Boston Cybersecurity Conference
Thursday, November 30, 2023
Live In Person @ Boston Marriott Burlington
In Person | Virtual | Hybrid
Earn up to 10 CPE credits






































About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
"Is Cyber Risk journeying to Business Risk? Is it really a question?"
Jo (Adams) Bentley
Global Business Information Security Officer Liberty Mutual Insurance
Jo is Global Business Information Security Officer of Global Risk Solutions market. She is responsible for the Global Risk Solutions (GRS) Global Cybersecurity Program ensuring that customer and business assets are protected throughout the business value chain.
Jo has been at Liberty Mutual 3 years. She is a passionate Cybersecurity professional; interested in Cybersecurity as an enabler, foundational good practice and resilience. She has held multiple positions in Information Security, IT, and Project Management across multiple industries -Telecommunication, Hospitality, Financial Services and Banking implementing speed to market products and services or designing and leading regulated Cybersecurity Programs as a CISO..
Jo holds a Master of Business Administration (MBA) from Boston University; Master’s degree in Information Systems and Technology (MSc) from City University in London. Jo also holds professional certifications: PMP, CISSP and CISM
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Aaron Birnbaum
Chief Information Security Officer
Seron Security

Derek Morris
Virtual Chief Information Security Officer
Wolf & Company, P.C.

Kathleen Moriarty
Chief Technology Officer
Center for Internet Security

Ryan Davis
Chief Information Security Officer
NS1 an IBM Company

Jason Mafera
Field CTO, North America
IGEL Technology
Premier Platinum Sponsors

Platinum Sponsors


Gold Sponsors






Silver Sponsors

























Partners




Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Say Goodbye to Malware by Securing the User Edge
In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to resources from new and interesting places. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all the endpoints across your organization, both inside and out.
In this presentation, learn how to create a strategy to bridge the gap between end-users and their workspaces, apps, and data, while providing a secure endpoint with no malware concerns, rapid recovery and a seamless user experience.

Presentation
IBM Storage for Data Resiliency

Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Modernization and Your Data: A New Take on Security and Compliance
Today, organizations must maintain data-centric business operations, among other things in order to provide innovative digital services to their customers. This leads to the sprawl of your most critical data across various environments, making it exponentially more complex to proactively identify and manage risks of abuse and theft. This data security complexity also presents difficulty in adhering to various regulatory compliance and privacy laws across different regions.
Join us in this presentation to understand how to modernize your data protection strategy by applying intelligence to reveal abusive data queries across heterogeneous environments and secure your most critical data assets while reducing the overhead of meeting your regulatory requirements.

Presentation
Threat Hunting and Modeling - AI/ML Powered Intelligence Threat Prevention
We’ll explore today’s sophisticated and multi-layered threat cyber attacks and how machine learning and artificial intelligence play a role in prevention. In addition this discussion will explore threat modeling and the MITRE ATT&CK framework and how these activities/tools support active threat hunting exercises.

Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
"Is Cyber Risk journeying to Business Risk? Is it really a question?"
Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Identity and Access in 2024 | Threats and Security Plans

Presentation
The Anatomy of a Cyber-attack
How clients can prevent cyber-attacks, by following industry best practices and applying security frame works.


Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Getting Ahead of Threats with DNS Based Threat Intelligence
If only we knew sooner. Nearly all attacks are eventually associated with DNS based infrastructure – yes simple IP addresses and Domains. Some threats are only detectable by analyzing DNS data. The speaker will discuss innovations and challenges with developing reliable predictive threat intel, using DNS. This talk will highlight new reputation scoring, suspicious classifications, and the tracking of DNS Threat Actors.

Presentation
Why Security Teams are Urgently Chasing API Security
An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs.
- Why APIs have risen to the top of the hacker’s to-do list
- How hackers are attacking APIs & extracting data
- Top strategies to proactively secure APIs

Break
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!