Denver, CO (Western Region)

Wednesday, December 1, 2021

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions

9:00 am

Rise of Secure Access Service Edge (SASE)

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While read more…

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases. Architectural considerations you should keep in mind when comparing SASE vendors. 
Bio

Kevin Sheu

Senior VP of Marketing Bitglass

Sponsored by

Presentation

9:25 am

Modern Security Programs – IT Evolution to Security Revolution

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees. What must an organization read more…

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender

Sponsored by

Keynote

10:15 am

Future-proof your red team.

As definitions go, what constitutes as a red team is a hotly debated topic in cybersecurity. And just as controversial is the topic of red team automation. Is it possible to automate a red team? Or are only defensive (blue) tools intended to be automated? And just why is automated read more…

As definitions go, what constitutes as a red team is a hotly debated topic in cybersecurity. And just as controversial is the topic of red team automation. Is it possible to automate a red team? Or are only defensive (blue) tools intended to be automated? And just why is automated red teaming such a heated topic in the industry?

In this talk, I will answer these questions by examining the role of offensive security in an organization’s Standard Operating Procedures. Describing red teaming by its functional role will help us better understand where and when automation plays a role today – and pinpoint where it may accelerate in the future.

Bio

David Hunt

Chief Technology Officer Prelude

Presentation

11:30 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can read more…

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot Bio

Bob Ertl

Sr. Director, Product Marketing Accellion

Sponsored by

Panel Discussion

11:55 am

“Global Cyber Trends and Predictions for 2022”

A forward look at global breaking trends and predictions in cybersecurity.

A forward look at global breaking trends and predictions in cybersecurity.

Laureen Smith headshot Bio

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications
Bio

Jonathan Fowler

Chief Information Security Officer Consilio
Bio

Frank Balonis

Chief Information Security Officer and SVP Operations Kiteworks
Bio

Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne

Sponsored by

1:10 pm

Protecting Your Organization from the Business of Ransomware

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s read more…

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative?

Join this session to learn more about:

  • The business of ransomware
  • The evolving threat landscape
  • Ransomware Protection Tactics and Techniques
  • Your Security Roadmap for Hybrid and Remote Workers
  • Leveraging an EDR with Limited Security Staff
Bio

Robert Zamani

Senior Director of Engineering Malwarebytes

Sponsored by

1:40 pm

Building a Response Strategy to Advanced Threats

Bio

Jeff Costlow

Deputy CISO ExtraHop

Sponsored by

2:20 pm

Cyber Resilience for Digital Operations

Security operations needs context awareness to ensure the success of business initiatives in a world of advanced, targeted attacks. Netenrich empowers security, IT and cloud operations to thrive during adversity with adaptive incident resolution using real time, data driven risk and trust-based decision making. The Netenrich Resolution Intelligence platform streamlines read more…
Security operations needs context awareness to ensure the success of business initiatives in a world of advanced, targeted attacks. Netenrich empowers security, IT and cloud operations to thrive during adversity with adaptive incident resolution using real time, data driven risk and trust-based decision making. The Netenrich Resolution Intelligence platform streamlines the process of managing, analyzing, and fixing the root cause of incidents to prevent future disruption.
Bio

Christopher Morales

CISO and Head of Security Strategy Netenrich

Sponsored by

Presentation

2:45 pm

Getting Ahead of the Ransomware Operations Lifecycle

The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to read more…

The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to include associated initial access techniques, ransomware-related business models, and our newest data around monetization schemes being leveraged by the eCrime extortion community. Lastly, CrowdStrike will close by proposing actionable recommendations that organizations can undertake in order to harden their cybersecurity environment against the ransomware threat.

Bio

Jason Rivera

Director, Strategic Threat Advisory Group, Global CrowdStrike

Sponsored by

Presentation

3:30 pm

Leveraging IAM for Effective and Efficient Threat Mitigation

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.Faced with the challenge of managing identities and securing access to data and applications from a growing read more…
There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business
Bio

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin

Sponsored by

Presentation

4:00 pm

Navigating Your XDR Strategy with AI Prevention First Approach

With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations.  Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can read more…

With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations.  Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can improve your security posture focusing on an XDR directional position.

Bio

Todd Berger

Head of Solution Engineering AMERs BlackBerry

Sponsored by

Presentation

4:35 pm

Securing Trust - How The Security Leader Enables Business Outcomes

What is the value of trust for a company, and what role does a security leader play to enable it? Join Advisory CISO Helen Patton in this informative session, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and read more…

What is the value of trust for a company, and what role does a security leader play to enable it? Join Advisory CISO Helen Patton in this informative session, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.

Bio

Helen Patton

Advisory CISO Cisco at Duo Security

Sponsored by

5:05 pm

Closing Remarks