About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
David Hunt is the CTO of Prelude. David specializes in building teams which bridge cybersecurity with best-practice technology. Before coming to Prelude, David spent two years at MITRE Corporation in a dual-role as head developer and project lead for the CALDERA adversary emulation framework. David designed CALDERA v2 from the ground up and instrumented a plan which made it the industry leader in open-source breach and simulation. Prior to this work, David spent 15 years in offensive security and management roles, ranging organizations like Rockwell Collins, John Deere, Kenna Security and FireEye. While at FireEye, David personally oversaw the storage and access of Mandiant’s threat intelligence data, as the leader of the (then secretive) Nucleus team. Over the years, David has also worked as a contractor for several U.S. intelligence agencies, working domestically and internationally, as a principal security specialist.
Premier Platinum Sponsors
Times are subject to change
Rise of Secure Access Service Edge (SASE)
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:
- The core components of a SASE platform like Bitglass.
- The functionality you need to secure cloud, web, and remote access use cases. Architectural considerations you should keep in mind when comparing SASE vendors.
Modern Security Programs – IT Evolution to Security Revolution
The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.
What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.
Future-proof your red team.
As definitions go, what constitutes as a red team is a hotly debated topic in cybersecurity. And just as controversial is the topic of red team automation. Is it possible to automate a red team? Or are only defensive (blue) tools intended to be automated? And just why is automated red teaming such a heated topic in the industry?
In this talk, I will answer these questions by examining the role of offensive security in an organization’s Standard Operating Procedures. Describing red teaming by its functional role will help us better understand where and when automation plays a role today – and pinpoint where it may accelerate in the future.
Conquering Cyber Risk in 3rd Party Communications
The Enterprise Content Firewall
To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.
“Global Cyber Trends and Predictions for 2022”
A forward look at global breaking trends and predictions in cybersecurity.
Protecting Your Organization from the Business of Ransomware
Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative?
Join this session to learn more about:
- The business of ransomware
- The evolving threat landscape
- Ransomware Protection Tactics and Techniques
- Your Security Roadmap for Hybrid and Remote Workers
- Leveraging an EDR with Limited Security Staff
Building a Response Strategy to Advanced Threats
Cyber Resilience for Digital Operations
Getting Ahead of the Ransomware Operations Lifecycle
The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to include associated initial access techniques, ransomware-related business models, and our newest data around monetization schemes being leveraged by the eCrime extortion community. Lastly, CrowdStrike will close by proposing actionable recommendations that organizations can undertake in order to harden their cybersecurity environment against the ransomware threat.
Leveraging IAM for Effective and Efficient Threat Mitigation
Navigating Your XDR Strategy with AI Prevention First Approach
With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations. Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can improve your security posture focusing on an XDR directional position.
Securing Trust - How The Security Leader Enables Business Outcomes
What is the value of trust for a company, and what role does a security leader play to enable it? Join Advisory CISO Helen Patton in this informative session, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.