾 and S. Subramanian, Industry Professional, 鈥溾

      Tue, September 19, 2023, Greg Aitken, Regional Director, Intaso, Inc, "" and James Baird, Focus Brands, 鈥淲eb Application Security Program 鈥 Strategies and Tools鈥

      Wed, October 4, 2023, James Venezia, CPCU, CCIS, CCIC, Phoenix Insurance Group, 鈥溾 and Phillip Mahan, Industry Professional, 鈥溾

      Wed, October 18, 2023, Yosef Beck, IHG, 鈥溾, and Jake Bulim, Industry Professional, 鈥溾

      Tue, October 24, 2023, Chris Silvers. Industry Professional, 鈥溾

      Tue, October 31, 石榴直播 Cybersecurity Awareness Day

      Wed, November 8, 2023, Stephen Omorogbe, GTRI, 鈥溾 and Stephen McCamy, Aflac, 鈥溾

      Tue, November 14, 2023, Wes Knight, Needling Worldwide, 鈥溾 and David Benton, CHOA, 鈥溾

    • Tue., August 23, 2022, Jacob Lovell, Solutions Engineer at Akamai, "" and Aldo Febro, Ph.D.,  CISO at Continuant, ""

      Wed., September 7, 2022, Yosef Beck, Director of Security Architecture at IHG, ""

      Tue., September 20, 2022, Jon Anderson, "" and Brent Holt, 

      Wed., October 5, 2022, Kaustubh Kubde, Equifax, "" and Sam Leonard, Veeam, ""

      Tue., October 18, 2022, Charles Herring, Witfoo, "", and Phillip Mahan, Chief Risk Officer for Code Named Projects, LLC., "" 陇

      Wed., November 2, 2022, Ryan Basden, risk3sixty, ""  陇

      Tue., November 15, 2022, Asher Andree, Mandiant, "" and Jake Bulim, ""

    • Wednesday, September 1, 2021, Brian Albertson, State Farm Insurance, "Enterprise Data Enablement Risks, Controls and Vulnerabilities"

      Tuesday, September 14, 2021, 19:00 - 21:00, Virtual Session
      Yosef Beck, IHG, "Designing an effective Security Metrics and Reporting Program" 
      Christian Hyatt, risk3sixty, "Results and trends from 1000 security assessments" 

      Wednesday, September 29, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
      Jacob Lovell, Akamai, 鈥淢FA is broken: How recent developments in FIDO2 fixes it鈥
      Dan Smith, Industry Expert, "Recovering from Ransomware and Other Disasters"

      Tuesday, October 12, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
      Maryann Douglass & Sherri Collis, Online Business Systems, "Personal Security Awareness for Online Presence"
      Ward Pyles, Kids2

      Wednesday, October 27, 2021, 19:00 - 21:00, Hybrid - In person and Zoom
      Brandy Griffin, Avalon Cyber, "The Incident Response Lifecycle"
      Betty DuBois, Independent Security Consultant, "Network Reconnaissance with Open Source Tools"

      Tuesday, November 9, 2021, 19:00 - 21:00 via Zoom
      Jack Healey, BHA Group, "Impact of Bias on Risk Appetite and Tolerance" 
      Phillip Mahan, Industry Professional

    • Jacob Lovell, Solutions Engineer, Akamai, 鈥溾

      Sarah Beck, State Farm, 鈥溾

      Vinton Cerf, The Early Internet

      Mike Rothman, 鈥淭he future of security operations in a DevOps world鈥

      Chris Silvers, 鈥淔reelance cybersecurity trends and techniques鈥 

      Anne Marie Colombo, SAP America, 鈥淪ecuring the Cloud鈥

      Nick Travis Palo Alto Networks, 鈥淒efending Against Data Exfiltration via DNS鈥 

      Tim Callahan, AFLAC

      Maryann Douglas, Online Business Systems, 鈥淵ou CAN Get There from Here 鈥 Women in Cybersecurity鈥 

      Jack Healey, 鈥淐yber Incident Communication Strategies鈥

      James Blanton, Security Professional

      Nick Corn, Ionic Security, 鈥淎pplication-level Denial of Service鈥

      Joe DiBiase, Interface, 鈥淭hings we learned and adjusted to deal with  Covid-19鈥

      Kevin & Garrett Beaver, 鈥淪ecurity from a Teenager鈥檚 Perspective鈥nd what businesses need to be on the lookout for among their rising workforce鈥

