Snehal Contractor is responsible for Worldwide Systems Engineering and Technical Service at Stellar Cyber. He is an engineering professional with over 30 years of experience in technical sales, marketing, and management. Snehal has worked for startup companies such as Netscreen, Palo Alto Networks, Riverbed, Fortinet, Aerohive, Cisco, and USRobotics. During his tenure at these companies, he has supported the largest Service Providers and System Integrators globally. Some of the accounts he has supported are Accenture, Dimension Data, Verizon, French Telecom, ATT, Forsythe Security, and Sprint; these accounts eventually became the top partners for his company. Snehal is called upon to be a trusted consultant to on-board these global partners from business development to complete technical enablement. Snehal earned his Bachelor of Science in Electrical Engineering and Computer Science from University of Illinois.
VIRTUAL Western | Dallas CyberSecurity Conference
February 18, 2021 @ 8am PST
Rescheduling due to Texas Crisis
NEW DATE:
March 3, 2021 @ 8am PST
(CA, TX, CO, WA, AZ, OR, UT, OK)
Earn up to 10 CPE credits

























About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
“2020 is in hindsight, are we ready for what’s ahead?”
Sujeet Bambawale
Chief Information Security Officer 7-Eleven
It is an honor and a privilege to serve as the Chief Information Security Officer of an iconic global brand that has a deep, cherished, always-on connection into communities everywhere. Information Security at 7-Eleven focuses on maintaining and enhancing an industry-leading, comprehensive and cohesive security fabric around our business value drivers in a customer-obsessed manner. The 7-Eleven Information Security organization brings together the various technical domains within Information Security with the force multipliers of Governance, Risk and Compliance as well as Data Protection to facilitate unified accountability and expedient action.
I came to 7-Eleven from Symantec’s Consumer Business Division where I had the honor of driving a global security engineering portfolio. Prior to joining Symantec via the LifeLock acquisition, I spent 5 years at NetApp, and over 10 years with Intuit; after working with the information security and risk management teams at Ernst & Young and KMPG. I have been responsible for leading key security initiatives that helped integrate security into the culture of the company and extend the brand into global markets. It has been a great honor to lead NetApp’s ISO27001 recertification, speak at NetApp’s conferences in Berlin and Tokyo and be a recipient of Intuit’s Innovation Award. At Ernst & Young and KPMG; I was responsible for developing risk mitigation strategies primarily for Fortune 500 clients in the financial and technology sector.
CISO Panel
“When your supply chain becomes a kill chain – Managing third-party risk”

Eric Yancy
Information Security Officer
City of Irving

Scott Smith
Chief Information Security Officer
City of Bryan

Kevin Joyner
Chief Information Security Officer
Brazos County

David Belanger
Chief Information Security Officer
Maxor National Pharmacy Services

Jeff Murray
Protective Security Advisor
U.S. Department of Homeland Security
Platinum Sponsors


Gold Sponsors









Silver Sponsors









Partners





Agenda
Opening Introductions
Networking
Sponsor Booth Networking Time
Presentation
Past, Present, Future: Zero Trust Architecture
In this webinar you will learn:
- How to maximize existing security controls, security capabilities, and investments
- Pragmatic application of zero-trust principles to traditional and SaaS environments
- What’s new in tactics and strategies for protecting hybrid environments
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.
However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

Live Presentation
SolarWinds Breach and Ransomware in 2021
We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.
What you’ll learn:
- How hackers used highly evasive malware to compromise SolarWinds defenses.
- Assessing your environment and determining vulnerability.
- Finding and addressing lateral movement in your environment.

Snehal Contractor
Vice President Worldwide Systems Engineering & Technical Services Stellar Cyber

Live Keynote
“2020 is in hindsight, are we ready for what’s ahead?”
Live Presentation
Cyber-security in the AGE OF THINGS
Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.
Join the session to learn how to prevent IoT cyber-attacks by:
- Exposing all IoT security risks across IT and OT networks
- Easily creating policies to secure thousands of IoT devices
- Preventing both network-based and device-level attacks

Live Panel Discussion
CISO Panel: “When your supply chain becomes a kill chain – Managing third-party risk”
Presentation
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. In this session, learn about: ·Paradigm shifts in the cyber landscape ·Advancements in offensive AI attack techniques ·The Immune System Approach to cyber security and defensive, Autonomous Response capabilities ·Real-world examples of emerging threats that were stopped with Cyber AI

Presentation
Talking to the Board About the New Realities of IT Security
When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.
Join this virtual boardroom to discuss:
- Achieving alignment across the board
- Building a “roadmap to yes”
- Focusing on risk and reward for core business objectives

Presentation
Rational Approach to Zero Trust

Presentation
Are you ready for Intelligent SOC?

Presentation
Extortionware: Your Privacy Problems Made Public

Presentation
Stay Ahead of the Hacker with Continuous Security Testing
Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
-
Build up your cyber resilience with continuous risk validation
-
Prioritize remediation efforts with a threat-facing perspective
-
Increase the productivity of your security teams

Presentation
Making the SOC more effective by enabling automation with better data
SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.
