Dallas | State of Texas (Western Region)
Wednesday, August 11, 2021
Hybrid
Keynote Speaker
“"Adopting the Nine CyberSecurity Habits to Combat Cyberattacks"”
George Finney
Chief Security Officer, Southern Methodist University Bestselling Author of Project Zero Trust and Well Aware
Book Signing Available In Person
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Ted Gruenloh
Chief Operating Officer Sentinel IPS
David Belanger
Chief Security Officer Bestow
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
George Finney
Chief Security Officer, Southern Methodist University Bestselling Author of Project Zero Trust and Well Aware
Michael Anderson
Deputy CTO Dallas Independent School District
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Check In | Networking
Presentation
Simple tricks for effective endpoint security
-How IT Admin can resolve modern endpoint security challenges in the distributed workforce
-Key considerations to ensure successful & secure endpoint management
-Endpoint Security strategy beyond 2021
Sponsored by
Presentation
CIS Controls in the Real World
As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Death, Taxes, & Ransomware: Make the Inevitable, Avoidable
With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources even keep up? Adding another tool to the defensive stack just isn’t enough. How do you know it will reliably stand up against an actual threat? In this session, I will speak to specific techniques in identifying ransomware threats at different layers of the defensive stack that will help reduce risk & impact. Finally, we leverage the Pentera platform to automate a holistic view, emulating actual attacks to measure the resilience of all our efforts.
Sponsored by
Presentation
A Boss’s Perspective: Edward Snowden and Defending Against Insider Threat
Edward Snowden was the quintessential insider threat that all organizations fear. In this presentation, you will hear the inside story of Snowden’s last few months at NSA, the search for him, and the impact of his actions from his then boss, Steven Bay. From this presentation, you will take away a better understanding of who insider threats are, lessons learned about detecting and protecting yourself from them, and a better understanding of the level of damage insiders can do.
Sponsored by
Lunch
Presentation
The Cyber Security Revolution in Healthcare
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Live Keynote
"Adopting the Nine CyberSecurity Habits to Combat Cyberattacks"
George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
George Finney
Chief Security Officer, Southern Methodist University Bestselling Author of Project Zero Trust and Well Aware
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic
The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before.
In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius.
In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.”
He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations.
Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:
- How security teams are transforming policy and infrastructure post-pandemic
- Key strategies security teams are using as employees return to the office for the first time in over a year
- Why security teams are prioritizing automating asset inventories in 2021
Sponsored by
Presentation
Building a Response Strategy to Advanced Threats
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Happy Hour | Networking
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Hear from cybersecurity leaders and experts on:
- Current cybersecurity threats and practices
- Post-pandemic security