Baltimore, MD

Thursday, March 14, 2024

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

AI for Security

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
Bio

Gregg Earnhart

Sr. Cyber Security Sales Engineer Next DLP

Sponsored by

Presentation

9:15 am

Weaponizing DNS to Defend the Enterprise

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats.  Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats.  Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Bio

Colby Hoefer

Cybersecurity Specialist Infoblox

Sponsored by

Presentation

9:45 am

Ransomware Resilience: Backup Alone is No Longer Enough

2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup. In this session, we’ll explore multi-faceted strategies for read more…

2 out of every 3 organizations globally fell victim to ransomware in 2023. In a landscape dominated by cyberthreats, fortifying your defenses is imperative. As attacks become more sophisticated and targeted, adopting a comprehensive approach to cyber resilience extends beyond data backup.

In this session, we’ll explore multi-faceted strategies for delivering resilience and share learnings from real-world attacks to identify opportunities to enhance your organizations’ cybersecurity posture. Delving in the realms of cyber resilience, business continuity and incident response, you’ll gain insights into the latest trends in attacks, emerging threat vectors, the double-edge sword of artificial intelligence (AI) and best practices for hardening your defenses.

Bio

Adam Marget

Product Marketing Manager Kaseya

Sponsored by

Networking

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

Email Security: Dangers & Solutions

Bio

David Ferg

Senior Consultant System Source
Bio

Scott Raba

Solutions Architect Barracuda

Sponsored by

Presentation

11:15 am

The Executive Guide to Red Team Testing

Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively. read more…

Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively.

We will begin by clarifying the meaning of red teaming and outlining what it involves and doesn’t. We will delve into the various components that make up red teaming, encompassing activities such as penetration testing, physical security testing, and adversarial simulations, and analyze the circumstances in which each is most suitable. Also, we will underscore the importance of setting up defined goals, properly scoping the project, and choosing the best team members.

Last but not least, we will tackle the cultural and organizational factors that can influence the outcome of red teaming. We will focus on fostering a culture of ongoing enhancement and employing red teaming to stimulate innovation and strategic planning. Furthermore, we will emphasize the significance of creating an environment of confidence and openness with relevant parties while ensuring seamless integration of red teaming into broader risk management applications.

Bio

Andrew Hay

Chief Operating Officer Lares

Sponsored by

Networking

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm

"The Cybersecurity Pi: Protect, Prevent and Predict"

Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

“Threat intelligence” has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Chris Dawson, Threat Intel Lead at Proofpoint, to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Chris Dawson

Threat Intelligence Publications Lead Proofpoint

Sponsored by

Presentation

2:15 pm

Why is Critical data being compromised?

Bio

Asif Amjad

Senior Solutions Architect Thales

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

You will be breached. Contain the inevitable breach which was not detected.

No Security Prevention architecture will ever be 100% effective. Eventually, even the best-planned barrier will be breached, either from the outside or internally. An “assume breach” Security mindset needs to exist in parallel with efforts to prevent one, and the architecture needs to be able to address breaches which were read more…

No Security Prevention architecture will ever be 100% effective. Eventually, even the best-planned barrier will be breached, either from the outside or internally. An “assume breach” Security mindset needs to exist in parallel with efforts to prevent one, and the architecture needs to be able to address breaches which were not detected, and to contain them. Zero Trust needs to plan for the unexpected.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

3:30 pm

Future-proofing cloud security with CNAPP: A new operating model

A successful cloud security strategy needs to evolve to meet the rapidly changing needs of the business and the growth of the cloud. Cutting-edge security teams are developing new approaches to increasing their company’s adoption of cloud and AI app development while managing the growth in potential attack surfaces. In read more…

A successful cloud security strategy needs to evolve to meet the rapidly changing needs of the business and the growth of the cloud. Cutting-edge security teams are developing new approaches to increasing their company’s adoption of cloud and AI app development while managing the growth in potential attack surfaces. In this session, learn how you can improve your cloud security operational efficiency by 10 times while consolidating multiple siloed technologies using a cloud-native application protection platform (CNAPP).

Bio

Shashank Golla

Product Marketing Wiz

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica
Bio

Cindy Tu

Director of IT & Data Audit Discover Financial Services
Bio

Bezawit Sumner

Chief Information Security Officer CRISP - Chesapeake Regional Information System for our Patients
Bio

Pat Benoit

Global Chief Information Security Officer Brink’s Inc
Bio

Serena Bryson

Information Security Program Manager CRISP Shared Services

Closing Remarks

5:15 pm

Closing Remarks