Home / / Boston, MA

Boston Cybersecurity Conference

Thursday, November 30, 2023

Live In Person @ Boston Marriott Burlington

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Is Cyber Risk journeying to Business Risk? Is it really a question?"

Jo (Adams) Bentley

Global Business Information Security Officer Liberty Mutual Insurance

Jo is Global Business Information Security Officer of Global Risk Solutions market. She is responsible for the Global Risk Solutions (GRS) Global Cybersecurity Program ensuring that customer and business assets are protected throughout the business value chain.

Jo has been at Liberty Mutual 3 years. She is a passionate Cybersecurity professional; interested in Cybersecurity as an enabler, foundational good practice and resilience.  She has held multiple positions in Information Security, IT, and Project Management across multiple industries -Telecommunication, Hospitality, Financial Services and Banking implementing speed to market products and services or designing and leading regulated Cybersecurity Programs as a CISO..

Jo holds a Master of Business Administration (MBA) from Boston University; Master’s degree in Information Systems and Technology (MSc) from City University in London. Jo also holds professional certifications:  PMP, CISSP and CISM

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Aaron Birnbaum

Chief Information Security Officer
Seron Security

Bio

Derek Morris

Virtual Chief Information Security Officer
Wolf & Company, P.C.

Bio

Kathleen Moriarty

Chief Technology Officer
Center for Internet Security

Bio

Ryan Davis

Chief Information Security Officer
NS1 an IBM Company

Bio

Jason Mafera

Field CTO, North America
IGEL Technology

Bio

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Say Goodbye to Malware by Securing the User Edge

In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to resources from new and interesting places. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all the endpoints across your organization, both inside and out.

In this presentation, learn how to create a strategy to bridge the gap between end-users and their workspaces, apps, and data, while providing a secure endpoint with no malware concerns, rapid recovery and a seamless user experience.

Jason Mafera

Field CTO, North America IGEL Technology
Bio

Presentation

9:30 am

IBM Storage for Data Resiliency

John O’Connor

Senior IBM Storage Software Technical Specialist IBM
Bio

Break

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Modernization and Your Data: A New Take on Security and Compliance

Today, organizations must maintain data-centric business operations, among other things in order to provide innovative digital services to their customers. This leads to the sprawl of your most critical data across various environments, making it exponentially more complex to proactively identify and manage risks of abuse and theft. This data security complexity also presents difficulty in adhering to various regulatory compliance and privacy laws across different regions.

Join us in this presentation to understand how to modernize your data protection strategy by applying intelligence to reveal abusive data queries across heterogeneous environments and secure your most critical data assets while reducing the overhead of meeting your regulatory requirements.

Dana Tannatt

Sr. Engineer Imperva
Bio

Presentation

11:00 am

Threat Hunting and Modeling - AI/ML Powered Intelligence Threat Prevention

We’ll explore today’s sophisticated and multi-layered threat cyber attacks and how machine learning and artificial intelligence play a role in prevention.  In addition this discussion will explore threat modeling and the MITRE ATT&CK framework and how these activities/tools support active threat hunting exercises.

Mark Ostrowski

Head of Engineering Check Point Software Technologies
Bio

Break

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

"Is Cyber Risk journeying to Business Risk? Is it really a question?"

Jo (Adams) Bentley

Global Business Information Security Officer Liberty Mutual Insurance
Bio

Break

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Identity and Access in 2024 | Threats and Security Plans

Roy Akerman

Co-founder CEO Rezonate
Bio

Presentation

2:00 pm

The Anatomy of a Cyber-attack

How clients can prevent cyber-attacks, by following industry best practices and applying security frame works.

Larry Veino.

Chief Technology Officer Focus Technology Solutions
Bio

Break

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Getting Ahead of Threats with DNS Based Threat Intelligence

If only we knew sooner. Nearly all attacks are eventually associated with DNS based infrastructure – yes simple IP addresses and Domains. Some threats are only detectable by analyzing DNS data. The speaker will discuss innovations and challenges with developing reliable predictive threat intel, using DNS. This talk will highlight new reputation scoring, suspicious classifications, and the tracking of DNS Threat Actors.

John Fahey

Cybersecurity Specialist Infoblox
Bio

Presentation

3:15 pm

Why Security Teams are Urgently Chasing API Security

Cloud adoption and digital transformation have been driving amazing innovation in the past 20 years. With that, the most commonly overlooked attack surface is the growing number of APIs that subsequently come with the new cloud approach. Not only has Gartner confirmed APIs’ rising prevalence as the attack vector of choice for bad actors, but Data Theorem has also been observing this rise in the last 5 years.

An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs. 

  • Why APIs have risen to the top of the hacker’s to-do list
  • How hackers are attacking APIs & extracting data
  • Top strategies to proactively secure APIs

Jackie Zhou

GTM Field Lead Data Theorem, Inc.
Bio

Break

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Aaron Birnbaum

Chief Information Security Officer Seron Security
Bio

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.
Bio

Kathleen Moriarty

Chief Technology Officer Center for Internet Security
Bio

Ryan Davis

Chief Information Security Officer NS1 an IBM Company
Bio

Jason Mafera

Field CTO, North America IGEL Technology
Bio

Closing Remarks

5:00 pm

Closing Remarks

Register

Share This