Houston Cybersecurity Conference
Wednesday, December 4, 2024
DoubleTree by Hilton Hotel Houston - Greenway Plaza
Hybrid
Join Us in Houston for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Anil Varghese
Chief Information Security Officer Francisco Partners
Anna (Eleni) Drier
Vice President, South Texas ISSA Director, InfraGard Houston
Paul Yoder
Associate Vice Chancellor Information Security - CISO Lone Star College
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Neal Quinn
Head of Cloud Security Services Radware
Sponsors
Premier Platinum Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
DoubleTree by Hilton Hotel Houston - Greenway Plaza
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The New Digital Cold War
The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information stealing, and social engineering attacks have become more prevalent. Governments and organizations worldwide are heightening their defenses, while some nations are exploring the contentious domain of offensive cyber forces.
The surge in cyberattacks in 2022 can be linked to geopolitical tensions, escalating patriotic hacktivist operations, increased state-sponsored cyber espionage activities, and the global shift to digitalization. However, a new threat landscape emerged in 2023 – religiously and politically motivated hacktivist groups disrupted organizations around the globe through a surge in Distributed Denial of Service (DDoS) attacks. As their influence expands, it poses a potential threat of being co-opted as a proxy for state-controlled cyber activities.
This presentation delves into the shifting cyber threat landscape, the rise of hacktivism, and its implications on global cybersecurity strategies. It further investigates the likelihood of nation-states exploiting hacktivism as a cyber weapon and the possible onset of a new digital cold war.
Sponsored by
Presentation
Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense
The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.
Sponsored by
Preventing Scams, Fraud, Theft, and International Espionage with Identity Proofing
What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of proofing at the right moments. Chris Barngrover, Identity & Access Management Expert from Novacoast, provides identity proofing best practices for 3 critical uses cases: new hires, customer calls, internal calls.
Sponsored by
Sponsor Networking Time
Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
Your Guide to AI in Cyber Security
Sponsor Networking Time
Lunch
Keynote
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Sponsor Networking Time
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.