Central-May
Wednesday, May 24, 2023
Virtual
Keynote Speaker
“"Transforming Information Security"”
Kathleen Moriarty
Chief Technology Officer Center for Internet Security
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Pablo Romera
Former Director, Advisory Board - Center of Excellence for Digital Ethics Dallas Baptist University
Elvis Moreland
Chief Information Security Officer (vCISO) Blue Cyren
Richard Cocchiara
Managing Partner CxO Expertise
Keavy Murphy
Senior Director of Security Starburst Data
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The email threat landscape is evolving...are you?
Sponsored by
Presentation
Securing AI Models in the Cloud
AI is a topic that is increasingly included in conversations around data security. This is because AI models often require access to sensitive data, and their algorithms and decision-making processes can also potentially create new vulnerabilities for data security.
AI and machine learning algorithms can be used to analyze large volumes of high-risk and sensitive data to identify patterns, predict outcomes, and improve patient care. healthcare operations, advertising trending, predictive analytics, or support financial research.
This session covers best practices for securing AI models in cloud environments, including strategies for data encryption, access control, and network security. It could also explore the unique security challenges that arise when working with cloud-based AI ML models and provide guidance for mitigating insider threats and in-memory processing risks.
Key takeaways:
- Learn how to protect sensitive data: AI/ML models from accessing to sensitive data such as personal information, financial records, or medical records by allowing it to be processed in an encrypted environment, preventing unauthorized access
- Secure model training: Know how to use confidential computing to secure the model training process by encrypting the data used for training, it prevents malicious actors from reverse-engineering the model or stealing sensitive data
- Improved regulatory compliance such as GDPR, HIPAA, CPPA, and others, by providing an immutable and tamper-proof log to ensure data is kept confidential and secure.
- Secure model deployment: Demonstrate how Confidential Clean Room can be used to secure the deployment of AI/ML models in a trusted execution environment (TEE)
Sponsored by
Sponsor Networking Time
Keynote
"Transforming Information Security"
Sponsor Networking Time
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Pablo Romera
Former Director, Advisory Board - Center of Excellence for Digital Ethics Dallas Baptist University
Sponsor Networking Time
Presentation
Secure Networks
Sponsored by
Presentation
360 Degrees of Protection: Combating the Rise of Multichannel Phishing
Sponsored by
Networking
Sponsor Networking Time
Presentation
Digital Sovereignty
This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world. We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.
Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.
Sponsored by
Presentation
CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach
Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!