    • Tim O'Neill, Network Forensics

      Joseph DiBiase, Director of Information Security, Interface, The horse has left the barn and we have the saddle!: Our journey into the cloud

      Tim Cullen, Adapture, Incident Response

      Jeff Jones, Threat Hunter, Low Knowledge Authentication

      Moazzam Khan, Security Researcher, IBM, Watson Security Research, Next Generation SIEM: Qradar and its Applications

      Jacob Lovell, Security Solutions Architect, Akamai Technologies, Fighting Armies of Zombie Robots with a Giant Robot

      Rashed Chowdhury, Principle Enterprise Applications, Infosys, Salesforce as a Platform for Innovation

      Debra Oglesby, , FIS Worldpay, Project Management

      Tate Ferguson, Service Transition Manager, FIS Worldpay, Technical Writing

      Corey Bingham, Nathan Raymer, A Primer on Georgia Payment Processing Tech Companies

      Brian Albertson , IT Control Product Owner, State Farm, Automating IT Compliance

      Jack Healey, Founder/CEO, Bear Hill Advisory Group, Baking Risk into Your Information System Souffl茅

      Daniel Williams, Matt Crane, Payment Card Industry Data Security Standard

    • Walter Tong, GA Technology Authority, Incident Management

      Ward Pyles, IHG, Career Tracks in ISA Management

      Sherron Burgess, BCD Travel, Launching an ISA Career

      Brian Albertson, State Farm, REAL IT Controls
       
      Tim O鈥橬eal, Industry Professional, Why the Physical Layer Still Matters

      Debby Briggs, NetScout, What is your Security鈥檚 Weakest Link?  The Human Firewall!

      Tim O鈥橬eal, Being an Expert Witness
       
      Mike Rothman, Securiosis, DevSecOps

      Mitch Moosbrugger, CyberArk, Emerging Threats to Privileged Account Security and Privileged Access Management

      Jeff Jones, Security Professional, The State of Insecurity in the World Today

      Katie Greenfield, Brooksource

      Alex Kirk, Tenable

      Chris Farris, Turner Inc., Pen-testing AWS

      Jack Healey, Bear Hill Advisory Group, Management Role in a Cybersecurity Incident Response Plan

      Phillip Mahan, Ionic Security

      Louis Kandel

      Philip Andreae, FIDO: The case for better authentication

      Mark German, KPMG

      Philip Mahan, Ionic Security, Security Privacy and Governance for Business Majors

    • Tim Cullen, Adapture, Dealing with Ransomware

      Phillip Mahan, Ionic Security, Why GPDR Matters to You

      Dan Streuber, Cisco, Analyzing Encrypted Network Traffic

      Brad Stafford, Checkpoint, Securing the Cloud

      Jeff Jones, Threat intelligence for the new security professional

      JoEtta LeSueur, MSIS, CISSP, Product Security Manager, Ionic Security

      Ward Pyles; CISSP, CRISC, NSA; BS IS, Masters of Law; Director Global Security and Assurance InterContinental Hotels Group

      Kyle Waddle, Comcast, Managing Cyber Crisis Events Within Matrix Organizations

      Walter Tong, Georgia Technology Authority, Managing Cyber Incidents

      Nat Prakongan, IBM, The IBM Security Cyber Range

      Ward Pyles, Intercontinental Hotels Group, ISA Careers and Advancement

      Kevin Beaver, Principle Logic, Planning a Consulting Career in ISA

      Robert Roberts, The Coca-Cola Company

      Rafal Los, Seventy7 Consulting

    • January 17, Pete Smith, 鈥淢anaging Threat Analysis鈥, Kyle Smith, 鈥淐ybersecurity as a Brand"

      January 30, 2024, Phillip Mahan, 鈥淗ow is a raven like a writing desk?鈥, Katherine Fithen, 鈥淐reating Effective Policy鈥

      February 14, 2024, Nia Luckey, 鈥淟everaging Federal Compliance Best Practices To Protect AI Data鈥, Galina Shelest, 鈥淎rt of Threat Modeling鈥

