Chicago, IL

Wednesday, September 14, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Seize The Breach: Why breaches still occur and how to mitigate them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that read more…

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

·      Why breaches are usually occurring

·      How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage

·      A simple maturity model based on outcomes and use cases that can vastly improve Security Operations

Bio

Jim Chrisos

Principal Engineer Exabeam

Sponsored by

Presentation

9:30 am

Optimizing the Human Element of Cybersecurity

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper read more…

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper look at:

· How approaches to cyber defense are changing to keep pace with the ever-evolving threats of hackers

· What motivates cyber professionals

· How to make humans the strongest link in the cyber defense line

Bio

Jeff Orloff

Tech Evangelist and Vice President of Product RangeForce

Sponsored by

Presentation

10:30 am

Security Programs That Thrive In Economic Uncertainty

As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet if 2021 and the explosion of ransomware, new nation-state sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything it is that security programs must read more…

As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet if 2021 and the explosion of ransomware, new nation-state sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this presentation Bill Bernard will challenge security leaders to re-evaluate their programs, and provide insight into how to maximize your security team’s chances to not only survive, but thrive in this challenging situation through an honest evaluation of your program, realignment to company goals, and efficient use of your available resources.

Bio

Bill Bernard

AVP, Security Strategy deepwatch

Sponsored by

Presentation

11:00 am

Stopping Attacks, Not Your Business: AI & Autonomous Response

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Austin in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack read more…
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Austin in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Bio

Paul Gossage

Cyber Security Account Executive Darktrace

Sponsored by

Keynote

12:00 pm

Zero Trust

Bio

Sebastiaan Gybels

CIO & CISO CoinFlip

Presentation

1:30 pm

2022 Security Trends with Arctic Wolf

2021 was a landmark year in cybersecurity.The rapid, piecemeal changes businesses made on the fly to infrastructure, applications, and access controls during 2020’s huge shift to remote work were now under scrutiny, while security teams were still busy defending against the litany of attacks and attack methods. As the size, read more…

2021 was a landmark year in cybersecurity.The rapid, piecemeal changes businesses made on the fly to infrastructure, applications, and access controls during 2020’s huge shift to remote work were now under scrutiny, while security teams were still busy defending against the litany of attacks and attack methods.

As the size, scope, and sophistication of attacks continued to grow, many organizations spent the past year overwhelmed by perpetual change—wondering when, where, and how things will ever improve.

Join Sule Tatar of Arctic Wolf to learn how to keep your company out of the news. Key takeaways from this session include:

  • The importance of a multi-pronged cybersecurity strategy
  • The new and creative ways that companies are being effected by cybercrimes
  • Industries that are most vulnerable to cybercrimes

Bio

Sule Tatar

Product Manager Arctic Wolf

Sponsored by

Presentation

2:00 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next read more…
Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

2:45 pm

Is Your Defensive Stack Ready For A Targeted Attack?

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing read more…

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.

Bio

Shaun Parmassar

Solutions Engineer Pentera

Sponsored by

Presentation

3:15 pm

It Takes More than Automated Compliance to Get Ahead of Threats

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes read more…

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up.

Automation is a strong first step in reducing manual work and freeing up your team’s workload.  However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions.

The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work.

Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day.

Attend this webinar and learn how to:

  • Focus your planning efforts around your organization’s strategic business priorities
  • Be more proactive by automating evidence collection, risk scoring and monitoring
  • Gain actionable insights to help you clearly communicate with key stakeholders
Bio

Meghan Maneval

Director of Technical Product Management Reciprocity

Sponsored by

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

John Allen

VP Cyber Risk & Compliance Darktrace
Bio

Steve Winterfeld

Advisory Chief Information Security Officer Akamai Technologies
Bio

Ron Zochalski

Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Bio

Tellis Williams

Chief Information Security Officer/ Information Security Executive The Dream Exchange
Bio

Elizabeth D. Ogunti

Chief Information Security Officer JBT Corporation

Closing Remarks

5:00 pm

Closing Remarks