Home / / Boston, MA

Boston CyberSecurity Conference

Wednesday, October 5, 2022 ET

Live in Person @ Courtyard Boston Downtown

Parking and Directions


In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker


"Transforming Information Security"

Kathleen Moriarty

Chief Technology Officer Center for Internet Security

Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.

Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Deidre Diamond

Founder and CEO CyberSN
Founder Secure Diversity


Derek Morris

Virtual Chief Information Security Officer
Wolf & Company, P.C.


Pete Gibson

Chief Information Officer / Chief Technology Officer
Friendlys Restaurant


Ryan Balise

Information Security Officer
Chorus Innovations


Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors



Times are subject to change

8:00 am – 9:00 am

Opening Introductions | Check In | Networking


9:00 am – 9:30 am

Top 5 Ransomware Myths: What the Evolution of Ransomware Means for Businesses

2021 was “the year of ransomware”. But so were 2017, 2018, 2019, and 2020 – and so far 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware – we keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Richard De La Torre, Technical Product Marketing Manager will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches

Richard De La Torre

Technical Product Manager Bitdefender


9:30 am – 10:00 am

How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Maxwell Skalski

AI Security Executive Darktrace


10:30 am – 11:00 am

Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected?

The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services. Email. Web-based apps. Cloud Storage. Messaging platforms. CRM. Digital Apps and Services. Organizations continue to add new cloud channels to support their business needs. But with new channels come new security blind spots that must be addressed.

In this session we’ll discuss:

  • The (yet) unsolved challenges of email security – the main channel of targeted attacks
  • Digitization and remote working have forged a new frontier, positioning the web browser at the front line of cyber attacks.
  • The rising threat of cloud collaboration and the growing risk of content-borne attacks
  • Cyber attack trends in the collaboration channel ecosystem

Zack St. George

Director Perception Point


11:00 am – 11:30 am

It Takes More than Automated Compliance to Get Ahead of Threats

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up.

Automation is a strong first step in reducing manual work and freeing up your team’s workload.  However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions.

The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work.

Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day.

Attend this webinar and learn how to:

  • Focus your planning efforts around your organization’s strategic business priorities
  • Be more proactive by automating evidence collection, risk scoring and monitoring
  • Gain actionable insights to help you clearly communicate with key stakeholders

Meghan Maneval

Director of Technical Product Management Reciprocity


11:45 am – 12:00 pm

Threat Disruption: Securing 2022 from 2021

Edward Nesmejanow

Solutions Engineer Malwarebytes


12:00 pm – 1:00 pm

"Transforming Information Security"

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed require transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirements that do not scale.  Service providers have an opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns is paramount.

Kathleen Moriarty

Chief Technology Officer Center for Internet Security


1:30 pm – 2:00 pm

Is Your Defensive Stack Ready For A Targeted Attack?

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.

Shaun Parmassar

Solutions Engineer Pentera


2:00 pm – 2:30 pm

How to stop Ransomware BEFORE it starts.

Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense.  Please join me as I share how ransomware has changed, how to see it before it starts, and what I predict ransomware will exploit next.

Kevin Kennedy

VP of Product Management Vectra


2:45 pm – 3:15 pm

Printers, Phones, and Cameras: A Story of Two Million Interrogated Devices

We have examined millions of IoT, OT and network devices in the Enterprise at Phosphorus Cybersecurity. This includes everything from desktop VoIP phones to BACnet devices such as power distribution and chillers, to cameras, thermostats, door lock controllers, fire control panels, and lots of printers. Phosphorus finds a 90% common corpus of vendors that have been deployed in the Enterprise, and almost all are uncompleted, unmanaged, and insecure. With our own data, we can positively confirm remarkable statistics of extended IoT in the enterprise; the state of xIoT security today is reminiscent of the 1990s. As we walk through a few million “Things,” we will examine key statistics, such as prevalence of CVEs, commonality of default credentials, the half-life of xIoT firmware, and what measures can be taken to stay ahead of the problem.

Thomas Ariano

Senior Software Engineer Phosphorus Cybersecurity


3:15 pm – 3:45 pm

Why SOCs Fail - The Maturity Model Required for Cyber Resilience

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Key Learnings:

Why an outcome-based approach is the only way to offer effective coverage and protection for your organization

How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale

Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated

Scott Gillis

Regional Director Enterprise East/Caribbean Exabeam

Panel Discussion

4:00 pm – 5:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Deidre Diamond

Founder and CEO CyberSN Founder Secure Diversity

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.

Pete Gibson

Chief Information Officer / Chief Technology Officer Friendlys Restaurant

Ryan Balise

Information Security Officer Chorus Innovations

Closing Remarks

5:00 pm – 5:15 pm

Closing Remarks


Share This