Atlanta Cybersecurity Conference

Wednesday, December 11, 2024

Atlanta Marriott Buckhead Hotel & Conference Center

Parking/Directions

Hybrid

Join Us in Atlanta for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Atlanta Marriott Buckhead Hotel & Conference Center

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

2024 Ransomware Impact, Protection, and Recovery

In 2024, ransomware attacks have evolved, presenting new challenges for IT security engineers and professionals. This presentation delves into the latest trends and developments in ransomware, exploring sophisticated attack vectors, the rise of double extortion tactics, and the increasing targeting of critical infrastructure and cloud environments. We will also discuss read more…

In 2024, ransomware attacks have evolved, presenting new challenges for IT security engineers and professionals. This presentation delves into the latest trends and developments in ransomware, exploring sophisticated attack vectors, the rise of double extortion tactics, and the increasing targeting of critical infrastructure and cloud environments. We will also discuss the importance of proactive threat hunting, incident response planning, and cross-industry collaboration to stay ahead of these ever-evolving threats.

Bio

Andrew Houchin

Senior Security Engineer Illumio

Sponsored by

Presentation

9:30 am

Securing Your Revenue Stream: Protecting Applications and APIs from Bot Threats

With automation changing the landscape, global cyber losses attributable to bot attacks now average between $68-$116B annually. We will examine data from the Imperva Threat Research team to investigate the scope of the challenge, review real-world examples and provide practical steps you can take to prepare for the inevitable security read more…

With automation changing the landscape, global cyber losses attributable to bot attacks now average between $68-$116B annually. We will examine data from the Imperva Threat Research team to investigate the scope of the challenge, review real-world examples and provide practical steps you can take to prepare for the inevitable security incident.

Bio

Chris Stensager

Solution Architect Imperva a Thales Company

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Ransomware: A Security Reference Architecture

We will dive into the increasing threat posed by ransomware and why it’s critical to address this challenge head-on. Myriad360 will explain the value of a Reference Architecture in building a strong defense against these attacks. They will also explore how ransomware tactics are continuously evolving, requiring organizations to stay read more…

We will dive into the increasing threat posed by ransomware and why it’s critical to address this challenge head-on. Myriad360 will explain the value of a Reference Architecture in building a strong defense against these attacks. They will also explore how ransomware tactics are continuously evolving, requiring organizations to stay agile in their security approach. Lastly, they touch on other key factors that should be considered when planning a comprehensive cybersecurity strategy to protect against ransomware and other threats.

Bio

Daniel Lakier  

Cybersecurity Field CISO Myriad360

Sponsored by

11:00 am

Extortion and Exfiltration: The New Age of Ransomware

Ransomware continues to be the number one cybersecurity threat globally. Its ever-evolving nature creates new strains, tactic changes and sophisticated attacks that cybersecurity professionals struggle to keep up with. One notable shift in the ransomware landscape has been the move from traditional encryption tactics to data exfiltration and extortion. In read more…
Ransomware continues to be the number one cybersecurity threat globally. Its ever-evolving nature creates new strains, tactic changes and sophisticated attacks that cybersecurity professionals struggle to keep up with. One notable shift in the ransomware landscape has been the move from traditional encryption tactics to data exfiltration and extortion. In 2024 93% of ransomware attacks involve data exfiltration, as ransomware groups focus on stealing sensitive data for the purpose of extortion.
 
Join this session to discover more about:
  • Ransomware trends and insights
  • The rise of exfiltration and extortion
  • The importance of integrating new technologies into cybersecurity stacks including anti data exfiltration technology
  • How to build comprehensive cybersecurity defenses
Bio

Doug Lubahn

VP of Customer Success BlackFog

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Challenges and Successes: Building an AI Governance Program

Bio

Tera Ladner

Global Practice Lead and Vice President, Information Risk Management and Governance Aflac
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Chris Dawson

Threat Intelligence Publications Lead Proofpoint

Sponsored by

Presentation

2:00 pm

The State of Application Security & Protecting against Automated threats

Bio

Than Oo

Solutions Engineer Manager Cloudflare

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

Presentation

3:10 pm

Sponsored by

3:40 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

Kenneth Foster

Cybersecurity, Architecture, and Compliance Expert
Bio

Tera Ladner

Global Practice Lead and Vice President, Information Risk Management and Governance Aflac
Bio

Luis Valenzuela

Director, Data Governance and Data Loss Prevention InComm Payments
Bio

Tamika Bass

Cybersecurity Director at Gannett Fleming CISA, Network Security
5:00 pm

Closing Remarks