Central-January
Thursday, January 13, 2022
Virtual
Keynote Speaker
““What’s the Worst That Can Happen?””
Naomi Buckwalter
vCISO | Director of Information Security Beam Technologies
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Brian Contos
Chief Security Officer Phosphorus Cybersecurity
Steve Lodin
Senior Director, Cyber Security Operations Sallie Mae
Jack Leidecker
Chief Information Security Officer Gong
Sajan Gautam
Chief Information Security Officer Arvest Bank
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions
Presentation
The Past, Present and Future of Strong Authentication
Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective. Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.In this talk, we will discuss:
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
Sponsored by
Presentation
Infrastructure as Code Security
Learn how to improve your security posture with Infrastructure as Code (IaC). Make sure automation and security are at the forefront of your pipeline designs.
Deep dive into how Infrastructure as Code (IaC) can improve security and operations through fast and repeatable deployments. In traditional deployment and management models, rarely does improved security contribute to faster delivery. IaC changes the game by making security a foundational part of your day 1 deployment stance. Learn how IT and security teams can mutually benefit from a shared pipeline.
Sponsored by
Keynote
“What’s the Worst That Can Happen?”
The year is 2032. We live, work, and play in the “metaverse” – a virtual reality universe. Our digital identities are now our main forms of existence; we live entirely online and do everything in 1’s and 0’s.
It seems improbable, but we’ve been driving at full speed towards this reality since the advent of the internet.
Over the next 10 years then, how does cybersecurity need to evolve? What do we as leaders need to do TODAY to secure a future world that exists mostly in the virtual? And more importantly, what can we do to help prepare our companies and communities for this eventuality?
Join Naomi Buckwalter, Director of Information Security & IT at Beam Technologies, as she paints the pictures of two alternate realities – one in which cybersecurity is seen as everyone’s responsibility, and the other in which we treat cybersecurity as an afterthought. Because cybersecurity is no longer just an IT problem.
Our future depends on it.
Presentation
Crawl, Walk, Run Your Segmentation Approach
Sponsored by
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Presentation
Security Challenges with Digital Co-workers
As organizations continue to grow, especially through acquisition, the adoption of tools to automate processes to augment workers has become increasingly popular. In an effort to increase the operational efficiency that tools such as Robotic Process Automation provide, the security element is oftentimes forgotten. Join One Identity’s Larry Chinski to discuss threats that digital coworkers pose in organizations and how to mitigate them.
Sponsored by
Presentation
Zero trust and Battling Insider Threats
Remote work has soared, and organizations are facing rapid change in their workforces. What’s really different about the situation? What can we do about ransomware, data exfiltration, and other threats given the new realities?
Attend this engaging session to learn more about:
-
All the ways digital identity impacts today’s enterprise
-
How you can nurture cyber resilience
-
The practical realities of implementing least privilege in identity and access management systems
-
…and more
Sponsored by
Presentation
Security Optimization in the Cloud
Sponsored by
Presentation
Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness
Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is protected and your assets stay secure with Cyber Situational Awareness.
Sponsored by
Compliance as a Catalyst for Reducing Risk
Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
- Challenges in Compliance and Risk Programs
- Five Best Practices in starting a Risk Program
- Compliance Considerations that will Improve Your Risk Posture
Sponsored by
Presentation
Adopting Zero Trust Through Identity First Networking
In the past two years, we’ve seen an exponential increase in requirements to adjust to work from anywhere environment. This rapid digital shift has created a burden on both security and networking infrastructure that was never designed for a distributed workforce. Now, with many, if not all employees, vendors, and partners accessing resources from outside of your traditional network, secure access has become a top priority.
Join Twingate’s Co-Founder and CPO Alex Marshall for a brief presentation discussing the importance of Identity-First Networking and how it will pave your path towards adopting Zero Trust.
After joining this session you’ll come away with:
-
Key concepts needed to adopt zero trust
-
Why ephemeral access should be considered
-
A modern distributed networking topology