FutureCon Virtual Central Conference
Wednesday, May 24, 2023 CT
(KS, MO, IL, IN, MI, OH, NE, IA, MN)
Earn up to 10 CPE credits






















About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
"Transforming Information Security"
Kathleen Moriarty
Chief Technology Officer Center for Internet Security
Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.
Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Pablo Romera
Former Director, Advisory Board - Center of Excellence for Digital Ethics
Dallas Baptist University

Elvis Moreland
Chief Information Security Officer (vCISO)
Blue Cyren

Richard Cocchiara
Chief Innovation & Security Officer
Cognitient Corp.

Keavy Murphy
Senior Director of Security
Starburst Data
Gold Sponsors









Silver Sponsors









Partners




Agenda
Times are subject to change
Opening Introductions | Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The email threat landscape is evolving...are you?

Presentation
Securing AI Models in the Cloud
AI is a topic that is increasingly included in conversations around data security. This is because AI models often require access to sensitive data, and their algorithms and decision-making processes can also potentially create new vulnerabilities for data security.
AI and machine learning algorithms can be used to analyze large volumes of high-risk and sensitive data to identify patterns, predict outcomes, and improve patient care. healthcare operations, advertising trending, predictive analytics, or support financial research.
This session covers best practices for securing AI models in cloud environments, including strategies for data encryption, access control, and network security. It could also explore the unique security challenges that arise when working with cloud-based AI ML models and provide guidance for mitigating insider threats and in-memory processing risks.
Key takeaways:
- Learn how to protect sensitive data: AI/ML models from accessing to sensitive data such as personal information, financial records, or medical records by allowing it to be processed in an encrypted environment, preventing unauthorized access
- Secure model training: Know how to use confidential computing to secure the model training process by encrypting the data used for training, it prevents malicious actors from reverse-engineering the model or stealing sensitive data
- Improved regulatory compliance such as GDPR, HIPAA, CPPA, and others, by providing an immutable and tamper-proof log to ensure data is kept confidential and secure.
- Secure model deployment: Demonstrate how Confidential Clean Room can be used to secure the deployment of AI/ML models in a trusted execution environment (TEE)

Sponsor Networking Time
Keynote
"Transforming Information Security"
Sponsor Networking Time
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Pablo Romera
Former Director, Advisory Board - Center of Excellence for Digital Ethics Dallas Baptist University
Sponsor Networking Time
Presentation
360 Degrees of Protection: Combating the Rise of Multichannel Phishing

Networking
Sponsor Networking Time
Presentation
Digital Sovereignty
This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world. We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.
Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.

Presentation
CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach
Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Modern Data Protection
