Dallas, TX

Wednesday, January 31, 2024

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Ransomware Resilience: Backup Alone is No Longer Enough

2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses against ransomware is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup. In this session, we’ll explore multifaceted read more…

2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses against ransomware is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup.

In this session, we’ll explore multifaceted strategies and share learnings from real world attacks to identify opportunities to enhance your organization’s ransomware resilience. Delving into the realms of cyber resilience, business continuity and incident response, you’ll gain insight into the latest trends in attacks, emerging threat vectors and best practices for hardening your defenses.

Bio

Kelly Kroening

Product Marketing Manager Unitrends

Sponsored by

Presentation

9:30 am

AI for Security

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
Bio

Jason Black

Enterprise Account Executive Next DLP

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Future of Identity

Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? read more…

Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? What do we need to have in place to be ready? It’s not all doom and gloom SkyNet, but it’s also not the same Identity we’ve been doing for 20 years.

Bio

Jim Gerken

Director of Identity Services Novacoast

Sponsored by

Presentation

11:00 am

The What, Who For, and Why of MXDR

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the read more…

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments.

Bio

Neal Hartsell

Chief Marketing Officer Gradient Cyber

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

"Blueprint for Excellence: Constructing a World Class Global AppSec Program"

Welcome to “Blueprint for Excellence: Building a Global Application Security Program,” a focused exploration into the essential elements of robust application security in a global business environment. In this talk, we address the pressing need for comprehensive security strategies as organizations expand their digital operations worldwide. We start with the read more…

Welcome to “Blueprint for Excellence: Building a Global Application Security Program,” a focused exploration into the essential elements of robust application security in a global business environment. In this talk, we address the pressing need for comprehensive security strategies as organizations expand their digital operations worldwide.

We start with the story of DevCorp, whose journey epitomizes the challenges and triumphs in application security. Through DevCorp’s narrative, we’ll explore effective security frameworks, the alignment of security with business goals, and the importance of a strong leadership in cultivating a security-centric culture.

The talk then shifts to practical approaches in application security, what has worked for me and not worked for me in both organizations big and small. We will also discuss the creation of effective security teams and the significance of fostering a security-conscious culture within organizations.

This presentation is a guide for leaders and cybersecurity professionals seeking to develop and maintain a top-tier application security program, providing insights and strategies essential for navigating the complex landscape of global digital security.

Bio

Amelio Wright

Global Application Security Leader - PepsiCo Former: Ethical Hacker-Paylocity
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into read more…
The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.
Bio

David Hagen

Cybersecurity Evangelist TPx

Sponsored by

Presentation

2:00 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Chris Dawson, Threat Intel Lead at Proofpoint, to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Chris Dawson

Threat Intelligence Publications Lead Proofpoint

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
2:45 pm

The ChatGPT Threat: Protecting Your Email from AI-Generated Attacks

The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical errors that have become a key indicator of attack. That means credential phishing and BEC attacks are only going to increase read more…

The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical errors that have become a key indicator of attack. That means credential phishing and BEC attacks are only going to increase in volume and severity.

Bio

Scott Deluke

Manager, Enterprise Engineers Abnormal

Sponsored by

Presentation

3:15 pm

Digital Sovereignty

A discussion on using a converged platform approach to satisfy best practice criteria for Zero Trust, Digital Sovereignty, and Post Quantum Computing in Traditional, Hybrid, and Cloud Environments.

A discussion on using a converged platform approach to satisfy best practice criteria for Zero Trust, Digital Sovereignty, and Post Quantum Computing in Traditional, Hybrid, and Cloud Environments.

Bio

Mike Jordan

Senior Solutions Architect Thales Cloud Security

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Michael Gregg

Chief Information Security Officer North Dakota
Bio

Joe Paul

Cybersecurity Compliance Leader & Deputy CISO Choreograph
Bio

Leah McLean

Vice President - Cybersecurity Specialist Mastercard
Bio

Paul J. Mocarski

Chief Information Security Officer and Vice President IT Infrastructure Sammons Financial
Bio

Michael Anderson

Deputy CTO Dallas Independent School District
5:00 pm

Closing Remarks

5:00 pm

Happy Hour Begins | Cocktails

5:30 pm

Performance by | Jeff Kirby, CISO, Interstate Batteries and his Rock Band, Scepter-Hackers Beware!

6:30 pm

Kirk Tatum back again with his acoustic performance