Home / / Dallas, TX (Western Region)

VIRTUAL Western | Dallas CyberSecurity Conference

February 18, 2021 @ 8am PST

Rescheduling due to Texas Crisis 

NEW DATE:

March 3, 2021 @ 8am PST

(CA, TX, CO, WA, AZ, OR, UT, OK)

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

“2020 is in hindsight, are we ready for what’s ahead?”

Sujeet Bambawale

Chief Information Security Officer 7-Eleven

It is an honor and a privilege to serve as the Chief Information Security Officer of an iconic global brand that has a deep, cherished, always-on connection into communities everywhere. Information Security at 7-Eleven focuses on maintaining and enhancing an industry-leading, comprehensive and cohesive security fabric around our business value drivers in a customer-obsessed manner. The 7-Eleven Information Security organization brings together the various technical domains within Information Security with the force multipliers of Governance, Risk and Compliance as well as Data Protection to facilitate unified accountability and expedient action.

I came to 7-Eleven from Symantec’s Consumer Business Division where I had the honor of driving a global security engineering portfolio. Prior to joining Symantec via the LifeLock acquisition, I spent 5 years at NetApp, and over 10 years with Intuit; after working with the information security and risk management teams at Ernst & Young and KMPG. I have been responsible for leading key security initiatives that helped integrate security into the culture of the company and extend the brand into global markets. It has been a great honor to lead NetApp’s ISO27001 recertification, speak at NetApp’s conferences in Berlin and Tokyo and be a recipient of Intuit’s Innovation Award. At Ernst & Young and KPMG; I was responsible for developing risk mitigation strategies primarily for Fortune 500 clients in the financial and technology sector.

CISO Panel

CISO Panel: “When your supply chain becomes a kill chain – Managing third-party risk”

Eric Yancy

Information Security Officer
City of Irving

Bio

Scott Smith

Chief Information Security Officer
City of Bryan

Bio

Kevin Joyner

Chief Information Security Officer
Brazos County

Bio

David Belanger

Chief Information Security Officer
Maxor National Pharmacy Services

Bio

Jeff Murray

Protective Security Advisor
U.S. Department of Homeland Security

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am – 8:10 am

Opening Introductions

Networking

8:00 am – 9:00 am

Sponsor Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Presentation

9:00 am – 9:30 am

Past, Present, Future: Zero Trust Architecture

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

J. Wolfgang Goerlich

Advisory CISO and Strategist Duo Security
Bio

Live Presentation

9:30 am – 10:00 am

SolarWinds Breach and Ransomware in 2021

We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.

What you’ll learn:

  • How hackers used highly evasive malware to compromise SolarWinds defenses.
  • Assessing your environment and determining vulnerability.
  • Finding and addressing lateral movement in your environment.

Snehal Contractor

Vice President Worldwide Systems Engineering & Technical Services Stellar Cyber
Bio

Live Keynote

10:20 am – 11:20 am

“2020 is in hindsight, are we ready for what’s ahead?”

Sujeet Bambawale

Chief Information Security Officer 7-Eleven
Bio

Live Presentation

11:30 am – 12:00 pm

Cyber-security in the AGE OF THINGS

Cybercriminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations, and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

Join the session to learn how to prevent IoT cyber-attacks by:

  • Exposing all IoT security risks across IT and OT networks
  • Easily creating policies to secure thousands of IoT devices
  • Preventing both network-based and device-level attacks

Grant Asplund

Chief Cyber Security Evangelist Check Point Software Technologies
Bio
checkpoint logo

Live Panel Discussion

12:10 pm – 1:10 pm

CISO Panel: “When your supply chain becomes a kill chain – Managing third-party risk”

Eric Yancy

Information Security Officer City of Irving
Bio

Scott Smith

Chief Information Security Officer City of Bryan
Bio

Kevin Joyner

Chief Information Security Officer Brazos County
Bio

David Belanger

Chief Information Security Officer Maxor National Pharmacy Services
Bio

Jeff Murray

Protective Security Advisor U.S. Department of Homeland Security
Bio

Presentation

1:20 pm – 1:50 pm

How Cyber AI Detects Digital Fakes and Impersonation Attacks

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session.

Dan Fein

Director of Email Security Products, Americas Darktrace
Bio
Darktrace Logo

Presentation

1:50 pm – 2:20 pm

Talking to the Board About the New Realities of IT Security

When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.

Join this virtual boardroom to discuss:

  • Achieving alignment across the board
  • Building a “roadmap to yes”
  • Focusing on risk and reward for core business objectives

Jeff Costlow

Deputy CISO ExtraHop
Bio

Presentation

2:30 pm – 3:00 pm

Rational Approach to Zero Trust

Chris Pittman

Senior Manager, Sales Engineering Blackberry
Bio

Presentation

3:00 pm – 3:20 pm

Are you ready for Intelligent SOC?

The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC.  Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

Brandon Hoffman

Chief Information Security Officer Netenrich
Bio

Presentation

3:30 pm – 4:00 pm

Extortionware: Your Privacy Problems Made Public

Over the last decade, ransomware has increasingly become the most popular option for hackers to monetize the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin
Bio
OneLogin Logo

Presentation

4:00 pm – 4:30 pm

Stay Ahead of the Hacker with Continuous Security Testing

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

  • Build up your cyber resilience with continuous risk validation

  • Prioritize remediation efforts with a threat-facing perspective

  • Increase the productivity of your security teams

Sion Retzkin

Head of Knowledge Pcysys
Bio

Presentation

4:30 pm – 5:00 pm

Making the SOC more effective by enabling automation with better data

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.

Alex Kirk

Global Principal, Suricata Corelight
Bio

Closing Remarks

5:00 pm

Closing Remarks

Register

Share This