Western-December
Wednesday, December 7, 2022
Virtual
Keynote Speaker
““How to Rob a Bank Over the Phone””
Joshua Crumbaugh
Ethical Hacker, Published Author, CEO at PhishFirewall
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
XDR – not all treasures are silver and gold
Sponsored by
Presentation
Analyze - Assess - Audit - Prevent
This session will help IT security admins a structured basic approach to have an inventory of the infrastructure. When you keep your inventory up-to date, you are protecting your investment. Awareness of how attacks are happening and the signature with which we can learn, Utilize tools and build an infrastructure that will help secure your interests.
Sathish Sagayaraj Joseph
Technical Expert & Manager, Strategic Account Management Zoho Corporation
Sponsored by
Keynote
“How to Rob a Bank Over the Phone”
Presentation
See risk differently! Surface unseen risk to get ahead of threats!
Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments. And they’re usually a few steps ahead of you.
How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams? You need to see risk differently by taking a different approach!
Join this session and learn how to:
-
Gain insight into your risk posture and how risk impacts your business priorities
-
Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities
-
Use intelligence and automation to deliver quick wins while freeing up your team’s’ time
Sponsored by
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Presentation
Continuous Monitoring at Scale: The Future of Security Compliance
As technology advances and cybersecurity grows in importance, compliance requirements continue to increase. The old way of asking system admins for point-in-time screenshots, multiple times a year, is inefficient and outdated. In order to evolve the security compliance profession, we need a new way of performing compliance activities through continuous automation. This session will spotlight the way forward for compliance teams in today’s ever-evolving cyber risk landscape.
Learning Objectives:
The importance of why we need to evolve security compliance.
Best practices for implementing compliance at code-level.
Examples of how to apply continuous monitoring in your security compliance program.
Sponsored by
Presentation
The Past, Present and Future of Strong Authentication
Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective. Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.In this talk, we will discuss:
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
Sponsored by
Presentation
Data Sensitivity Impacts on Zero Trust Implementation
Not all zero trust is created equal. In this talk, Andy will discuss how organizations are implementing a zero trust framework, and how the importance of data classification applies to implementing the proper level of control in a modern environment.
Sponsored by
Presentation
Key Considerations for Choosing the Right Cloud Email Security Platform
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Unfortunately, email threats are only growing in number. Business email compromise accounts for 35% of all losses to cybercrime, and the Verizon Data Breach Investigations Report holds that phishing remains the top entry point for breaches—a position it has held for years.
Does that mean email is doomed, and we should give up? Quite the opposite. But the shift to cloud email requires one major thing: a shift to cloud email security.
Attend the Abnormal Security session for answers to your most pressing questions, including:
– What are modern email threats, and how are they different from legacy attacks?
– Which email threats are most concerning, and how can we defend against them in the cloud environment?
– Which technical capabilities are required when protecting cloud email?
– How can cloud email security platforms detect the most dangerous attacks?