About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.
Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Premier Platinum Sponsors
Times are subject to change
Opening Introductions | Check In | Networking
Top 5 Ransomware Myths: What the Evolution of Ransomware Means for Businesses
2021 was “the year of ransomware”. But so were 2017, 2018, 2019, and 2020 – and so far 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.
So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware – we keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.
Richard De La Torre, Technical Product Marketing Manager will help you to learn more about:
- Ransomware evolution and what we need to un-learn to effectively combat it
- The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
- The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
How AI Can Think Like an Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected?
In this session we’ll discuss:
- The (yet) unsolved challenges of email security – the main channel of targeted attacks
- Digitization and remote working have forged a new frontier, positioning the web browser at the front line of cyber attacks.
- The rising threat of cloud collaboration and the growing risk of content-borne attacks
- Cyber attack trends in the collaboration channel ecosystem
See Risk Differently! Surface Unseen Risk to Get Ahead of Threats!
Threat Disruption: Securing 2022 from 2021
"Transforming Information Security"
In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed require transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirements that do not scale. Service providers have an opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns is paramount.
Is Your Defensive Stack Ready For A Targeted Attack?
How to stop Ransomware BEFORE it starts.
Printers, Phones, and Cameras: A Story of Two Million Interrogated Devices
Why SOCs Fail - The Maturity Model Required for Cyber Resilience
Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated