Dallas, TX
Wednesday, January 31, 2024
Hybrid
Keynote Speaker
“"Blueprint for Excellence: Constructing a World Class Global AppSec Program"”
Amelio Wright
Global Application Security Leader - PepsiCo Former: Ethical Hacker-Paylocity
As a seasoned navigator of the digital frontier, Amelio brings to the stage a wealth of knowledge from the trenches of software engineering, architecture, and security. With an Executive MBA from Southern Methodist University fueling his strategic acumen, he has honed his expertise in forging scalable systems that not only solve intricate business challenges but also epitomize customer excellence.
Amelio’s odyssey in tech began within the meticulous realm of software quality assurance, where he innovated a no-code solution that empowered testers and enabled businesses to flourish unimpeded. Evolving into a developer and architect, he designed solutions to unravel complex business logic, effortlessly scaling with the demands of growth and hyper-accelerating go to market capabilities for businesses.
In the domain of application security, Amelio has been the architect of global enterprise-level programs that democratize security, empowering businesses to safeguard their digital assets.
Beyond the binary, Amelio’s heart races along the paths less traveled, throttle twisted on his motorcycle, in an endless quest for the world’s hidden vistas. Gastronomy is his personal odyssey; there's no dish too daring, no flavor too far-flung. Off the road, you’ll find him reveling in the nostalgia of 90s and 00s comedy flicks, immersed in multiplayer video games, or lost in the anthems of emo and post-hardcore music from the golden era of 2000-2010.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Michael Gregg
Chief Information Security Officer North Dakota
Joe Paul
Cybersecurity Compliance Leader & Deputy CISO Choreograph
Leah McLean
Vice President - Cybersecurity Specialist Mastercard
Paul J. Mocarski
Chief Information Security Officer and Vice President IT Infrastructure Sammons Financial
Michael Anderson
Deputy CTO Dallas Independent School District
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Ransomware Resilience: Backup Alone is No Longer Enough
2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses against ransomware is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup.
In this session, we’ll explore multifaceted strategies and share learnings from real world attacks to identify opportunities to enhance your organization’s ransomware resilience. Delving into the realms of cyber resilience, business continuity and incident response, you’ll gain insight into the latest trends in attacks, emerging threat vectors and best practices for hardening your defenses.
Sponsored by
Presentation
AI for Security
Sponsored by
Sponsor Networking Time
Presentation
The Future of Identity
Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? What do we need to have in place to be ready? It’s not all doom and gloom SkyNet, but it’s also not the same Identity we’ve been doing for 20 years.
Sponsored by
Presentation
The What, Who For, and Why of MXDR
In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
"Blueprint for Excellence: Constructing a World Class Global AppSec Program"
Welcome to “Blueprint for Excellence: Building a Global Application Security Program,” a focused exploration into the essential elements of robust application security in a global business environment. In this talk, we address the pressing need for comprehensive security strategies as organizations expand their digital operations worldwide.
We start with the story of DevCorp, whose journey epitomizes the challenges and triumphs in application security. Through DevCorp’s narrative, we’ll explore effective security frameworks, the alignment of security with business goals, and the importance of a strong leadership in cultivating a security-centric culture.
The talk then shifts to practical approaches in application security, what has worked for me and not worked for me in both organizations big and small. We will also discuss the creation of effective security teams and the significance of fostering a security-conscious culture within organizations.
This presentation is a guide for leaders and cybersecurity professionals seeking to develop and maintain a top-tier application security program, providing insights and strategies essential for navigating the complex landscape of global digital security.
Sponsor Networking Time
Presentation
Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense
Sponsored by
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Chris Dawson, Threat Intel Lead at Proofpoint, to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Sponsor Networking Time
The ChatGPT Threat: Protecting Your Email from AI-Generated Attacks
The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical errors that have become a key indicator of attack. That means credential phishing and BEC attacks are only going to increase in volume and severity.
Sponsored by
Presentation
Digital Sovereignty
A discussion on using a converged platform approach to satisfy best practice criteria for Zero Trust, Digital Sovereignty, and Post Quantum Computing in Traditional, Hybrid, and Cloud Environments.