Central-January

Thursday, January 13, 2022

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions

Presentation

9:00 am

The Past, Present and Future of Strong Authentication

Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on read more…

Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective.  Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.In this talk, we will discuss:

  • A brief history of authentication
  • Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
  • Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
  • A case for continuous user authentication
  • What is device risk and why is the real-time assessment of endpoint security important
Bio

Jasson Casey

CTO Beyond Identity

Sponsored by

Presentation

9:30 am

Infrastructure as Code Security

Learn how to improve your security posture with Infrastructure as Code (IaC). Make sure automation and security are at the forefront of your pipeline designs. Deep dive into how Infrastructure as Code (IaC) can improve security and operations through fast and repeatable deployments. In traditional deployment and management models, rarely read more…

Learn how to improve your security posture with Infrastructure as Code (IaC). Make sure automation and security are at the forefront of your pipeline designs.
Deep dive into how Infrastructure as Code (IaC) can improve security and operations through fast and repeatable deployments. In traditional deployment and management models, rarely does improved security contribute to faster delivery. IaC changes the game by making security a foundational part of your day 1 deployment stance. Learn how IT and security teams can mutually benefit from a shared pipeline.

Bio

Jessica Onorati

Senior Security Engineer Automox

Sponsored by

Keynote

10:15 am

“What’s the Worst That Can Happen?”

The year is 2032. We live, work, and play in the “metaverse” – a virtual reality universe. Our digital identities are now our main forms of existence; we live entirely online and do everything in 1’s and 0’s. It seems improbable, but we’ve been driving at full speed towards this read more…

The year is 2032. We live, work, and play in the “metaverse” – a virtual reality universe. Our digital identities are now our main forms of existence; we live entirely online and do everything in 1’s and 0’s.

It seems improbable, but we’ve been driving at full speed towards this reality since the advent of the internet.

Over the next 10 years then, how does cybersecurity need to evolve? What do we as leaders need to do TODAY to secure a future world that exists mostly in the virtual? And more importantly, what can we do to help prepare our companies and communities for this eventuality?

Join Naomi Buckwalter, Director of Information Security & IT at Beam Technologies, as she paints the pictures of two alternate realities – one in which cybersecurity is seen as everyone’s responsibility, and the other in which we treat cybersecurity as an afterthought. Because cybersecurity is no longer just an IT problem.

Our future depends on it.

 

Bio

Naomi Buckwalter

vCISO | Director of Information Security Beam Technologies

Presentation

11:30 am

Crawl, Walk, Run Your Segmentation Approach

While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which read more…
While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.
Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Panel Discussion

12:05 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Brian Contos

Chief Security Officer Phosphorus Cybersecurity
Bio

Steve Lodin

Senior Director, Cyber Security Operations Sallie Mae
Bio

Jack Leidecker

Chief Information Security Officer Gong
Bio

Sajan Gautam

Chief Information Security Officer Arvest Bank
Bio

Jonathan Kimmitt

Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa

Presentation

1:20 pm

Security Challenges with Digital Co-workers

As organizations continue to grow, especially through acquisition, the adoption of tools to automate processes to augment workers has become increasingly popular. In an effort to increase the operational efficiency that tools such as Robotic Process Automation provide, the security element is oftentimes forgotten. Join One Identity’s Larry Chinski to read more…

As organizations continue to grow, especially through acquisition, the adoption of tools to automate processes to augment workers has become increasingly popular. In an effort to increase the operational efficiency that tools such as Robotic Process Automation provide, the security element is oftentimes forgotten. Join One Identity’s Larry Chinski to discuss threats that digital coworkers pose in organizations and how to mitigate them.

Bio

Larry Chinski

Vice President, Global IAM Strategy One Identity

Sponsored by

Presentation

1:50 pm

Zero trust and Battling Insider Threats

Remote work has soared, and organizations are facing rapid change in their workforces. What’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities? Attend this engaging session to learn more about: All the ways digital identity impacts today’s enterprise read more…

Remote work has soared, and organizations are facing rapid change in their workforces. What’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities?

Attend this engaging session to learn more about:

  • All the ways digital identity impacts today’s enterprise

  • How you can nurture cyber resilience

  • The practical realities of implementing least privilege in identity and access management systems

  • …and more

Bio

Eve Maler

Chief Technology Officer ForgeRock
Bio

Allan Foster

Chief Evangelist ForgeRock

Sponsored by

Presentation

2:35 pm

Security Optimization in the Cloud

Bio

Jose Barajas

Technical Director, North America AttackIQ

Sponsored by

Presentation

3:05 pm

Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness

Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is read more…

Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is protected and your assets stay secure with Cyber Situational Awareness.

Bio

Christopher Morales

CISO and Head of Security Strategy Netenrich

Sponsored by

3:45 pm

Compliance as a Catalyst for Reducing Risk

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s read more…

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.

  • Challenges in Compliance and Risk Programs
  • Five Best Practices in starting a Risk Program
  • Compliance Considerations that will Improve Your Risk Posture
Bio

Rob Ellis

Chief Strategy Officer Reciprocity

Sponsored by

Presentation

4:15 pm

Adopting Zero Trust Through Identity First Networking

In the past two years, we’ve seen an exponential increase in requirements to adjust to work from anywhere environment. This rapid digital shift has created a burden on both security and networking infrastructure that was never designed for a distributed workforce. Now, with many, if not all employees, vendors, and read more…

In the past two years, we’ve seen an exponential increase in requirements to adjust to work from anywhere environment. This rapid digital shift has created a burden on both security and networking infrastructure that was never designed for a distributed workforce. Now, with many, if not all employees, vendors, and partners accessing resources from outside of your traditional network, secure access has become a top priority.

Join Twingate’s Co-Founder and CPO Alex Marshall for a brief presentation discussing the importance of Identity-First Networking and how it will pave your path towards adopting Zero Trust.

After joining this session you’ll come away with:

  • Key concepts needed to adopt zero trust

  • Why ephemeral access should be considered

  • A modern distributed networking topology

Bio

Alex Marshall

Co-Founder and Chief Product Officer Twingate

Sponsored by

4:45 pm

Closing Remarks