Dallas | State of Texas (Western Region)

Wednesday, August 11, 2021

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Check In | Networking

Presentation

9:05 am

Simple tricks for effective endpoint security

-How IT Admin can resolve modern endpoint security challenges in the distributed workforce -Key considerations to ensure successful & secure endpoint management -Endpoint Security strategy beyond 2021

-How IT Admin can resolve modern endpoint security challenges in the distributed workforce

-Key considerations to ensure successful & secure endpoint management

-Endpoint Security strategy beyond 2021

Bio

Romanus Prabhu

Global Head of Technical Support, Endpoint Management, and Security ManageEngine

Sponsored by

Presentation

9:40 am

CIS Controls in the Real World

As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In read more…

As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8,  and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.

Bio

Ted Gruenloh

Chief Operating Officer Sentinel IPS

Sponsored by

Networking

10:05 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Death, Taxes, & Ransomware: Make the Inevitable, Avoidable

With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources read more…

With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources even keep up? Adding another tool to the defensive stack just isn’t enough. How do you know it will reliably stand up against an actual threat? In this session, I will speak to specific techniques in identifying ransomware threats at different layers of the defensive stack that will help reduce risk & impact. Finally, we leverage the Pentera platform to automate a holistic view, emulating actual attacks to measure the resilience of all our efforts.

Bio

Stephen Tutterow

Sales Engineer Pentera

Sponsored by

Presentation

11:05 am

A Boss’s Perspective: Edward Snowden and Defending Against Insider Threat

Edward Snowden was the quintessential insider threat that all organizations fear. In this presentation, you will hear the inside story of Snowden’s last few months at NSA, the search for him, and the impact of his actions from his then boss, Steven Bay.  From this presentation, you will take away read more…

Edward Snowden was the quintessential insider threat that all organizations fear. In this presentation, you will hear the inside story of Snowden’s last few months at NSA, the search for him, and the impact of his actions from his then boss, Steven Bay.  From this presentation, you will take away a better understanding of who insider threats are, lessons learned about detecting and protecting yourself from them, and a better understanding of the level of damage insiders can do.

Bio

Steven Bay

Cyber Fusion Center and Security Operations Practice Lead Kudelski Security

Sponsored by

11:35 am

Lunch

Presentation

12:00 pm

The Cyber Security Revolution in Healthcare

Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender

Sponsored by

Networking

12:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

1:00 pm

"Adopting the Nine CyberSecurity Habits to Combat Cyberattacks"

George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, read more…

George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.

Bio

George Finney

Chief Security Officer, Southern Methodist University Bestselling Author of Project Zero Trust and Well Aware

Networking

2:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

2:15 pm

Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic

The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before. In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new read more…

The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before.

In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius.

In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.”

He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations.

Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:

  • How security teams are transforming policy and infrastructure post-pandemic
  • Key strategies security teams are using as employees return to the office for the first time in over a year
  • Why security teams are prioritizing automating asset inventories in 2021
Bio

Nathan Burke

CMO Axonius

Sponsored by

Presentation

2:40 pm

Building a Response Strategy to Advanced Threats

Bio

Jeff Costlow

Deputy CISO ExtraHop

Sponsored by

Networking

3:10 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:30 pm

Happy Hour | Networking

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on: Current cybersecurity threats and practices Post-pandemic security

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Bio

Ted Gruenloh

Chief Operating Officer Sentinel IPS
Bio

David Belanger

Chief Security Officer Bestow
Bio

Jonathan Kimmitt

Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Bio

George Finney

Chief Security Officer, Southern Methodist University Bestselling Author of Project Zero Trust and Well Aware
Bio

Michael Anderson

Deputy CTO Dallas Independent School District
4:00 pm

Happy Hour | Networking | Prize Drawing

Share This