Home / / Central-May

FutureCon Virtual Central Conference

Wednesday, May 24, 2023 CT

(KS, MO, IL, IN, MI, OH, NE, IA, MN)

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Transforming Information Security"

Kathleen Moriarty

Chief Technology Officer Center for Internet Security

Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.

Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Pablo Romera

Former Director, Advisory Board - Center of Excellence for Digital Ethics
Dallas Baptist University

Bio

Elvis Moreland

Chief Information Security Officer (vCISO)
Blue Cyren

Bio

Richard Cocchiara

Chief Innovation & Security Officer
Cognitient Corp.

Bio

Keavy Murphy

Senior Director of Security
Starburst Data

Bio

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

9:00 am

The email threat landscape is evolving...are you?

Scott Deluke

Manager, Enterprise Engineers Abnormal
Bio

Presentation

9:30 am

Securing AI Models in the Cloud

AI is a topic that is increasingly included in conversations around data security. This is because AI models often require access to sensitive data, and their algorithms and decision-making processes can also potentially create new vulnerabilities for data security.

AI and machine learning algorithms can be used to analyze large volumes of high-risk and sensitive data to identify patterns, predict outcomes, and improve patient care. healthcare operations, advertising trending, predictive analytics, or support financial research.

This session covers best practices for securing AI models in cloud environments, including strategies for data encryption, access control, and network security. It could also explore the unique security challenges that arise when working with cloud-based AI ML models and provide guidance for mitigating insider threats and in-memory processing risks.

Key takeaways:

  • Learn how to protect sensitive data: AI/ML models from accessing to sensitive data such as personal information, financial records, or medical records by allowing it to be processed in an encrypted environment, preventing unauthorized access
  • Secure model training: Know how to use confidential computing to secure the model training process by encrypting the data used for training, it prevents malicious actors from reverse-engineering the model or stealing sensitive data
  • Improved regulatory compliance such as GDPR, HIPAA, CPPA, and others, by providing an immutable and tamper-proof log to ensure data is kept confidential and secure.
  • Secure model deployment: Demonstrate how Confidential Clean Room can be used to secure the deployment of AI/ML models in a trusted execution environment (TEE)

Dr. Shamim Naqvi

CEO and Co-Founder SafeLiShare
Bio

Gabriel Lebow

Business Development Manager SafeLiShare
Bio

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

10:30 am

"Transforming Information Security"

Kathleen Moriarty

Chief Technology Officer Center for Internet Security
Bio

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

12:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Pablo Romera

Former Director, Advisory Board - Center of Excellence for Digital Ethics Dallas Baptist University
Bio

Elvis Moreland

Chief Information Security Officer (vCISO) Blue Cyren
Bio

Richard Cocchiara

Chief Innovation & Security Officer Cognitient Corp.
Bio

Keavy Murphy

Senior Director of Security Starburst Data
Bio

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Secure Networks

Suraj Chandrasekaran

Global SASE PreSales Leader Versa Networks
Bio

Presentation

2:00 pm

360 Degrees of Protection: Combating the Rise of Multichannel Phishing

Joao Sousa Botto

Group Project Manager Cloudflare
Bio

Tim Obezuk

Product Manager Cloudflare
Bio

Ryan Carter

Associate Director, Trust & Safety Cloudflare
Bio

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Digital Sovereignty

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.

Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.

Stephen O’Connor

Principal Solution Architect Thales
Bio

Presentation

3:30 pm

CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Jamion Aden

Solutions Architect IP Pathways
Bio

Michael Leggett

Solutions Architect Avertium
Bio

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

4:15 pm

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Chris Tyrrell

Director of Sales Engineering Next DLP
Bio

Closing Remarks

4:45 pm

Closing Remarks

Registration isn’t open yet. Check back soon!

Share This