Home / / Columbus, OH (Central Region)

Columbus CyberSecurity Conference

Thursday, August 26, 2021 @ 8am EDT

Virtual | Live

Earn up to 8 CPE credits

Hyatt Regency Columbus

350 North High Street, Columbus, Ohio 43215 United States

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speakers

"Why a BISO role is becoming more critical in how security leadership aligns with the business"

Connie Matthews

Founder & CEO ReynCon Educational Services & Training

Connie Mathews has been in the Information Security industry for over 16 years as a trusted advisor. She has worked with hundreds of global and small and medium businesses in building their information security programs and helping organizations understand their risks around People, Process and Technology. Connie’s passion drove her to start her own company,…

Read More

Jana Moore

Business Information Security Officer, Security Awareness Cardinal Health

Jana Moore is the Director of Information Security at Cardinal Health leading the Business Information Security Officer (BISO) and Security Awareness organizations globally. In her prior role, Jana was responsible for developing the Cyber Security Operations program, and in 2018, opened Cardinal Health’s first purpose built Cyber Command Center providing a center of excellence for…

Read More

CISO Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Connie Matthews

Founder & CEO
ReynCon Educational Services & Training

Bio

Jana Moore

Business Information Security Officer, Security Awareness
Cardinal Health

Bio

Bryan Waeltz

Deputy Chief Information Security Officer
Cardinal Health

Bio

Doug Hromco

Deputy Chief Information Security Officer
Huntington National Bank

Bio

Tre Smith

Chief Information Security Officer
Wexner Medical Center at The Ohio State University

Bio

Rich Nagle

Interim Chief Information Security Officer
The Ohio State University

Bio

Premium Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am – 9:00 am

Check In | Networking

9:00 am – 9:30 am

Best Practices: PAM Security & Data Privacy

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why: 

·        Analyzing Best Practice 

·        Security considerations 

·        Key components for a successful PAM strategy 

·        How six widely held beliefs about PAM are in fact wrong 

·        Why the typical IT environment is a hacker’s playground 

·        Where the current threat landscape is heading and how to prepare 

Christopher Hills

Deputy Chief Technology Officer BeyondTrust
Bio
BeyondTrust logo

9:30 am – 10:00 am

Cyber Security Exposed

Can security software solutions save you from a breech? Let’s explore recent cyber security news to understand how to achieve the right balance between security culture and security solutions in order to defend our organizations and infrastructure.

Joel Hollenbeck

Head of Security Engineering, Check Point Evangelist Check Point
Bio
checkpoint logo

Networking

10:00 am – 10:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am – 11:00 am

Shifting from Static Defense to Live Response

The rise in attacks leveraging exploits that result in attackers living off the land has marginalized not only signature-based solutions, but many adaptive and “next gen” technologies as well. These attacks necessitate operational live incident response to not only detect, but to contain, eradicate, and recover. How does this change the make up of a SOC or CIRT, and what does a successful small team look like?

Shane Harsch

Senior Solution Engineer SentinelOne
Bio

11:00 am – 11:30 am

The Rise of SASE (Secure Access Service Edge)

Nick d’Amato

Director of Solutions Engineering Bitglass
Bio

11:30 am – 12:00 pm

Lunch

Presentation

11:45 am – 12:15 pm

Insider Risk Management: The alternative to traditional data protection is here!

We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.

Tommy Todd

Vice President of Security Code42
Bio

Presentation

12:15 pm – 12:45 pm

How to Achieve Zero Trust at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)

Our recent State of Cloud Entitlements Report finds that over 95% of human and machine identities in the cloud are using less than 5% of the permissions granted; this delta is called the Cloud Permissions Gap. This gap will continue to grow as the vast number of API action/resource combinations influence a cloud IAM policy or role, and it’s clear that granting and maintaining least privilege access is challenging in these environments. Currently, many organizations use manual processes and change requests to grant end-users access to their cloud resources, and a desire to reduce friction leads admins to often grant broad permissions “just-in-case,” leading to the Cloud Permissions Gap mentioned above. To eliminate this gap, enterprises need a complete Cloud Infrastructure Entitlement Management (CIEM) platform that quickly and automatically generates activity-based least privilege policies, and offer mechanisms for developers to quickly and safely escalate access on a fine-grained basis. This presentation will walk through each of these use cases in detail and illustrate how to shift identity and access management to the left as part of a modern DevSecOps model with CIEM.

Nicholas Barretta

Principal Solutions Architect CloudKnox
Bio

Networking

12:45 pm – 1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

1:00 pm – 1:45 pm

"Why a BISO role is becoming more critical in how security leadership aligns with the business"

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Jana Moore

Business Information Security Officer, Security Awareness Cardinal Health
Bio

Presentation

1:45 pm – 2:15 pm

Winning Against Ransomware

Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software based segmentation can help your organization to quickly put controls in place that help you avoid becoming a victim of these increasingly prevalent campaigns.

Mac Grant

Area Vice President, Central US Guardicore
Bio
Guardicore logo

2:15 pm – 2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm – 3:09 pm

5 Lessons Learned Fighting Ransomware

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam

Rick Vanover

Senior Director of Product Strategy Veeam
Bio

Presentation

3:09 pm – 3:34 pm

Building a Response Strategy to Advanced Threats

Jeff Costlow

Deputy CISO ExtraHop
Bio

3:34 pm – 4:15 pm

Happy Hour | Networking

Live Panel Discussion

4:15 pm – 5:15 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Jana Moore

Business Information Security Officer, Security Awareness Cardinal Health
Bio

Bryan Waeltz

Deputy Chief Information Security Officer Cardinal Health
Bio

Doug Hromco

Deputy Chief Information Security Officer Huntington National Bank
Bio

Tre Smith

Chief Information Security Officer Wexner Medical Center at The Ohio State University
Bio

Rich Nagle

Interim Chief Information Security Officer The Ohio State University
Bio

5:15 pm – 6:00 pm

Happy Hour | Networking | Prize Drawing

Register

Share This