Columbus Cybersecurity Conference

Thursday, October 3, 2024

Doubletree Columbus Worthington

Parking/Directions

Hybrid

Join Us in Columbus for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Attend live to enjoy a light breakfast, plated lunch and cocktail reception!

 

 

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Doubletree Columbus Worthington

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

9:00 am

Identifying Threats in your Workplace

9:30 am

Defending Against Data Breeches

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses

Bio

Jordan Gregory

Threat Intelligence Analyst Proofpoint

Sponsored by

Presentation

11:00 am

Cybersecurity, AI, and Where We Really Are

Join for a conversation about artificial intelligence and machine learning within cybersecurity operations. Since OpenAI’s flagship product “ChatGPT” took news headlines, the market has exploded with offerings, services, and lofty market projections. This presentation will introduce concepts around AI/ML, security risks and threats, and how ops teams are building tools read more…

Join for a conversation about artificial intelligence and machine learning within cybersecurity operations. Since OpenAI’s flagship product “ChatGPT” took news headlines, the market has exploded with offerings, services, and lofty market projections. This presentation will introduce concepts around AI/ML, security risks and threats, and how ops teams are building tools and processes around them. This material is applicable to anyone working directly with security or making decisions for an organization

Bio

Jeramy Kopacko

Managed Detection and Response Engineer Sophos

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Panel Discussion

12:00 pm
Bio

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Michelle Melendez

Vice President AON
Bio

Tony De’Angelo

VP, Chief Information Security Officer Encova Insurance
Bio

Holly Drake

Chief Information Security Officer State of Ohio
Bio

Brian Waeltz

Cardinal Health Senior Vice President and Chief Information Security Officer
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Silent Scream - The Horror that is AD

Lying deep in every network is Active Directory. The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. read more…

Lying deep in every network is Active Directory. The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. It rarely is given the attention that it needs to withstand the onslaught from attackers, both inside and outside. Everyone knows it needs attention, but one wrong setting could cause it to stop, causing total disruption of the network. Join our session and learn some of the common attack paths in AD and how attackers use these to own your Active Directory & Entra ID environment!

Bio

Tim Oroszi

Enterprise Security Engineer Tenable

Sponsored by

2:00 pm

Tricks for Endpoint Security

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
2:45 pm

Communicating Risk

3:15 pm

Security Blindspots

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm
Bio

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Joy Kenyon

Vice President and Deputy Chief Information Security Officer Cardinal Health
Bio

Schlaine Hutchins

Senior Manager Security, Compliance & Privacy Loop
Bio

Luke Fowler

Director of Information Security Cotiviti
Bio

Tremayne Smith

Chief Information Security Officer Wexner Medical Center at The Ohio State Medical Center
5:00 pm

Closing Remarks