Dallas, TX (Western Region)

Wednesday, March 3, 2021

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions

Networking

8:00 am

Sponsor Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Presentation

9:00 am

Past, Present, Future: Zero Trust Architecture

In this webinar you will learn: How to maximize existing security controls, security capabilities, and investments Pragmatic application of zero-trust principles to traditional and SaaS environments What’s new in tactics and strategies for protecting hybrid environments Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond read more…

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

Bio

J. Wolfgang Goerlich

Advisory CISO and Strategist Duo Security

Sponsored by

Live Presentation

9:30 am

SolarWinds Breach and Ransomware in 2021

We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when. What you’ll learn: How hackers used highly evasive read more…

We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.

What you’ll learn:

  • How hackers used highly evasive malware to compromise SolarWinds defenses.
  • Assessing your environment and determining vulnerability.
  • Finding and addressing lateral movement in your environment.
Bio

Snehal Contractor

Vice President Worldwide Systems Engineering & Technical Services Stellar Cyber

Sponsored by

Live Keynote

10:20 am

“2020 is in hindsight, are we ready for what’s ahead?”

Bio

Sujeet Bambawale

Chief Information Security Officer 7-Eleven

Live Presentation

11:30 am

Cyber-security in the AGE OF THINGS

Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends read more…

Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

Join the session to learn how to prevent IoT cyber-attacks by:

  • Exposing all IoT security risks across IT and OT networks
  • Easily creating policies to secure thousands of IoT devices
  • Preventing both network-based and device-level attacks
Bio

Grant Asplund

Growth Technologies Evangelist Check Point Software Technologies

Sponsored by

Live Panel Discussion

12:10 pm

CISO Panel: “When your supply chain becomes a kill chain – Managing third-party risk”

Bio

Eric Yancy

Information Security Officer City of Irving
Bio

Scott Smith

Chief Information Security Officer City of Bryan
Bio

Kevin Joyner

Chief Information Security Officer Brazos County
Bio

David Belanger

Chief Security Officer Bestow
Bio

Jeff Murray

Protective Security Advisor U.S. Department of Homeland Security

Presentation

1:20 pm

How Cyber AI Detects Digital Fakes and Impersonation Attacks

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on read more…

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session.

Bio

Dan Fein

Director of Email Security Products, Americas Darktrace

Sponsored by

Presentation

1:50 pm

Talking to the Board About the New Realities of IT Security

When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT. Join this virtual boardroom to discuss: Achieving alignment across the read more…

When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.

Join this virtual boardroom to discuss:

  • Achieving alignment across the board
  • Building a “roadmap to yes”
  • Focusing on risk and reward for core business objectives
Bio

Jeff Costlow

Deputy CISO ExtraHop

Sponsored by

Presentation

2:30 pm

Rational Approach to Zero Trust

Bio

Chris Pittman

Systems Engineer, Presales, Senior Arctic Wolf

Sponsored by

Presentation

3:00 pm

Are you ready for Intelligent SOC?

The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and read more…
The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC.  Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.
Bio

Brandon Hoffman

Chief Information Security Officer Netenrich

Sponsored by

Presentation

3:30 pm

Extortionware: Your Privacy Problems Made Public

Over the last decade, ransomware has increasingly become the most popular option for hackers to monetize the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed ransomware software and techniques adapt and evolve to include the theft and exposure of private information, read more…
Over the last decade, ransomware has increasingly become the most popular option for hackers to monetize the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.
Bio

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin

Sponsored by

Presentation

4:00 pm

Stay Ahead of the Hacker with Continuous Security Testing

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to: Build up your cyber resilience with continuous risk validation Prioritize remediation efforts with a threat-facing perspective Increase the productivity of your security teams

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

  • Build up your cyber resilience with continuous risk validation

  • Prioritize remediation efforts with a threat-facing perspective

  • Increase the productivity of your security teams

Bio

Sion Retzkin

Head of Knowledge Pentera

Sponsored by

Presentation

4:30 pm

Making the SOC more effective by enabling automation with better data

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This read more…

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.

Bio

Alex Kirk

Global Principal, Suricata Corelight

Sponsored by

Closing Remarks

5:00 pm

Closing Remarks

Share This