Denver, CO
Wednesday, May 11, 2022
Hybrid
Keynote Speaker
“Welcome to the Dark Side, we own EVERYONE’S Cookies...”
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Trent Bunnell
Information System Security Officer SAIC
Al Gardner
Vice President Information Technology Salud Family Health Centers
Chris Roberts
vCISO, Researcher, Hacker, Consultant, Devil’s Advocate HillBilly Hit Squad
Parker Brissette
vCISO - Cybersecurity Advisor Richey May
Steve Winterfeld
Advisory Chief Information Security Officer Akamai Technologies
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Conducting forensic investigations in a zero-trust environment.
and agencies. Within the United State government agencies, and those doing business with government agencies have been mandated to adopt a zero-trust level of security by 2024. This presentation will cover what Zero-Trust is, how it may impact the legitimate security work being carried out by you, and how investigations may be carried out in a Zero-Trust environment.
Sponsored by
Presentation
Seize The Breach: Why breaches still occur and how to mitigate them
Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:
- Why breaches are usually occurring
- How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
- A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Monitoring RUSSIAN Cyber Activities
What three things you should do to prepare your defenses:
Keeping our customers safe and protected is our highest priority. The US Federal Gov’t recently issued a warning to the private sector to harden their cyber security infrastructure and defenses based on new intelligence around potential Russia cybersecurity attacks.
What can you do to prepare?
There is no way to know for certain what an attack may look like, but you can prepare. Join us on and learn what three steps you should immediately take to protect your networks and infrastructure.
Sponsored by
Presentation
Fast and Furious Attacks: Using AI to Surgically Respond
Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join Nicholas Cantoni, Darktrace’s US-West Cyber Security Team Lead, to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.
Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Welcome to the Dark Side, we own EVERYONE’S Cookies...
There you are! So, how’s it going? Good?
Y’all caught up on your awareness training?
Know what to click and what to avoid?
Figured out your passwords yet? (Summer20201! Doesn’t count)
Sorted out the OWASP top 10 yet?
Great!
So, feeling all good, protected, ready to fight the good fight, and do battle?
Splendid…
What if I told you it doesn’t make a damm difference…?
Really.
Like, not a difference. I mean you get that warm fuzzy feeling, and we all get a check in the audit box and go along on our merry way and feel good about things…
But it’s not going to change a damm thing.
Your ass belongs to me, and there’s nothing you can do to stop me from getting in.
Our record (March 2021) for breaking into a fully patched, XDR, UBA, NGFW, ABC, AI, ML target was 2 minutes and 6 seconds…
Our record for breaking through your web application with its containers, dockers, WAF’s and MFA’s…. about 5 minutes and that’s only because we got lost in the Amazon along the way…
So, now we’ve burst your bubble and introduced you to reality what CAN you do? What SHOULD you be doing? AND how can you reduce risks in the digital realm? WHERE is it most effective to build out security AND what the hell DO you do to make sure when I’m inside you know I’m there AND can do something about it BEFORE I wander off with all YOUR data, leaving behind a nice set of ransomed systems with an I-love-you note for $10m
Oh, and all of this is yesterday. Today we’re dealing with human hacking, tomorrow we must worry about the very fabric of space and time
Join us for a thought-provoking discussion
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Continuous Breach Attack Simulation - A Pragmatic Approach to Your Security Portfolio
Avi Avivi, SafeBreach Chief Information Security Officer, looks at some guiding principles that make a case for using continuous breach attack simulation as one of the best ways to test and exercise your security posture. He examines the notion of abiding by the spirit of the compliance framework vs. the letter of that framework.
Sponsored by
Presentation
Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The importance of understanding and knowing what’s in your software supply chain
Modern software applications and products are assembled from dozens if not hundreds of components, many of which nowadays are open-source projects. Vulnerabilities like Log4J and Spring4Shell that came to light this year reinforce the need for organizations to rapidly mature the security of their software supply chains. The software industry is still early in our collective adoption of mature software supply chain controls. In this talk, Mr. Wisseman will share some of the best practices that organizations can take to mitigate their software supply chain exposure.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!