Indianapolis, IN
Thursday, October 12, 2023
Hybrid
Keynote Speaker
“"Using the Right Metrics to Communicate the Business Value of Your Information Security Program"”
Adam Stone
Vice President Services Delivery and Chief Privacy Officer TrustMAPP
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Ron Zochalski
Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Adam Stone
Vice President Services Delivery and Chief Privacy Officer TrustMAPP
Darryl Togashi
Vice President, InfraGard Indiana Indiana State Director, Collegiate Cyber Defense Competition Cybersecurity Professor, Purdue University Global
David Sims
Staff Vice President, Security Technology Services Elevance Health
Bernie Hirsch
CIO/CISO/CQO MicroVote General Corporation
Thomas Riebe
Chief Technology Officer Ivy Tech Community College of Indiana
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Breaches - how to prepare and manage vulnerabilities in the cloud
Sponsored by
Presentation
Kubernetes Security Is Impossible And You Should Probably Just Give Up
Security and compliance are complex and challenging. Kubernetes is definitely complex and challenging. And then you add a bunch of people into the mix. If this sounds like an impossible cocktail to overcome, you’re right! Join us for a session about how to enable zero-trust controls in Kubernetes, and how it will never work if we just throw more tools at the problem.
Sponsored by
Sponsor Networking Time
Presentation
Visibility on the Unknown - Network Visibility Use Cases, Trends and a Mature SOC
Sponsored by
Presentation
Don't Trust Your Inbox
As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.
Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to emailSponsored by
Sponsor Networking Time
Lunch
Keynote
"Using the Right Metrics to Communicate the Business Value of Your Information Security Program"
Networking
Sponsor Networking Time
Presentation
DevSecOps Alchemy: Communications, Processes and Visibility
Sponsored by
Presentation
Git Em’: Threat Actors and the usage of Git as a Delivery Mechanism
Git is a popular tool for version control and source code management among developers and software engineers in small and large enterprises alike. However, threat actors have taken a liking to using Git as well. This talk will dive into how threat actors are using Git and popular services that leverage Git. We’ll dive into commodity attacks, APT usage, and more techniques that leverage Git or Git powered services.