Orange County Cybersecurity Conference

Thursday, June 27, 2024

Anaheim Marriott

Parking/Directions

Hybrid

Join Us in Orange County for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Anaheim Marriott

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Moving Towards a Zero Trust Mindset

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Bio

Sergio Zygmunt

Solutions Engineer Cloudflare

Sponsored by

Presentation

9:30 am

Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into read more…

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

Bio

David Hagen

Cybersecurity Evangelist TPx

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Data Security and Ransomware Protection is not just about the Data.

Data Security and Ransomware Protection is not just about the Data. The vast majority of attacks span all three of the data, identity, and infrastructure attack surfaces. A holistic, multi-layered approach spanning multiple IT and Security teams is required to effectively protect against data breaches. Surprisingly, there is plenty of read more…
Data Security and Ransomware Protection is not just about the Data. The vast majority of attacks span all three of the data, identity, and infrastructure attack surfaces. A holistic, multi-layered approach spanning multiple IT and Security teams is required to effectively protect against data breaches. Surprisingly, there is plenty of low-hanging fruit for things you can do to increase your Data Security posture but don’t be fooled by the promise of a single product panacea. Finally, remember that while cloud adoption transfers more of the IT and Security burden to your CSPs, ultimately, you forever remain responsible for the management of all of your data and identities.
Bio

John Newsom

VP, Global Business Development & Strategy Netwrix

Sponsored by

Presentation

11:00 am

Operationalizing Cyber Threat Intelligence To Optimize Your Defenses

Operationalizing threat intelligence, aligning an organization’s security posture to the threats that are most likely to target them, is often easier said than done. It is a manual and tedious process to take information from a threat intelligence source and convert it into actionable, realized defenses. This talk will focus read more…

Operationalizing threat intelligence, aligning an organization’s security posture to the threats that are most likely to target them, is often easier said than done. It is a manual and tedious process to take information from a threat intelligence source and convert it into actionable, realized defenses. This talk will focus on the difficulty security teams face in using Commercial Threat Intelligence and making it actionable.

Bio

Dana Porter

Senior Security Consultant Interpres Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

12:00 pm

Lessons from the Trenches: Effectively Communicating Cyber Risk to the Board

Bio

Mark Dy-Ragos

VP, CISO Wescom Credit Union
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Who Moved My Я?: When Definitions Matter

In the ever-evolving world of cybersecurity, Managed Detection and Response (MDR) has become the front lines in the combat against cyber threats. Designed to discover and contain active threats, the concept of “MDR “Response” is often murky, and leaves much of the actions in the hands of the client. This presentation read more…

In the ever-evolving world of cybersecurity, Managed Detection and Response (MDR) has become the front lines in the combat against cyber threats. Designed to discover and contain active threats, the concept of “MDR “Response” is often murky, and leaves much of the actions in the hands of the client. This presentation will explore the reasons behind the variability in MDR response and how platformization is the key to achieving clarity and improving the overall security posture with active incident investigation and containment.

Bio

Michael Wells

Director Alliance Channels Adlumin

Sponsored by

Presentation

2:00 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Shifting Responsibility Left - Transforming Software Security for Innovation and Compliance

2024 will mark the pivot point when software security finally gets the attention it has been lacking. The impetus for transformation will be driven by the innovation opportunities of AI and the rise of regulation focused on creating better security outcomes for customers. Join Andreea Lupu, GitLab Solutions Architect, in read more…

2024 will mark the pivot point when software security finally gets the attention it has been lacking. The impetus for transformation will be driven by the innovation opportunities of AI and the rise of regulation focused on creating better security outcomes for customers. Join Andreea Lupu, GitLab Solutions Architect, in this high-level overview. She will examine standards and regulations your software and application security programs should care about, the impact of non-conformance on your business, and recommendations on how to prepare for this sea change.

Bio

Andreea Lupu

Solutions Architect GitLab

Sponsored by

Presentation

3:15 pm

Data is Everywhere So is User Access

Working from home is no longer the outlier it’s the Normal, bringing along challenges like heartache, sleep loss, and dread of missing security access in places like Starbucks or public WiFi. To tackle these issues, let’s find solutions that keep data secure everywhere.

Working from home is no longer the outlier it’s the Normal, bringing along challenges like heartache, sleep loss, and dread of missing security access in places like Starbucks or public WiFi. To tackle these issues, let’s find solutions that keep data secure everywhere.

Bio

Justin Bortnick

Sales Engineering Manager Forcepoint

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Karla Clarke Ph.D.

Senior Director Global Product Security Beckman Coulter Diagnostics
Bio

James Steele

CISO | IT Executive | Cybersecurity Incident Management, Process Improvement CalOptima
Bio

Josue Sainz

Information Security Officer-Manager Los Angeles Federal Credit Union
Bio

Allen Ohanian

Information Security Officer Los Angeles County Department of Children and Family Services
Bio

Mark Dy-Ragos

VP, CISO Wescom Credit Union
5:00 pm

Closing Remarks