Houston Cybersecurity Conference

Wednesday, December 4, 2024

DoubleTree by Hilton Hotel Houston - Greenway Plaza

Parking/Directions

Hybrid

Join Us in Houston for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

DoubleTree by Hilton Hotel Houston - Greenway Plaza

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

The New Digital Cold War

The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information read more…

The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information stealing, and social engineering attacks have become more prevalent. Governments and organizations worldwide are heightening their defenses, while some nations are exploring the contentious domain of offensive cyber forces.

The surge in cyberattacks in 2022 can be linked to geopolitical tensions, escalating patriotic hacktivist operations, increased state-sponsored cyber espionage activities, and the global shift to digitalization. However, a new threat landscape emerged in 2023 – religiously and politically motivated hacktivist groups disrupted organizations around the globe through a surge in Distributed Denial of Service (DDoS) attacks. As their influence expands, it poses a potential threat of being co-opted as a proxy for state-controlled cyber activities.

This presentation delves into the shifting cyber threat landscape, the rise of hacktivism, and its implications on global cybersecurity strategies. It further investigates the likelihood of nation-states exploiting hacktivism as a cyber weapon and the possible onset of a new digital cold war.

Bio

Neal Quinn

Head of Cloud Security Services Radware

Sponsored by

Presentation

9:15 am

Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into read more…

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

Bio

David Hagen

Cybersecurity Evangelist TPx

Sponsored by

9:45 am

Preventing Scams, Fraud, Theft, and International Espionage with Identity Proofing

What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of read more…

What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of proofing at the right moments. Chris Barngrover, Identity & Access Management Expert from Novacoast,  provides identity proofing best practices for 3 critical uses cases: new hires, customer calls, internal calls.

Bio

Chris Barngrover

Director Identity Services Novacoast

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

11:15 am

Your Guide to AI in Cyber Security

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm
Bio

Ivelisse Torres

Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Sponsored by

2:15 pm

The Human Element of Cyber Security

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
3:00 pm

Modern Data Protection

3:30 pm

Current Security Operations

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Anil Varghese

Chief Information Security Officer Francisco Partners
Bio

Anna (Eleni) Drier

Vice President, South Texas ISSA Director, InfraGard Houston
Bio

Paul Yoder

Associate Vice Chancellor Information Security - CISO Lone Star College
Bio

Ivelisse Torres

Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Bio

Neal Quinn

Head of Cloud Security Services Radware
5:00 pm

Closing Remarks