Boston Cybersecurity Conference

Thursday, November 21, 2024

Boston Marriott Burlington

Parking/Directions

Hybrid

Join Us in Boston for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Boston Marriott Burlington

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Zero-Trust in Non-IT Environments

The New Industrial Age, How can we keep our factories and plants safe from cyberattacks beyond the firewall?

The New Industrial Age, How can we keep our factories and plants safe from cyberattacks beyond the firewall?

Bio

Florian Doumenc

CEO and Co-Founder Trout

Sponsored by

9:30 am

Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI read more…

In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI in cybersecurity. By integrating these insights, businesses can better navigate modern cybersecurity complexities. Leveraging cyber insurance and AI innovations, organizations can safeguard their digital assets in an interconnected world.

Bio

Bill Mylchreest

National Partner Account Manager ESET

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Extortion and Exfiltration: The New Age of Ransomware

Ransomware continues to be the number one cybersecurity threat globally. Its ever-evolving nature creates new strains, tactic changes and sophisticated attacks that cybersecurity professionals struggle to keep up with. One notable shift in the ransomware landscape has been the move from traditional encryption tactics to data exfiltration and extortion. In read more…
Ransomware continues to be the number one cybersecurity threat globally. Its ever-evolving nature creates new strains, tactic changes and sophisticated attacks that cybersecurity professionals struggle to keep up with. One notable shift in the ransomware landscape has been the move from traditional encryption tactics to data exfiltration and extortion. In 2024 93% of ransomware attacks involve data exfiltration, as ransomware groups focus on stealing sensitive data for the purpose of extortion.
 
Join this session to discover more about:
Ransomware trends and insights
The rise of exfiltration and extortion
The importance of integrating new technologies into cybersecurity stacks including anti data exfiltration technology
How to build comprehensive cybersecurity defenses
Bio

Doug Lubahn

VP of Customer Success BlackFog

Sponsored by

Presentation

11:00 am

Securing Your Revenue Stream: Protecting Applications and APIs from Bot Threats

With automation changing the landscape, global cyber losses attributable to bot attacks now average between $68-$116B annually. We will examine data from the Imperva Threat Research team to investigate the scope of the challenge, review real-world examples and provide practical steps you can take to prepare for the inevitable security read more…

With automation changing the landscape, global cyber losses attributable to bot attacks now average between $68-$116B annually. We will examine data from the Imperva Threat Research team to investigate the scope of the challenge, review real-world examples and provide practical steps you can take to prepare for the inevitable security incident.

Bio

Chris Stensager

Solution Architect Imperva a Thales Company

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Future Proofing During Rapid Change

Let’s explore challenges and security solutions in a rapidly changing business, technology and privacy landscape. Real-world examples from critical infrastructure and more, while preparing for threat actors that constantly leverage weakest links to access data.

Let’s explore challenges and security solutions in a rapidly changing business, technology and privacy landscape. Real-world examples from critical infrastructure and more, while preparing for threat actors that constantly leverage weakest links to access data.

Bio

Anne Coulombe

Chief Information Security Officer
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Aron Salzman-deis

Threat Intelligence Specialist Proofpoint

Sponsored by

Presentation

2:00 pm

Cybersecurity Challenges in Education: Protecting Sensitive Data in a Vulnerable Environment

Educational institutions face significant cybersecurity challenges due to unique network infrastructures and security policies, often made vulnerable by users bypassing protections. Recent incidents, such as a North Korean cyberattack using an online game to spread malware, highlight the risks posed by seemingly harmless activities, like students disabling antivirus software to read more…

Educational institutions face significant cybersecurity challenges due to unique network infrastructures and security policies, often made vulnerable by users bypassing protections. Recent incidents, such as a North Korean cyberattack using an online game to spread malware, highlight the risks posed by seemingly harmless activities, like students disabling antivirus software to play games on school laptops. While some educational institutions have taken steps to secure their systems, others have seen vulnerabilities exposed through inadequate controls, especially in research labs that store valuable and sensitive data. With schools increasingly targeted by ransomware and data breaches involving personal and financial information, it’s crucial to address these vulnerabilities. Join this session to explore how educational institutions can strengthen cybersecurity defenses against evolving threats.

Bio

Kyle Auer

Threat Researcher Adlumin

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

User satisfaction = Admin relaxation: IT's secret formula

Daily struggles with technology cost money and a lot of patience. Unnoticed by IT Teams, a buildup of small issues keeps end users from working efficiently.  What if you could predict and prevent tech problems before they surface? We’ll show you how Digital Employee Experience combined with Unified Endpoint Management read more…

Daily struggles with technology cost money and a lot of patience. Unnoticed by IT Teams, a buildup of small issues keeps end users from working efficiently.  What if you could predict and prevent tech problems before they surface? We’ll show you how Digital Employee Experience combined with Unified Endpoint Management can drastically improve user experience as well as simplify troubleshooting processes – all while reducing traditional help desk tickets. Looking to transform the way your IT operates? This is the session for you!

Bio

William Wyatt

Presales Engineer baramundi Software

Sponsored by

Presentation

3:15 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

3:40 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Workforce Challenges as Latest Cyber Risk."

Bio

Meghan Martinez

Director of Cyber Range Programs CyberTrust Massachusetts
Bio

Richard Cocchiara

Managing Partner CxO Expertise
Bio

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.
Bio

Doug Lubahn

VP of Customer Success BlackFog
5:00 pm

Closing Remarks