Boston, MA

Thursday, November 30, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Say Goodbye to Malware by Securing the User Edge

In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to resources from new and interesting places. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all the endpoints across your organization, both inside and out. In this presentation, read more…

In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to resources from new and interesting places. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all the endpoints across your organization, both inside and out.

In this presentation, learn how to create a strategy to bridge the gap between end-users and their workspaces, apps, and data, while providing a secure endpoint with no malware concerns, rapid recovery and a seamless user experience.

Bio

Jason Mafera

Field CTO, North America IGEL Technology

Sponsored by

Presentation

9:30 am

IBM Storage for Data Resiliency

Bio

John O’Connor

Senior IBM Storage Software Technical Specialist IBM

Sponsored by

Break

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Modernization and Your Data: A New Take on Security and Compliance

Today, organizations must maintain data-centric business operations, among other things in order to provide innovative digital services to their customers. This leads to the sprawl of your most critical data across various environments, making it exponentially more complex to proactively identify and manage risks of abuse and theft. This data read more…

Today, organizations must maintain data-centric business operations, among other things in order to provide innovative digital services to their customers. This leads to the sprawl of your most critical data across various environments, making it exponentially more complex to proactively identify and manage risks of abuse and theft. This data security complexity also presents difficulty in adhering to various regulatory compliance and privacy laws across different regions.

Join us in this presentation to understand how to modernize your data protection strategy by applying intelligence to reveal abusive data queries across heterogeneous environments and secure your most critical data assets while reducing the overhead of meeting your regulatory requirements.

Bio

Dana Tannatt

Sr. Engineer Imperva

Sponsored by

Presentation

11:00 am

Threat Hunting and Modeling - AI/ML Powered Intelligence Threat Prevention

We’ll explore today’s sophisticated and multi-layered threat cyber attacks and how machine learning and artificial intelligence play a role in prevention.  In addition this discussion will explore threat modeling and the MITRE ATT&CK framework and how these activities/tools support active threat hunting exercises.

We’ll explore today’s sophisticated and multi-layered threat cyber attacks and how machine learning and artificial intelligence play a role in prevention.  In addition this discussion will explore threat modeling and the MITRE ATT&CK framework and how these activities/tools support active threat hunting exercises.

Bio

Mark Ostrowski

Head of Engineering Check Point Software Technologies

Sponsored by

Break

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

"Is Cyber Risk journeying to Business Risk? Is it really a question?"

Bio

Jo (Adams) Bentley

Global Business Information Security Officer Liberty Mutual Insurance

Break

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Identity and Access in 2024 | Threats and Security Plans

Bio

Roy Akerman

Co-founder CEO Rezonate

Sponsored by

Presentation

2:00 pm

The Anatomy of a Cyber-attack

How clients can prevent cyber-attacks, by following industry best practices and applying security frame works.

How clients can prevent cyber-attacks, by following industry best practices and applying security frame works.

Bio

Larry Veino.

Chief Technology Officer Focus Technology Solutions

Sponsored by

Break

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Getting Ahead of Threats with DNS Based Threat Intelligence

If only we knew sooner. Nearly all attacks are eventually associated with DNS based infrastructure – yes simple IP addresses and Domains. Some threats are only detectable by analyzing DNS data. The speaker will discuss innovations and challenges with developing reliable predictive threat intel, using DNS. This talk will highlight read more…

If only we knew sooner. Nearly all attacks are eventually associated with DNS based infrastructure – yes simple IP addresses and Domains. Some threats are only detectable by analyzing DNS data. The speaker will discuss innovations and challenges with developing reliable predictive threat intel, using DNS. This talk will highlight new reputation scoring, suspicious classifications, and the tracking of DNS Threat Actors.

Bio

John Fahey

Cybersecurity Specialist Infoblox

Sponsored by

Presentation

3:15 pm

Why Security Teams are Urgently Chasing API Security

Cloud adoption and digital transformation have been driving amazing innovation in the past 20 years. With that, the most commonly overlooked attack surface is the growing number of APIs that subsequently come with the new cloud approach. Not only has Gartner confirmed APIs’ rising prevalence as the attack vector of choice for read more…
Cloud adoption and digital transformation have been driving amazing innovation in the past 20 years. With that, the most commonly overlooked attack surface is the growing number of APIs that subsequently come with the new cloud approach. Not only has Gartner confirmed APIs’ rising prevalence as the attack vector of choice for bad actors, but Data Theorem has also been observing this rise in the last 5 years.

An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs. 

  • Why APIs have risen to the top of the hacker’s to-do list
  • How hackers are attacking APIs & extracting data
  • Top strategies to proactively secure APIs
Bio

Jackie Zhou

GTM Field Lead Data Theorem, Inc.

Sponsored by

Break

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Aaron Birnbaum

Chief Information Security Officer Seron Security
Bio

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.
Bio

Kathleen Moriarty

Chief Technology Officer Center for Internet Security
Bio

Ryan Davis

Chief Information Security Officer NS1 an IBM Company
Bio

Jason Mafera

Field CTO, North America IGEL Technology

Closing Remarks

5:00 pm

Closing Remarks

Share This