Washington D.C. Cybersecurity Conference

Thursday, August 22, 2024

Washington Plaza Hotel

Parking/Directions

Hybrid

Join Us in Washington for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Washington Plaza Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Continuous Compliance (cATO) with ML and OSCAL

Achieving continuous compliance (cATO) requires integration with development teams, security teams, security tools, authorizing officials, and DevOps platforms. A ‘common data fabric’ is necessary to enable standardized information exchange and automate analysis. OSCAL is the data fabric that allows for standardized data exchange across all security operations and sets the read more…

Achieving continuous compliance (cATO) requires integration with development teams, security teams, security tools, authorizing officials, and DevOps platforms. A ‘common data fabric’ is necessary to enable standardized information exchange and automate analysis. OSCAL is the data fabric that allows for standardized data exchange across all security operations and sets the foundation for achieving a continuous compliance posture. Learn how security teams can transition to a robust cATO compliance framework.

Bio

Valinder Mangat

Chief Innovation Officer DRTConfidence Inc.

Sponsored by

Presentation

9:30 am

Vendor Inventory & Security Sprawl Analysis (VISSA)

The cyber security threat is evolving rapidly, new threat actors and new threat vectors often require new solutions many times offered by new technology vendors. Traditionally this leads to Vendor Sprawl This doesn’t always lead to better security controls. And this vendor sprawl can actually reduce our Cyber security readiness.

The cyber security threat is evolving rapidly, new threat actors and new threat vectors often require new solutions many times offered by new technology vendors. Traditionally this leads to Vendor Sprawl
This doesn’t always lead to better security controls. And this vendor sprawl can actually reduce our Cyber security readiness.

Bio

Daniel Lakier  

Cybersecurity Field CISO Myriad360

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Why is Critical data being compromised?

Bio

Asif Amjad

Senior Solutions Architect Thales

Sponsored by

11:00 am

Cyber insurance is an important part of cyber resilience, but is it creating monoculture cybersecurity?

Recent events have caused many companies to revisit their cyber resilience strategy – where cyber risk insurance is often seen as an essential element. Join us to gain a comprehensive insight into some of the recent major cyber-incidents, discoveries by researchers, the role insurers are playing in improving cybersecurity posture read more…

Recent events have caused many companies to revisit their cyber resilience strategy – where cyber risk insurance is often seen as an essential element. Join us to gain a comprehensive insight into some of the recent major cyber-incidents, discoveries by researchers, the role insurers are playing in improving cybersecurity posture and their approach to managing risk. Understanding insurance requirements and how they change could provide valuable insight into risk reduction. We will also cover the increasing dangers of a monoculture cybersecurity ecosystem.

Bio

Tony Anscombe

Chief Security Evangelist ESET

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

12:00 pm

The changing dynamics of a CISO role in the age of AI

Bio

John Opala, PhD

VP & Global Chief Information Security Officer Hanesbrands Inc.
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

What XDR Can't See: Detecting and Responding to Application and API Security Incidents

Cybersecurity products detect and respond to incidents in production involving endpoints, servers, cloud, networks, and more.  The glaring exception is the application layer. Enterprises have a massive application and API vulnerability backlog, over 1,100,000 according to Ponemon and fixing them with traditional application security programs will take years. So we read more…
Cybersecurity products detect and respond to incidents in production involving endpoints, servers, cloud, networks, and more.  The glaring exception is the application layer. Enterprises have a massive application and API vulnerability backlog, over 1,100,000 according to Ponemon and fixing them with traditional application security programs will take years. So we need a strategy to prevent existing flaws from being exploited, not to mention new vulnerabilities and zero-days in open source libraries. In this session, we’ll explore application and API protection in the security operations ecosystem.  Legacy approaches, like web application firewalls haven’t been very effective and don’t integrate into existing XDR, SIEM, and SOAR ecosystems. We’ll discuss the rise of Application Detection and Response (ADR) products and how they gather events by directly monitoring running applications and APIs, how they generate a “security blueprint” of every workload, and how they discover real attacks and prevent exploits.  We’ll also discuss how ADR supports “shift left” efforts with the context needed to prioritize risks effectively in development and how ADR streamlines threat modeling and penetration testing to make them more cost effective.
Bio

Jeff Williams

Founder and CTO Contrast Security

Sponsored by

Presentation

2:00 pm

AI-Infused MXDR and the Autonomous SOC

MXDR helps organizations detect and respond to cyber-attacks before the attacker’s objective is completed. This presentation will cover: What is ‘getting left of bang’?  Why is it so hard? How MXDR makes it easy Customer use cases • 2023: Findings from 35,000 Customer SitReps How AI will drive the “Autonomous read more…

MXDR helps organizations detect and respond to cyber-attacks before the attacker’s objective is completed. This presentation will cover:

  • What is ‘getting left of bang’?
  •  Why is it so hard?
  • How MXDR makes it easy
  • Customer use cases • 2023: Findings from 35,000 Customer SitReps

How AI will drive the “Autonomous SOC” Our presentation will show how MXDR compresses mean-time-to-detect and mean-time-to-respond at the lowest possible cost, and how AI will soon collapse all three.

Bio

Neal Hartsell

Chief Marketing Officer Gradient Cyber

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

“Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security read more…

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.

But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!

Bio

Michael Marx

Solutions Engineer MySQL

Sponsored by

Presentation

3:15 pm

Shadow AI: Reducing Risk while Driving Innovation

Generative AI can be a catalyst for solving large complex social problems. As with any emerging technology, public sector organizations are grappling with how to harness those benefits while protecting the citizens they serve. In the face of growing legislation around the development, use and consumption of AI technologies, organizations read more…

Generative AI can be a catalyst for solving large complex social problems. As with any emerging technology, public sector organizations are grappling with how to harness those benefits while protecting the citizens they serve.

In the face of growing legislation around the development, use and consumption of AI technologies, organizations need to understand how these technologies expose risk to not only for themselves, but also their constituency.

The potential exposure of internal and citizen data to public insecure training data sets raises risk. These risks are forming the basis for emerging laws and regulations.  “Shadow AI” must be addressed with a comprehensive approach to governance and control to allow the safe and responsible use of AI platforms.

This session will discuss the implications of Shadow AI and factors that organizations and institutions need to consider in this space.  The session will also outline various mitigation strategies and relevant controls to address the threat allowing for the safe consumption of AI as an innovation accelerator.

Bio

Scottie Ray

Principal Solutions Architect Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Gregory Carpenter

Chief Security Officer KnowledgeBridge International
Bio

Dr. Dele Bankole

Director, IT Security Center for Employment Opportunities
Bio

Dr. Kellep Charles

Director, Center for Cybersecurity Research and Analysis (CCRA) Chair, Cybersecurity Programs & Professor, Cybersecurity & Computer Science
Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica
Bio

Amber Simco

Senior Advisor, Technical Policy & Strategy Department of Homeland Security | Cybersecurity and Infrastructure Security Agency
5:00 pm

Closing Remarks