Columbus, OH (Central Region)
Thursday, August 26, 2021
Hybrid
Keynote Speakers
“"Why a BISO role is becoming more critical in how security leadership aligns with the business"”
Connie Matthews
Founder & CEO ReynCon Educational Services & Training
Jana Moore
Chief Information Security Officer Belron® International
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Connie Matthews
Founder & CEO ReynCon Educational Services & Training
Jana Moore
Chief Information Security Officer Belron® International
Bryan Waeltz
Deputy Chief Information Security Officer Cardinal Health
Doug Hromco
Chief Information Security Officer People’s Bank
Tre Smith
Chief Information Security Officer Wexner Medical Center at The Ohio State University
Rich Nagle
AVP & Chief Information Security Officer The Ohio State University
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Check In | Networking
Best Practices: PAM Security & Data Privacy
What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why:
· Analyzing Best Practice
· Security considerations
· Key components for a successful PAM strategy
· How six widely held beliefs about PAM are in fact wrong
· Why the typical IT environment is a hacker’s playground
· Where the current threat landscape is heading and how to prepare
Sponsored by
Cyber Security Exposed
Can security software solutions save you from a breech? Let’s explore recent cyber security news to understand how to achieve the right balance between security culture and security solutions in order to defend our organizations and infrastructure.
Sponsored by
Networking
Sponsor Networking Time
Presentation
Shifting from Static Defense to Live Response
The rise in attacks leveraging exploits that result in attackers living off the land has marginalized not only signature-based solutions, but many adaptive and “next gen” technologies as well. These attacks necessitate operational live incident response to not only detect, but to contain, eradicate, and recover. How does this change the make up of a SOC or CIRT, and what does a successful small team look like?
Sponsored by
The Rise of SASE(Secure Access Service Edge)
Sponsored by
Lunch
Presentation
Insider Risk Management: The alternative to traditional data protection is here!
Sponsored by
Presentation
How to Achieve Zero Trust at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Our recent State of Cloud Entitlements Report finds that over 95% of human and machine identities in the cloud are using less than 5% of the permissions granted; this delta is called the Cloud Permissions Gap. This gap will continue to grow as the vast number of API action/resource combinations influence a cloud IAM policy or role, and it’s clear that granting and maintaining least privilege access is challenging in these environments. Currently, many organizations use manual processes and change requests to grant end-users access to their cloud resources, and a desire to reduce friction leads admins to often grant broad permissions “just-in-case,” leading to the Cloud Permissions Gap mentioned above. To eliminate this gap, enterprises need a complete Cloud Infrastructure Entitlement Management (CIEM) platform that quickly and automatically generates activity-based least privilege policies, and offer mechanisms for developers to quickly and safely escalate access on a fine-grained basis. This presentation will walk through each of these use cases in detail and illustrate how to shift identity and access management to the left as part of a modern DevSecOps model with CIEM.
Sponsored by
Networking
Sponsor Networking Time
Live Keynote
"Why a BISO role is becoming more critical in how security leadership aligns with the business"
Presentation
Winning Against Ransomware
Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software based segmentation can help your organization to quickly put controls in place that help you avoid becoming a victim of these increasingly prevalent campaigns.
Sponsored by
Sponsor Networking Time
Presentation
5 Lessons Learned Fighting Ransomware
There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam
Sponsored by
Presentation
Building a Response Strategy to Advanced Threats
Sponsored by
Happy Hour | Networking
Live Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Hear from cybersecurity leaders and experts on:
- Current cybersecurity threats and practices
- Post-pandemic security