Boston, MA
Thursday, November 30, 2023
Hybrid
Keynote Speaker
“"Is Cyber Risk journeying to Business Risk? Is it really a question?"”
Jo (Adams) Bentley
Global Business Information Security Officer Liberty Mutual Insurance
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Aaron Birnbaum
Chief Information Security Officer Seron Security
Derek Morris
Virtual Chief Information Security Officer Wolf & Company, P.C.
Kathleen Moriarty
Chief Technology Officer Center for Internet Security
Ryan Davis
Chief Information Security Officer NS1 an IBM Company
Jason Mafera
Field CTO, North America IGEL Technology
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Say Goodbye to Malware by Securing the User Edge
In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to resources from new and interesting places. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all the endpoints across your organization, both inside and out.
In this presentation, learn how to create a strategy to bridge the gap between end-users and their workspaces, apps, and data, while providing a secure endpoint with no malware concerns, rapid recovery and a seamless user experience.
Sponsored by
Presentation
IBM Storage for Data Resiliency
Sponsored by
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Modernization and Your Data: A New Take on Security and Compliance
Today, organizations must maintain data-centric business operations, among other things in order to provide innovative digital services to their customers. This leads to the sprawl of your most critical data across various environments, making it exponentially more complex to proactively identify and manage risks of abuse and theft. This data security complexity also presents difficulty in adhering to various regulatory compliance and privacy laws across different regions.
Join us in this presentation to understand how to modernize your data protection strategy by applying intelligence to reveal abusive data queries across heterogeneous environments and secure your most critical data assets while reducing the overhead of meeting your regulatory requirements.
Sponsored by
Presentation
Threat Hunting and Modeling - AI/ML Powered Intelligence Threat Prevention
We’ll explore today’s sophisticated and multi-layered threat cyber attacks and how machine learning and artificial intelligence play a role in prevention. In addition this discussion will explore threat modeling and the MITRE ATT&CK framework and how these activities/tools support active threat hunting exercises.
Sponsored by
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
"Is Cyber Risk journeying to Business Risk? Is it really a question?"
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Identity and Access in 2024 | Threats and Security Plans
Sponsored by
Presentation
The Anatomy of a Cyber-attack
How clients can prevent cyber-attacks, by following industry best practices and applying security frame works.
Sponsored by
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Getting Ahead of Threats with DNS Based Threat Intelligence
If only we knew sooner. Nearly all attacks are eventually associated with DNS based infrastructure – yes simple IP addresses and Domains. Some threats are only detectable by analyzing DNS data. The speaker will discuss innovations and challenges with developing reliable predictive threat intel, using DNS. This talk will highlight new reputation scoring, suspicious classifications, and the tracking of DNS Threat Actors.
Sponsored by
Presentation
Why Security Teams are Urgently Chasing API Security
An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs.
- Why APIs have risen to the top of the hacker’s to-do list
- How hackers are attacking APIs & extracting data
- Top strategies to proactively secure APIs
Sponsored by
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!