Home / / Boston, MA

Boston CyberSecurity Conference

Wednesday, October 5, 2022 ET

Live in Person @ Courtyard Boston Downtown

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Transforming Information Security"

Kathleen Moriarty

Chief Technology Officer Center for Internet Security

Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.

Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Deidre Diamond

Founder and CEO CyberSN
Founder Secure Diversity

Bio

Derek Morris

Virtual Chief Information Security Officer
Wolf & Company, P.C.

Bio

Pete Gibson

Chief Information Officer / Chief Technology Officer
Friendlys Restaurant

Bio

Ryan Balise

Information Security Officer
Chorus Innovations

Bio

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Presentation

How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Maxwell Skalski

AI Security Executive Darktrace
Bio

Presentation

It Takes More than Automated Compliance to Get Ahead of Threats

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up.

Automation is a strong first step in reducing manual work and freeing up your team’s workload.  However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions.

The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work.

Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day.

Attend this webinar and learn how to:

  • Focus your planning efforts around your organization’s strategic business priorities
  • Be more proactive by automating evidence collection, risk scoring and monitoring
  • Gain actionable insights to help you clearly communicate with key stakeholders

Meghan Maneval

Director of Technical Product Management Reciprocity
Bio

Panel Discussion

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Deidre Diamond

Founder and CEO CyberSN Founder Secure Diversity
Bio

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.
Bio

Pete Gibson

Chief Information Officer / Chief Technology Officer Friendlys Restaurant
Bio

Ryan Balise

Information Security Officer Chorus Innovations
Bio

Presentation

Top 5 Ransomware Myths: What the Evolution of Ransomware Means for Businesses

2021 was “the year of ransomware”. But so were 2017, 2018, 2019, and 2020 – and so far 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware – we keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Richard De La Torre, Technical Product Marketing Manager will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches

Richard De La Torre

Technical Product Manager Bitdefender
Bio

Presentation

Automated Security Validation

Presentation

A Prevention-as-a-Service company, offering fast interception of any content-based attack across all channels

Presentation

Vectra® is a leader in threat detection and response – from cloud and data center workloads to user and IoT devices.

Presentation

Threat Disruption: Securing 2022 from 2021

Edward Nesmejanow

Solutions Engineer Malwarebytes
Bio

Presentation

Printers, Phones, and Cameras: A Story of Two Million Interrogated Devices

We have examined millions of IoT, OT and network devices in the Enterprise at Phosphorus Cybersecurity. This includes everything from desktop VoIP phones to BACnet devices such as power distribution and chillers, to cameras, thermostats, door lock controllers, fire control panels, and lots of printers. Phosphorus finds a 90% common corpus of vendors that have been deployed in the Enterprise, and almost all are uncompleted, unmanaged, and insecure. With our own data, we can positively confirm remarkable statistics of extended IoT in the enterprise; the state of xIoT security today is reminiscent of the 1990s. As we walk through a few million “Things,” we will examine key statistics, such as prevalence of CVEs, commonality of default credentials, the half-life of xIoT firmware, and what measures can be taken to stay ahead of the problem.

Thomas Ariano

Senior Software Engineer Phosphorus Cybersecurity
Bio

Presentation

Why SOCs Fail - The Maturity Model Required for Cyber Resilience

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Key Learnings:

Why an outcome-based approach is the only way to offer effective coverage and protection for your organization

How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale

Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated

Scott Gillis

Regional Director Enterprise East/Caribbean Exabeam
Bio

Keynote

"Transforming Information Security"

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed require transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirements that do not scale.  Service providers have an opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns is paramount.

Kathleen Moriarty

Chief Technology Officer Center for Internet Security
Bio

Register

Share This