      February 27, 2024, Chris Silvers,
      鈥淣IST SP 800-63鈥, Stephen Omorogbe,
      鈥淪upply Chain Risk Management and National Security鈥, Shannon Garcia
      鈥淓levating Your Application Security Program鈥

      March 20, 2024, Philip Plantamura, "Security Onion: Peel Back the Layers of Your Enterprise鈥, Keith Deininger
      鈥淒eveloping and Executing an Effective Third-Party Risk Management Program鈥

      April 2, 2024, Joy Toney
      鈥淭he Value of Security Culture鈥, Derrick Sturisky, "Quantum Cybersecurity"

      April 17, 2024, Collin Parker
      鈥淧roduct Security and PSIRTs鈥, Kent Bryan
      鈥淲hat is Web Cloud Filtering鈥

    • February 8, 2023, Brian Albertson, State Farm, "" and Ian Kahn, Children鈥檚 Healthcare of Atlanta, "" 

      February 21, 2023, Yosef Beck, Director of Security Architecture at IHG, "" and Chris Black, Warner Media, "" 

      March 15, 2023, Kyle Smith, Children鈥檚 Healthcare of Atlanta, ""

      March 28, 2023, Ward Pyles, Kids2, "" and Sethuraman Srinivas, ""

      April 4, 2023, Manhattan Associates, George Garza 鈭, Director for Risk & Scott Perales 脳, Director of Security Architecture Cloud Operations, ""

      April 12, 2023, Dave Croasdell & Jim Elste, Cyberworkerz, "" and Patrick Sullivan, a-lign.com, ""

      April 18, 2023, Greg Aitken, Intaso Inc., "" and Chris Silvers, Industry Professional, "" 

    • January 19, 2022, Jacob Lovell, Solutions Engineer at Akamai, ""

      February 2, 2022, Ben McInnis, Technical Marketing Engineer at Palo Alto Networks, "State of Cloud-native Security in 2022 and Nick Corn, Penetration Tester at CodeMettle, "Effective Communication to Executives for Cyber Security Professionals"

      Wednesday, February 16, 20221, Ward Pyles at Kids2 and Christian Hyatt, CEO and Founder at risk3sixty, ""

      Wednesday, March 2, 2022, Bernard Barnes, Client Executive at Kyndryl, Inc. -- State of Georgia SLED, "" and J. David Quilter, Coach and Author for Security Leaders, ""

      Wednesday, March 16, 2022, Yosef Beck, Director of Security Architecture at IHG, "" and Mike Rothman at Securosis, ""

      Wednesday, March 30, 2022, Zola Maswanganye, Information Security Engineer, "Who is responsible for Security" and Jade West, Cybersecurity Engineer at The Home Depot, "Essential API Security"

      Wednesday, April 13, 2022, Keyaan Williams, Managing Director at Class-LLC, "Mastering Cybersecurity Metrics" and Anne-Marie Colombo at SAP America, ""

    • Anne Marie Columbo, SAP America, Inc., 

      Jack Healy, CPA, CFF, CFE, CRISC, Chief Executive Officer, Bear Hill Advisory Group, LLCCPA, 

      Yosef Beck, Principal Security Architect, IHG, 

      Alain Espinosa, Director of Security Operations, MSS at Online Business Systems, Preparing for your career in cybersecurity (from student to professional)

      Michael Lockhart, Director of Compliance, Salesforce Mulesoft

      Brian Albertson, AWSCCP, CDPSE, CRISC, ITIL, POPM, IT Control Management Product Owner, State Farm庐 IT Risk & Compliance, TBuilding Compliance Into Business Operations

      Adam Kehler - Director, RSP Healthcare Services at Online Business Systems, Cybersecurity in Healthcare

      Ward Pyles, KidsII Inc., Driving security teams to be more effective

      Jacob Lovell, Akamai Technologies, Web Application Security at the Edge

      Nat Prakongpan, Technical Director, X-Force Threat Intelligence and Cyber Range Lab, IBM Security, Ox Response, Incident Response Preparedness for Business

      Chris Silvers, C G Silvers Consulting, Freelance Cybersecurity Trends and Techniques

      Matthew Dobbs, Chief Integration Architect, X-Force Threat Intelligence and Integration Lab, IBM Security, Leveraging Zero Trust Architecture

