Join Us in Columbus for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Attend live to enjoy a light breakfast, plated lunch and cocktail reception!
Keynote Panel
Connie Matthews
Founder & CEO ReynCon Educational Services & Training
Michelle Melendez
Vice President AON
Tony De’Angelo
VP, Chief Information Security Officer Encova Insurance
Holly Drake
Chief Information Security Officer State of Ohio
Brian Waeltz
Cardinal Health Senior Vice President and Chief Information Security Officer
CISO/Industry Leader Panel
Connie Matthews
Founder & CEO ReynCon Educational Services & Training
Joy Kenyon
Vice President and Deputy Chief Information Security Officer Cardinal Health
Schlaine Hutchins
Senior Manager Security, Compliance & Privacy Loop
Luke Fowler
Director of Information Security Cotiviti
Tremayne Smith
Chief Information Security Officer Wexner Medical Center at The Ohio State Medical Center
Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Doubletree Columbus Worthington
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Identifying Threats in your Workplace
Defending Against Data Breeches
Sponsor Networking Time
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses
Sponsored by
Presentation
Cybersecurity, AI, and Where We Really Are
Join for a conversation about artificial intelligence and machine learning within cybersecurity operations. Since OpenAI’s flagship product “ChatGPT” took news headlines, the market has exploded with offerings, services, and lofty market projections. This presentation will introduce concepts around AI/ML, security risks and threats, and how ops teams are building tools and processes around them. This material is applicable to anyone working directly with security or making decisions for an organization
Sponsored by
Sponsor Networking Time
Lunch
Panel Discussion
Sponsor Networking Time
Presentation
Silent Scream - The Horror that is AD
Lying deep in every network is Active Directory. The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. It rarely is given the attention that it needs to withstand the onslaught from attackers, both inside and outside. Everyone knows it needs attention, but one wrong setting could cause it to stop, causing total disruption of the network. Join our session and learn some of the common attack paths in AD and how attackers use these to own your Active Directory & Entra ID environment!