Columbus, OH (Central Region)

Thursday, August 26, 2021

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Check In | Networking

9:00 am

Best Practices: PAM Security & Data Privacy

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how read more…

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why: 

·        Analyzing Best Practice 

·        Security considerations 

·        Key components for a successful PAM strategy 

·        How six widely held beliefs about PAM are in fact wrong 

·        Why the typical IT environment is a hacker’s playground 

·        Where the current threat landscape is heading and how to prepare 

Bio

Christopher Hills

Deputy Chief Technology Officer BeyondTrust

Sponsored by

9:30 am

Cyber Security Exposed

Can security software solutions save you from a breech? Let’s explore recent cyber security news to understand how to achieve the right balance between security culture and security solutions in order to defend our organizations and infrastructure.

Can security software solutions save you from a breech? Let’s explore recent cyber security news to understand how to achieve the right balance between security culture and security solutions in order to defend our organizations and infrastructure.

Bio

Joel Hollenbeck

Head of Security Engineering, Check Point Evangelist Check Point

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Shifting from Static Defense to Live Response

The rise in attacks leveraging exploits that result in attackers living off the land has marginalized not only signature-based solutions, but many adaptive and “next gen” technologies as well. These attacks necessitate operational live incident response to not only detect, but to contain, eradicate, and recover. How does this change read more…

The rise in attacks leveraging exploits that result in attackers living off the land has marginalized not only signature-based solutions, but many adaptive and “next gen” technologies as well. These attacks necessitate operational live incident response to not only detect, but to contain, eradicate, and recover. How does this change the make up of a SOC or CIRT, and what does a successful small team look like?

Bio

Shane Harsch

Senior Solution Engineer SentinelOne

Sponsored by

11:00 am

The Rise of SASE(Secure Access Service Edge)

Bio

Nick d’Amato

Director of Solutions Engineering Bitglass

Sponsored by

11:30 am

Lunch

Presentation

11:45 am

Insider Risk Management: The alternative to traditional data protection is here!

We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending read more…
We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.
Bio

Tommy Todd

Vice President of Security Code42

Sponsored by

Presentation

12:15 pm

How to Achieve Zero Trust at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)

Our recent State of Cloud Entitlements Report finds that over 95% of human and machine identities in the cloud are using less than 5% of the permissions granted; this delta is called the Cloud Permissions Gap. This gap will continue to grow as the vast number of API action/resource combinations read more…

Our recent State of Cloud Entitlements Report finds that over 95% of human and machine identities in the cloud are using less than 5% of the permissions granted; this delta is called the Cloud Permissions Gap. This gap will continue to grow as the vast number of API action/resource combinations influence a cloud IAM policy or role, and it’s clear that granting and maintaining least privilege access is challenging in these environments. Currently, many organizations use manual processes and change requests to grant end-users access to their cloud resources, and a desire to reduce friction leads admins to often grant broad permissions “just-in-case,” leading to the Cloud Permissions Gap mentioned above. To eliminate this gap, enterprises need a complete Cloud Infrastructure Entitlement Management (CIEM) platform that quickly and automatically generates activity-based least privilege policies, and offer mechanisms for developers to quickly and safely escalate access on a fine-grained basis. This presentation will walk through each of these use cases in detail and illustrate how to shift identity and access management to the left as part of a modern DevSecOps model with CIEM.

Sponsored by

Networking

12:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

1:00 pm

"Why a BISO role is becoming more critical in how security leadership aligns with the business"

Bio

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Jana Moore

Chief Information Security Officer Belron® International

Presentation

1:45 pm

Winning Against Ransomware

Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software read more…

Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software based segmentation can help your organization to quickly put controls in place that help you avoid becoming a victim of these increasingly prevalent campaigns.

Bio

Mac Grant

Area Vice President, Central US Guardicore

Sponsored by

2:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

5 Lessons Learned Fighting Ransomware

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will read more…

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam

Bio

Rick Vanover

Senior Director of Product Strategy Veeam

Sponsored by

Presentation

3:09 pm

Building a Response Strategy to Advanced Threats

Bio

Jeff Costlow

Deputy CISO ExtraHop

Sponsored by

3:34 pm

Happy Hour | Networking

Live Panel Discussion

4:15 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on: Current cybersecurity threats and practices Post-pandemic security

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Bio

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Jana Moore

Chief Information Security Officer Belron® International
Bio

Bryan Waeltz

Deputy Chief Information Security Officer Cardinal Health
Bio

Doug Hromco

Chief Information Security Officer People’s Bank
Bio

Tre Smith

Chief Information Security Officer Wexner Medical Center at The Ohio State University
Bio

Rich Nagle

AVP & Chief Information Security Officer The Ohio State University
5:15 pm

Happy Hour | Networking | Prize Drawing