      Yosef Beck, Principal Security Architect, IHG

    • David Allen, CISO, Georgia Technology Authority, Managing Cyber Risk for the Enterprise

      David Anderson, Security Consultant, Akamai Technologies, Planning and Executing Continuity Plans

      John Traino, CIO, Aaron, What it Takes to Innovate

      Bob Varnadoe, CISO, NCR, Techniques for Detecting a Cyber Attack

      Jacob Lovell, Solutions Engineer, Akamai Technologies, Third Party Scripts: Magecart & Other Threats

      Adi Wong, Akamai Technologies, Cloud Security/Akamai 101

      Phillip Mahan, Communicating Risk Appetite and Tolerance

      Sasi Pulipaka, Risk Manager, Verizon, Data Privacy and Corporate Responsibility

      Jeff Jones, Threat Hunter, Threat Intelligence Brief

      Jacob Lovell, Technical Presales, Akamai Technologies, Incident Response

      Mitch Moosbrugger, Regional Directory, CyberArk Software, The Challenges of Remote Vendor Access

      Mike Rothman, President, Securosis, Advancing Cloud Security: The Next Phase

      Tim Callahan, Global Chief Security Officer, Aflac, The Value of Threat Intelligence

    • Phillip Mahan, Security & Compliance Manager, Calendly, I am the LAW: Statutory Compliance in Corporate Cyber Security

      Tim O'Neal, Managing Criminal CYBER Investigations

      Walter Tong, GTA, Cyber Intelligence Briefing

      Jeff Jones, Industry Professional Technical Threat Brief

      Mitch Moosberger, Cyberark

      Alex Edwards, Engineer, Cisco

       Joe Catron, Lead Automation Engineer, CelticQA Solutions

      Clarence Daniels, Lead QA Engineer, CelticQA Solutions

      Frank Rietta, Applying Agile and Security in Software Development

      Philip Andreae, Payment Card Security

      Dennis Kosmetatos, NCR, Business Value of Identity and Access Management

      Tim O鈥橬eill, Attacking the Internet of Things

      Jack Healey, Bear Hill Advisory Group, Security and the Role of Risk Assessment

      Alex Edwards, Cisco

      Danny Wasserman, Akamai Technologies

      Katie Greenfield, Senior Technical Recruiter, Brooksource

      Dan Schroeder, Aprio, Information Assurance for Security and Compliance

      Bill Morrison, McKesson, SecOps Management & Planning

      Carlos Batista, BetterCloud, Software Security

      Louis Kandel, Interviewing for Success, Retired IBM Executive

    • Phillip Mahan, Ionic Security, Creating Effective Policy

      Damien Suggs, Saltworks, Application Security

      Dan Streuber, Cisco, Encrypted Traffic Analytics

      James Blanton, Winter Olympics Cyber Threats

      Jeff Jones, Threat Intelligence

      Tim O鈥橬eill, Security Professional

      Preeti Ravinda, IBM Security, Watson for Cybersecurity. 

      Jeff Jones, Security Professional, Developing Threat Intelligence

      Tim Cullen, Adapture, Introduction to Block Chain Technology 

      Anne Marie Colombo, SAP America, Enterprise Resource Planning

      Katie Greenfield, Brooksource, Managing the Recruiting Process

      Shekesa McLaurin, Macy鈥檚, Information Systems and Entrepreneurship

      Brian Albertson, State Farm, Staying Current in the Field

      Ben Mcinnis, Cisco, Compliance Role in Incident Response

      Scott Baker, The Coca-Cola Company, Data Loss Prevention

      Ward Pyles, IHG, Preparing for your ISA Career 

      Andrew Hamilton, Cybiant, Do what works, not what鈥檚 flashy

      Walter Tong, Georgia Technology Authority

      Anne Marie Colombo, SAP America, SAP & Threat Intelligence

    • Gordon Shenkle, Security Services Master Plan, June 2

      Taiye Lambo, Governance Design, June 7

      Yosef Beck, Policy Design, June 9

      Jeff Jones, Security Operations Design, June 14

      Debra Oglesby, Staffing Planning, June 16

      Anne Marie Colombo, Risk Management Framework, June 21

      Robert Roberts, Contingency Planning, June 23