Washington D.C. Cybersecurity Conference
Thursday, August 22, 2024
Hybrid
Join Us in Washington for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“The changing dynamics of a CISO role in the age of AI”
John Opala, PhD
VP & Global Chief Information Security Officer Hanesbrands Inc.
A Cyber security executive with 19 years of experience in Information Technology (IT) specializing in IT management, IT infrastructure engineering, IT security management, and enterprise security architecture. Defined and delivered cyber security strategy for security engineering, identity and access management (IDM), cloud security, operation technology (OT), IoT and cyber security operation center (CSOC). Performed evaluations and selection of cyber security tools and successfully implemented them to provide optimal security and risk controls for critical business information systems. Prepared and presented cyber security risk posture and enhancements on quarterly basis.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Gregory Carpenter
Chief Security Officer KnowledgeBridge International
Dr. Dele Bankole
Director, IT Security Center for Employment Opportunities
Dr. Kellep Charles
Director, Center for Cybersecurity Research and Analysis (CCRA) Chair, Cybersecurity Programs & Professor, Cybersecurity & Computer Science
Nish Majmudar
VP & Chief Information Security Officer Mathematica
Amber Simco
Senior Advisor, Technical Policy & Strategy Department of Homeland Security | Cybersecurity and Infrastructure Security Agency
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Washington Plaza Hotel
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Continuous Compliance (cATO) with ML and OSCAL
Achieving continuous compliance (cATO) requires integration with development teams, security teams, security tools, authorizing officials, and DevOps platforms. A ‘common data fabric’ is necessary to enable standardized information exchange and automate analysis. OSCAL is the data fabric that allows for standardized data exchange across all security operations and sets the foundation for achieving a continuous compliance posture. Learn how security teams can transition to a robust cATO compliance framework.
Sponsored by
Presentation
Vendor Inventory & Security Sprawl Analysis (VISSA)
The cyber security threat is evolving rapidly, new threat actors and new threat vectors often require new solutions many times offered by new technology vendors. Traditionally this leads to Vendor Sprawl
This doesn’t always lead to better security controls. And this vendor sprawl can actually reduce our Cyber security readiness.
Sponsored by
Sponsor Networking Time
Presentation
Why is Critical data being compromised?
Sponsored by
Cyber insurance is an important part of cyber resilience, but is it creating monoculture cybersecurity?
Recent events have caused many companies to revisit their cyber resilience strategy – where cyber risk insurance is often seen as an essential element. Join us to gain a comprehensive insight into some of the recent major cyber-incidents, discoveries by researchers, the role insurers are playing in improving cybersecurity posture and their approach to managing risk. Understanding insurance requirements and how they change could provide valuable insight into risk reduction. We will also cover the increasing dangers of a monoculture cybersecurity ecosystem.
Sponsored by
Sponsor Networking Time
Keynote
The changing dynamics of a CISO role in the age of AI
Sponsor Networking Time
Presentation
What XDR Can't See: Detecting and Responding to Application and API Security Incidents
Sponsored by
Presentation
AI-Infused MXDR and the Autonomous SOC
MXDR helps organizations detect and respond to cyber-attacks before the attacker’s objective is completed. This presentation will cover:
- What is ‘getting left of bang’?
- Why is it so hard?
- How MXDR makes it easy
- Customer use cases • 2023: Findings from 35,000 Customer SitReps
How AI will drive the “Autonomous SOC” Our presentation will show how MXDR compresses mean-time-to-detect and mean-time-to-respond at the lowest possible cost, and how AI will soon collapse all three.
Sponsored by
Sponsor Networking Time
Presentation
“Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending
In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.
But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!
Sponsored by
Presentation
Shadow AI: Reducing Risk while Driving Innovation
Generative AI can be a catalyst for solving large complex social problems. As with any emerging technology, public sector organizations are grappling with how to harness those benefits while protecting the citizens they serve.
In the face of growing legislation around the development, use and consumption of AI technologies, organizations need to understand how these technologies expose risk to not only for themselves, but also their constituency.
The potential exposure of internal and citizen data to public insecure training data sets raises risk. These risks are forming the basis for emerging laws and regulations. “Shadow AI” must be addressed with a comprehensive approach to governance and control to allow the safe and responsible use of AI platforms.
This session will discuss the implications of Shadow AI and factors that organizations and institutions need to consider in this space. The session will also outline various mitigation strategies and relevant controls to address the threat allowing for the safe consumption of AI as an innovation accelerator.