Home / / Dallas | State of Texas (Western Region)

Dallas CyberSecurity Conference

Wednesday, August 11, 2021 CT

Live In Person @ The House of Blues Dallas

In Person | Virtual | Hybrid

Earn up to 8 CPE credits

 

Join the Virtual Event Here

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Adopting the Nine CyberSecurity Habits to Combat Cyberattacks"

George Finney

Chief Security Officer Southern Methodist University

George Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. George is the bestselling author of several cybersecurity books, including the award-winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. George has worked in Cybersecurity for over 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture.

 

Book Signing Available In Person 

CISO Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Ted Gruenloh

Chief Operating Officer
Sentinel IPS

Bio

David Belanger

Chief Information Security Officer
Maxor National Pharmacy Services

Bio

Jonathan Kimmitt

Chief Information Security Officer
University of Tulsa

Bio

George Finney

Chief Security Officer
Southern Methodist University

Bio

Michael Anderson

Chief Information Security Officer
Dallas County

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Networking

8:00 am – 9:00 am

Check In | Networking

Presentation

9:05 am – 9:40 am

Simple tricks for effective endpoint security

-How IT Admin can resolve modern endpoint security challenges in the distributed workforce

-Key considerations to ensure successful & secure endpoint management

-Endpoint Security strategy beyond 2021

Romanus Prabhu

Global Head of Technical Support, Endpoint Management, and Security ManageEngine
Bio

Presentation

9:40 am – 10:10 am

CIS Controls in the Real World

As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8,  and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.

Ted Gruenloh

Chief Operating Officer Sentinel IPS
Bio
Sentinel IPS Logo

Networking

10:05 am – 10:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am – 11:05 am

Death, Taxes, & Ransomware: Make the Inevitable, Avoidable

With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources even keep up? Adding another tool to the defensive stack just isn’t enough. How do you know it will reliably stand up against an actual threat? In this session, I will speak to specific techniques in identifying ransomware threats at different layers of the defensive stack that will help reduce risk & impact. Finally, we leverage the Pentera platform to automate a holistic view, emulating actual attacks to measure the resilience of all our efforts.

Stephen Tutterow

Sales Engineer Pentera
Bio

Presentation

11:05 am – 11:35 am

A Boss’s Perspective: Edward Snowden and Defending Against Insider Threat

Edward Snowden was the quintessential insider threat that all organizations fear. In this presentation, you will hear the inside story of Snowden’s last few months at NSA, the search for him, and the impact of his actions from his then boss, Steven Bay.  From this presentation, you will take away a better understanding of who insider threats are, lessons learned about detecting and protecting yourself from them, and a better understanding of the level of damage insiders can do.

Steven Bay

Cyber Fusion Center and Security Operations Practice Lead Kudelski Security
Bio

11:35 am – 12:00 pm

Lunch

Presentation

12:00 pm – 12:30 pm

The Cyber Security Revolution in Healthcare

Daniel Clayton

Global VP of Services & Support Bitdefender
Bio

Networking

12:30 pm – 1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

1:00 pm – 2:00 pm

"Adopting the Nine CyberSecurity Habits to Combat Cyberattacks"

George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.

George Finney

Chief Security Officer Southern Methodist University
Bio

Networking

2:00 pm – 2:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

2:15 pm – 2:40 pm

Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic

The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before.

In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius.

In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.”

He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations.

Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:

  • How security teams are transforming policy and infrastructure post-pandemic
  • Key strategies security teams are using as employees return to the office for the first time in over a year
  • Why security teams are prioritizing automating asset inventories in 2021

Nathan Burke

CMO Axonius
Bio

Presentation

2:40 pm – 3:10 pm

Building a Response Strategy to Advanced Threats

Jeff Costlow

Deputy CISO ExtraHop
Bio

Networking

3:10 pm – 3:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:30 pm – 4:00 pm

Happy Hour | Networking

Panel Discussion

4:00 pm – 5:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security

Ted Gruenloh

Chief Operating Officer Sentinel IPS
Bio

David Belanger

Chief Information Security Officer Maxor National Pharmacy Services
Bio

Jonathan Kimmitt

Chief Information Security Officer University of Tulsa
Bio

George Finney

Chief Security Officer Southern Methodist University
Bio

Michael Anderson

Chief Information Security Officer Dallas County
Bio

4:00 pm – 6:00 pm

Happy Hour | Networking | Prize Drawing

Register

Share This