Central-May

Wednesday, May 24, 2023

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

9:00 am

The email threat landscape is evolving...are you?

Bio

Scott Deluke

Manager, Enterprise Engineers Abnormal

Sponsored by

Presentation

9:30 am

Securing AI Models in the Cloud

AI is a topic that is increasingly included in conversations around data security. This is because AI models often require access to sensitive data, and their algorithms and decision-making processes can also potentially create new vulnerabilities for data security. AI and machine learning algorithms can be used to analyze large read more…

AI is a topic that is increasingly included in conversations around data security. This is because AI models often require access to sensitive data, and their algorithms and decision-making processes can also potentially create new vulnerabilities for data security.

AI and machine learning algorithms can be used to analyze large volumes of high-risk and sensitive data to identify patterns, predict outcomes, and improve patient care. healthcare operations, advertising trending, predictive analytics, or support financial research.

This session covers best practices for securing AI models in cloud environments, including strategies for data encryption, access control, and network security. It could also explore the unique security challenges that arise when working with cloud-based AI ML models and provide guidance for mitigating insider threats and in-memory processing risks.

Key takeaways:

  • Learn how to protect sensitive data: AI/ML models from accessing to sensitive data such as personal information, financial records, or medical records by allowing it to be processed in an encrypted environment, preventing unauthorized access
  • Secure model training: Know how to use confidential computing to secure the model training process by encrypting the data used for training, it prevents malicious actors from reverse-engineering the model or stealing sensitive data
  • Improved regulatory compliance such as GDPR, HIPAA, CPPA, and others, by providing an immutable and tamper-proof log to ensure data is kept confidential and secure.
  • Secure model deployment: Demonstrate how Confidential Clean Room can be used to secure the deployment of AI/ML models in a trusted execution environment (TEE)
Bio

Dr. Shamim Naqvi

CEO and Co-Founder SafeLiShare
Bio

Gabriel Lebow

Business Development Manager SafeLiShare

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

10:30 am

"Transforming Information Security"

Bio

Kathleen Moriarty

Chief Technology Officer Center for Internet Security
11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

12:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Pablo Romera

Former Director, Advisory Board - Center of Excellence for Digital Ethics Dallas Baptist University
Bio

Elvis Moreland

Chief Information Security Officer (vCISO) Blue Cyren
Bio

Richard Cocchiara

Managing Partner CxO Expertise
Bio

Keavy Murphy

Senior Director of Security Starburst Data
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Secure Networks

Bio

Suraj Chandrasekaran

Global SASE PreSales Leader Versa Networks

Sponsored by

Presentation

2:00 pm

360 Degrees of Protection: Combating the Rise of Multichannel Phishing

Bio

Joao Sousa Botto

Group Project Manager Cloudflare
Bio

Tim Obezuk

Product Manager Cloudflare
Bio

Ryan Carter

Associate Director, Trust & Safety Cloudflare

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Digital Sovereignty

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations. Finally, we will explore read more…

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.

Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.

Bio

Stephen O’Connor

Principal Solution Architect Thales

Sponsored by

Presentation

3:30 pm

CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss read more…

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Bio

Jamion Aden

Solutions Architect IP Pathways
Bio

Michael Leggett

Solutions Architect Avertium

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

4:15 pm

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

Closing Remarks

4:45 pm

Closing Remarks