Home / / Baltimore | Washington D.C.

Baltimore CyberSecurity Conference

Wednesday, March 30, 2022 ET

Live in Person @ The Westin BWI

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Securing APIs: Best Practices and Check Lists"

Nish Majmudar

Director Of Information Security Engineering FEPOC CareFirst BlueCross BlueShield

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Rohit Rajpara

CISO RIA Custody Division
Goldman Sachs

Bio

Nish Majmudar

Director Of Information Security Engineering FEPOC
CareFirst BlueCross BlueShield

Bio

John Opala, PhD

Vice President of IT Security
McCormick & Company

Bio

Jitendra Chandna

Chief Information Security Officer
Maryland Department of Human Services

Bio

Whitney Palacios

Director of Security Operations
SBPASC CareFirst Blue Cross Blue Shield.

Bio

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Networking

8:00 am – 9:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am – 9:30 am

Conducting forensic investigations in a zero-trust environment.

The Zero-Trust security approach is quickly becoming the standard for corporations

and agencies. Within the United State government agencies, and those doing business with government agencies have been mandated to adopt a zero-trust level of security by 2024. This presentation will cover what Zero-Trust is, how it may impact the legitimate security work being carried out by you, and how investigations may be carried out in a Zero-Trust environment.

Justin Tolman

Forensic Evangelist Exterro
Bio

Presentation

9:30 am – 10:00 am

Seize The Breach: Why breaches still occur and how to mitigate them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations

Tim Strack

Sr. Sales Engineer Exabeam
Bio

Networking

10:00 am – 10:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am – 11:00 am

Zero Trust for Applications

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Danny Jenkins

CEO ThreatLocker
Bio

Presentation

11:00 am – 11:30 am

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

 

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Christer Swartz

Principal Technical Engineer Illumio
Bio

Networking

11:30 am – 11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am – 12:00 pm

Lunch

Keynote

12:00 pm – 1:00 pm

"Securing APIs: Best Practices and Check Lists"

Nish Majmudar

Director Of Information Security Engineering FEPOC CareFirst BlueCross BlueShield
Bio

Networking

1:00 pm – 1:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

1:30 pm – 2:00 pm

Thank You VPN – But Times Have Changed

Remote workforces are now the norm rather than the exception.  And access to applications must be seamless and secure for employees, contractors, and partners.  VPNs were originally designed for a small number of trusted employees to access applications in an on-premises data center.  But times have changed – workers now need access to applications in the cloud and data center from their device of choice, regardless of their location.

Join Zentry Security for an informative session about Zero Trust Network Access.  You’ll learn

  • What’s driving the adoption of ZTNA
  • The top 10 selection criteria for a ZTNA solution
  • What are some of the limitations of traditional VPNs

Bryan Embrey

Director, Product Marketing Zentry Security
Bio

Presentation

2:00 pm – 2:30 pm

Optimizing the Human Element of Cybersecurity

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper look at:

  • How approaches to cyber defense are changing to keep pace with the ever-evolving threats of hackers

  • What motivates cyber professionals

  • How to make humans the strongest link in the cyber defense line

Jeff Orloff

Tech Evangelist and Vice President of Product RangeForce
Bio

Networking

2:30 pm – 2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm – 3:15 pm

Take Control of Email Security with Human Layer Security Protection

Email is every bit as crucial an environment to protect as the network and databases because, once compromised, there can be lasting, costly, and damaging effects. Leaning on built in security controls of email platforms or legacy technology are insufficient in providing comprehensive protection against human-related threats over email. Over 75% of firms report that 20% or more of email security incidents get past their existing security controls and they spend on average 600 hours a month in investigation and remediation. However, organizations that deploy Human Layer Security technology feel more prepared to face email security threats and data loss incidents (accidental, negligent, or malicious) with their current tool setup than those who don’t, demonstrating a higher level of maturity when it comes to their readiness to prevent these damaging threats. Human Layer Security is the missing link for today’s enterprise email security stacks. Forrester recommends that organizations consider human layer security to be used.

Ashley Bull

Solutions Engineer Tessian
Bio

Presentation

3:15 pm – 3:45 pm

The Boulevard of Broken Buckets

Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.

Tod Beardsley

Director of Research Rapid7
Bio

Bob Rudis

Chief Data Scientist Rapid7
Bio

Networking

3:45 pm – 4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm – 5:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Rohit Rajpara

CISO RIA Custody Division Goldman Sachs
Bio

Nish Majmudar

Director Of Information Security Engineering FEPOC CareFirst BlueCross BlueShield
Bio

John Opala, PhD

Vice President of IT Security McCormick & Company
Bio

Jitendra Chandna

Chief Information Security Officer Maryland Department of Human Services
Bio

Whitney Palacios

Director of Security Operations SBPASC CareFirst Blue Cross Blue Shield.
Bio

Closing Remarks

5:00 pm

Closing Remarks

Register

Share This