Baltimore, MD
Thursday, March 14, 2024
Hybrid
Keynote Speaker
“"The Cybersecurity Pi: Protect, Prevent and Predict"”
Nish Majmudar
VP & Chief Information Security Officer Mathematica
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Nish Majmudar
VP & Chief Information Security Officer Mathematica
Cindy Tu
Director of IT & Data Audit Discover Financial Services
Bezawit Sumner
Chief Information Security Officer CRISP - Chesapeake Regional Information System for our Patients
Pat Benoit
Global Chief Information Security Officer Brink’s Inc
Serena Bryson
Information Security Program Manager CRISP Shared Services
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
AI for Security
Sponsored by
Presentation
Weaponizing DNS to Defend the Enterprise
Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats. Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.
Sponsored by
Presentation
Ransomware Resilience: Backup Alone is No Longer Enough
2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup.
In this session, we’ll explore multi-faceted strategies for delivering resilience and share learnings from real-world attacks to identify opportunities to enhance your organizations’ cybersecurity posture. Delving in the realms of cyber resilience, business continuity and incident response, you’ll gain insights into the latest trends in attacks, emerging threat vectors, the double-edge sword of artificial intelligence (AI) and best practices for hardening your defenses.
Sponsored by
Networking
Sponsor Networking Time
Presentation
Email Security: Dangers & Solutions
Sponsored by
Presentation
The Executive Guide to Red Team Testing
Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively.
We will begin by clarifying the meaning of red teaming and outlining what it involves and doesn’t. We will delve into the various components that make up red teaming, encompassing activities such as penetration testing, physical security testing, and adversarial simulations, and analyze the circumstances in which each is most suitable. Also, we will underscore the importance of setting up defined goals, properly scoping the project, and choosing the best team members.
Last but not least, we will tackle the cultural and organizational factors that can influence the outcome of red teaming. We will focus on fostering a culture of ongoing enhancement and employing red teaming to stimulate innovation and strategic planning. Furthermore, we will emphasize the significance of creating an environment of confidence and openness with relevant parties while ensuring seamless integration of red teaming into broader risk management applications.
Sponsored by
Networking
Sponsor Networking Time
Lunch
Keynote
"The Cybersecurity Pi: Protect, Prevent and Predict"
Networking
Sponsor Networking Time
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Chris Dawson, Threat Intel Lead at Proofpoint, to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Presentation
Why is Critical data being compromised?
Sponsored by
Networking
Sponsor Networking Time
Presentation
You will be breached. Contain the inevitable breach which was not detected.
No Security Prevention architecture will ever be 100% effective. Eventually, even the best-planned barrier will be breached, either from the outside or internally. An “assume breach” Security mindset needs to exist in parallel with efforts to prevent one, and the architecture needs to be able to address breaches which were not detected, and to contain them. Zero Trust needs to plan for the unexpected.
Sponsored by
Presentation
Future-proofing cloud security with CNAPP: A new operating model
A successful cloud security strategy needs to evolve to meet the rapidly changing needs of the business and the growth of the cloud. Cutting-edge security teams are developing new approaches to increasing their company’s adoption of cloud and AI app development while managing the growth in potential attack surfaces. In this session, learn how you can improve your cloud security operational efficiency by 10 times while consolidating multiple siloed technologies using a cloud-native application protection platform (CNAPP).