Atlanta, GA
Wednesday, December 6, 2023
Hybrid
Keynote Speaker
“"Beyond Bits and Bytes: The Art of Cyber Adaptation"”
Rachael Marks
Officer, IAM Cybersecurity Engineer Ameris Bank
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
James Azar
Chief Information Security Officer | Host of The CyberHub Podcast, CISO Talk
Kenneth Foster
Cybersecurity, Architecture, and Compliance Expert
Taiye Lambo
First and Former CISO, City of Atlanta | Former Director, Cybersecurity Strategy, Federal Reserve Bank of Atlanta | Founder , Holistic Information Security Practitioner Institute (HISPI)
Joye Purser
Field CISO VERITAS
Richard Foltak
SVP, CISO, Head of Cloud Dito
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
DevSecOps Alchemy: Communications, Processes and Visibility
The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps.
Sponsored by
Presentation
Implications on Generative AI to Enterprise Security
Generative AI (GenAI) is a rapidly evolving field with the potential to revolutionize many aspects of our lives. However, as with any new technology, there are potential risks associated with GenAI, particularly in the realm of enterprise security. This presentation explores the implications of GenAI on enterprise security, highlighting both the potential benefits and risks when enabling this technology within an organization.
Sponsored by
Presentation
Today’s Threat Landscape Requires a Unique Capability
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Communicating Risk with Your Leadership Team
In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks.
Luckily, some frameworks and processes already exist to help guide you through that process. Kayne McGladrey, Field CISO, will walk you through the current state of risk and how to effectively and accurately communicate risk to your leadership team.
In this webinar, you’ll learn:
● What the 2023 risk landscape looks like
● How risk managers are planning on updating their risk workflows to adapt
● How to communicate risk to leadership
Sponsored by
Presentation
Protecting Data in a Distributed World
Change is the only constant.
Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices.
Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.
Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.
No man steps in the same river twice
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
"Beyond Bits and Bytes: The Art of Cyber Adaptation"
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Cloud Security Lessons Learned from Recent Cyber Attacks
After two decades of rapid cloud adoption by organizations, 2024 could be considered a turning point for cloud security. The popularity and complexity of cloud technology is expanding the attack surface with vulnerabilities and misconfigurations for cybercriminals to exploit. This session will provide examples of recent cloud attacks and provide a wide angle view of the status of common misalignments leaving the door open to malicious activity. This session will provide observations from our recently released Unit 42 Cloud Threat Report, Volume 7 that provides analysis of data collected over the past 12 months from Unit 42 Incident Response engagements in addition to analyzing cloud security at over 1,000 organizations, 210,000 cloud environments and over 70,000 code repositories. We will wrap up by providing details on how most attacks work and what organizations can do to protect themselves from cyberattacks.
Sponsored by
Presentation
Future of Security Testing
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Crossroads of AI & Application Security
The potential of Artificial Intelligence (AI) is vast, with many industries already harnessing the power of it. In Application Security, AI has made some significant improvements – including finding flaws faster, suggesting fixes, the ability to rewrite code and more likely to come. Although, as with any new technology, it brings its own risks – including incorrect code suggestions and more intelligent malware attacks. Join our session to discuss how to harness these tools to work for you while ensuring your organization stays secure.
Sponsored by
Presentation
Ransomware, the case for containment rather than prevention
Even the most well-protected organizations fall victim to ransomware – what do you do when this happens?
Most organizations have already invested and implemented strong layers of security but are still vulnerable to ransomware. Cybercriminals are constantly outsmarting even the most robust security solutions; evolving methods and behaviors make it impossible for traditional security vendors to prevent them. Endpoint protection is no longer enough. This session is essential if you wish to stay ahead of the ransomware threat. It will provide you with the following knowledge:
- What is ransomware containment and how will it change my approach to stopping attacks?
- How does a containment solution complement and enhance the investment I’ve already made in my security infrastructure?
- How will containment make ransomware attacks an inconvenience rather than a major security operation?
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!