Atlanta, GA

Wednesday, December 6, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

DevSecOps Alchemy: Communications, Processes and Visibility

The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were read more…

The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus  good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps.

Bio

Chris Rodgers

Solutions Architect Seemplicity

Sponsored by

Presentation

9:15 am

Implications on Generative AI to Enterprise Security

Generative AI (GenAI) is a rapidly evolving field with the potential to revolutionize many aspects of our lives. However, as with any new technology, there are potential risks associated with GenAI, particularly in the realm of enterprise security. This presentation explores the implications of GenAI on enterprise security, highlighting both read more…

Generative AI (GenAI) is a rapidly evolving field with the potential to revolutionize many aspects of our lives. However, as with any new technology, there are potential risks associated with GenAI, particularly in the realm of enterprise security. This presentation explores the implications of GenAI on enterprise security, highlighting both the potential benefits and risks when enabling this technology within an organization.

Bio

Richard Foltak

SVP, CISO, Head of Cloud Dito

Sponsored by

Presentation

9:45 am

Today’s Threat Landscape Requires a Unique Capability

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Bio

Shawn Taylor

Vice President, Threat Defense ForeScout Technologies

Sponsored by

Networking

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

Communicating Risk with Your Leadership Team

In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks. Luckily, some frameworks and read more…

In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks.
Luckily, some frameworks and processes already exist to help guide you through that process. Kayne McGladrey, Field CISO, will walk you through the current state of risk and how to effectively and accurately communicate risk to your leadership team.
In this webinar, you’ll learn:
● What the 2023 risk landscape looks like
● How risk managers are planning on updating their risk workflows to adapt
● How to communicate risk to leadership

Bio

Kayne McGladrey

Field CISO Hyperproof

Sponsored by

Presentation

11:15 am

Protecting Data in a Distributed World

Change is the only constant. Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices. Today that model has changed dramatically; both company confidential and customer read more…

Change is the only constant.

Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices.

Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.

Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.

No man steps in the same river twice

Bio

Ken Roberts

Senior Sales Engineer Next DLP

Sponsored by

Networking

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

"Beyond Bits and Bytes: The Art of Cyber Adaptation"

Bio

Rachael Marks

Officer, IAM Cybersecurity Engineer Ameris Bank

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Cloud Security Lessons Learned from Recent Cyber Attacks

After two decades of rapid cloud adoption by organizations, 2024 could be considered a turning point for cloud security.   The popularity and complexity of cloud technology is expanding the attack surface with vulnerabilities and misconfigurations for cybercriminals to exploit. This session will provide examples of recent cloud attacks and provide a wide angle view of the status of read more…

After two decades of rapid cloud adoption by organizations, 2024 could be considered a turning point for cloud security.   The popularity and complexity of cloud technology is expanding the attack surface with vulnerabilities and misconfigurations for cybercriminals to exploit. This session will provide examples of recent cloud attacks and provide a wide angle view of the status of common misalignments leaving the door open to malicious activity.  This session will provide observations from our  recently released Unit 42 Cloud Threat Report, Volume 7 that provides analysis of data collected over the past 12 months from Unit 42 Incident Response engagements in addition to analyzing  cloud security at over 1,000 organizations, 210,000 cloud environments and over 70,000 code repositories.   We will wrap up by providing details on how most attacks work and what organizations can do to protect themselves from cyberattacks.

Bio

Kevin Flanagan

Senior Director, Cloud Engagement Palo Alto Networks

Sponsored by

Presentation

2:15 pm

Future of Security Testing

Bio

Casey Cammilleri

Founder and CEO Sprocket Security

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

The Crossroads of AI & Application Security

The potential of Artificial Intelligence (AI) is vast, with many industries already harnessing the power of it. In Application Security, AI has made some significant improvements – including finding flaws faster, suggesting fixes, the ability to rewrite code and more likely to come. Although, as with any new technology, it read more…

The potential of Artificial Intelligence (AI) is vast, with many industries already harnessing the power of it. In Application Security, AI has made some significant improvements – including finding flaws faster, suggesting fixes, the ability to rewrite code and more likely to come. Although, as with any new technology, it brings its own risks – including incorrect code suggestions and more intelligent malware attacks. Join our session to discuss how to harness these tools to work for you while ensuring your organization stays secure.

Bio

Jay Mithani

Sr. Solution Architect Veracode

Sponsored by

Presentation

3:30 pm

Ransomware, the case for containment rather than prevention

Even the most well-protected organizations fall victim to ransomware – what do you do when this happens? Most organizations have already invested and implemented strong layers of security but are still vulnerable to ransomware. Cybercriminals are constantly outsmarting even the most robust security solutions; evolving methods and behaviors make it read more…

Even the most well-protected organizations fall victim to ransomware – what do you do when this happens?

Most organizations have already invested and implemented strong layers of security but are still vulnerable to ransomware. Cybercriminals are constantly outsmarting even the most robust security solutions; evolving methods and behaviors make it impossible for traditional security vendors to prevent them. Endpoint protection is no longer enough. This session is essential if you wish to stay ahead of the ransomware threat. It will provide you with the following knowledge:

  • What is ransomware containment and how will it change my approach to stopping attacks?
  • How does a containment solution complement and enhance the investment I’ve already made in my security infrastructure?
  • How will containment make ransomware attacks an inconvenience rather than a major security operation?
Bio

Steve Hahn

Executive Vice President of Americas Sales BullWall

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

James Azar

Chief Information Security Officer | Host of The CyberHub Podcast, CISO Talk
Bio

Kenneth Foster

Cybersecurity, Architecture, and Compliance Expert
Bio

Taiye Lambo

First and Former CISO, City of Atlanta | Former Director, Cybersecurity Strategy, Federal Reserve Bank of Atlanta | Founder , Holistic Information Security Practitioner Institute (HISPI)
Bio

Joye Purser

Field CISO VERITAS
Bio

Richard Foltak

SVP, CISO, Head of Cloud Dito

Closing Remarks

5:15 pm

Closing Remarks