Atlanta, GA
Thursday, December 8, 2022
Hybrid
Keynote Speaker
““Sooner or later, everything old is new, again.””
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Laureen Smith
Executive - Cybersecurity Advisory LJ Marketing & Communications
Dean Mallis
AGM of Information Security/CISO Information Security MARTA (Metropolitan Atlanta Rapid Transit Authority)
Wolf J Halton
Assistant Vice President U.S. Bank
Kenneth Viciana
VP, Global Data & Analytics / Governance / Risk Management / Security TSYS | Global Payments
Phyllis Woodruff
Vice President, IT Risk and Compliance Global Payments Inc.
Kenneth Foster
Cybersecurity, Architecture, and Compliance Expert
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Automating the Cybersecurity Compliance Headache
Cybersecurity and compliance are converging within the enterprise and bootstrapped security teams are facing increasing pressure to prioritize compliance over security. It’s a showdown. Mandates to implement NIST, PCI, HIPAA, SOC 2, CMMC, and dozens of other frameworks are creating friction over priorities, budget, and resources. Teams of all sizes are using technology and automation to quickly solve the compliance headache seamlessly with security.
In this lively and entertaining session, you’ll learn:
- Why compliance continues to influence (and burden) security priorities
- Real-time data on the top frameworks that enterprises are implementing today and why
- How new technology breakthroughs are bridging compliance and security gaps
Sponsored by
Presentation
Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices
Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about.
Working globally with Fortune 500 enterprises and government agencies for the past six years, we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow.
Sponsored by
Presentation
Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected?
The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services. Email. Web-based apps. Cloud Storage. Messaging platforms. CRM. Digital Apps and Services. Organizations continue to add new cloud channels to support their business needs. But with new channels come new security blind spots that must be addressed.
In this session we’ll discuss:
- The (yet) unsolved challenges of email security – the main channel of targeted attacks
- Digitization and remote working have forged a new frontier, positioning the web browser at the front line of cyber attacks.
- The rising threat of cloud collaboration and the growing risk of content-borne attacks
- Cyber attack trends in the collaboration channel ecosystem
…And we will walk three use cases, their challenges and their deployments.
Sponsored by
Presentation
Business Logic Attack Definition (BLADE) framework
Sponsored by
Keynote
“Sooner or later, everything old is new, again.”
Presentation
Ransomware: Defend what you can and Mitigate the rest
Overview:
- Prevalence and effectiveness of Ransomware
- Anatomy of Ransomware
- Five defense techniques – showing pros and cons for each
- The advice cyber defender is receiving
Sponsored by
Presentation
How AI Can Think Like an Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Sponsored by
Presentation
Analyzing Data Sources for Maximum Visibility
Sponsored by
See risk differently! Surface unseen risk to get ahead of threats!
Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments. And they’re usually a few steps ahead of you.
How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams? You need to see risk differently by taking a different approach!
Join this session and learn how to:
- Gain insight into your risk posture and how risk impacts your business priorities
- Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities
- Use intelligence and automation to deliver quick wins while freeing up your team’s’ time