Snehal Contractor is responsible for Worldwide Systems Engineering and Technical Service at Stellar Cyber. He is an engineering professional with over 30 years of experience in technical sales, marketing, and management. Snehal has worked for startup companies such as Netscreen, Palo Alto Networks, Riverbed, Fortinet, Aerohive, Cisco, and USRobotics. During his tenure at these companies, he has supported the largest Service Providers and System Integrators globally. Some of the accounts he has supported are Accenture, Dimension Data, Verizon, French Telecom, ATT, Forsythe Security, and Sprint; these accounts eventually became the top partners for his company. Snehal is called upon to be a trusted consultant to on-board these global partners from business development to complete technical enablement. Snehal earned his Bachelor of Science in Electrical Engineering and Computer Science from University of Illinois.
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
It is an honor and a privilege to serve as the Chief Information Security Officer of an iconic global brand that has a deep, cherished, always-on connection into communities everywhere. Information Security at 7-Eleven focuses on maintaining and enhancing an industry-leading, comprehensive and cohesive security fabric around our business value drivers in a customer-obsessed manner. The 7-Eleven Information Security organization brings together the various technical domains within Information Security with the force multipliers of Governance, Risk and Compliance as well as Data Protection to facilitate unified accountability and expedient action.
I came to 7-Eleven from Symantec’s Consumer Business Division where I had the honor of driving a global security engineering portfolio. Prior to joining Symantec via the LifeLock acquisition, I spent 5 years at NetApp, and over 10 years with Intuit; after working with the information security and risk management teams at Ernst & Young and KMPG. I have been responsible for leading key security initiatives that helped integrate security into the culture of the company and extend the brand into global markets. It has been a great honor to lead NetApp’s ISO27001 recertification, speak at NetApp’s conferences in Berlin and Tokyo and be a recipient of Intuit’s Innovation Award. At Ernst & Young and KPMG; I was responsible for developing risk mitigation strategies primarily for Fortune 500 clients in the financial and technology sector.
“When your supply chain becomes a kill chain – Managing third-party risk”
Sponsor Booth Networking Time
Past, Present, Future: Zero Trust Architecture
In this webinar you will learn:
- How to maximize existing security controls, security capabilities, and investments
- Pragmatic application of zero-trust principles to traditional and SaaS environments
- What’s new in tactics and strategies for protecting hybrid environments
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.
However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.
SolarWinds Breach and Ransomware in 2021
We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.
What you’ll learn:
- How hackers used highly evasive malware to compromise SolarWinds defenses.
- Assessing your environment and determining vulnerability.
- Finding and addressing lateral movement in your environment.
“2020 is in hindsight, are we ready for what’s ahead?”
Cyber-security in the AGE OF THINGS
Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.
Join the session to learn how to prevent IoT cyber-attacks by:
- Exposing all IoT security risks across IT and OT networks
- Easily creating policies to secure thousands of IoT devices
- Preventing both network-based and device-level attacks
Live Panel Discussion
CISO Panel: “When your supply chain becomes a kill chain – Managing third-party risk”
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. In this session, learn about: ·Paradigm shifts in the cyber landscape ·Advancements in offensive AI attack techniques ·The Immune System Approach to cyber security and defensive, Autonomous Response capabilities ·Real-world examples of emerging threats that were stopped with Cyber AI
Talking to the Board About the New Realities of IT Security
When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.
Join this virtual boardroom to discuss:
- Achieving alignment across the board
- Building a “roadmap to yes”
- Focusing on risk and reward for core business objectives
Rational Approach to Zero Trust
Are you ready for Intelligent SOC?
Extortionware: Your Privacy Problems Made Public
Stay Ahead of the Hacker with Continuous Security Testing
Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
Build up your cyber resilience with continuous risk validation
Prioritize remediation efforts with a threat-facing perspective
Increase the productivity of your security teams