Des Moines, IA (Central Region)

Wednesday, December 9, 2020

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Presentation

9:00 am

Humans are the Weakest Link – Corona Edition

Join our informative presenter Tracy Jon Sargeant at Check Point for a story of too many threat vectors to count, a story of how people make mistakes, a story with hidden twists and turns, and how persistence can pay off in a really forgettable way when it comes to Phishing read more…

Join our informative presenter Tracy Jon Sargeant at Check Point for a story of too many threat vectors to count, a story of how people make mistakes, a story with hidden twists and turns, and how persistence can pay off in a really forgettable way when it comes to Phishing and the number 81, and how a massive safe haven saves the day. Don’t worry, the story has a good ending, but you’ll need to stick around to find out.  All names will be changed to protect the innocent.

 

In this session you’ll get up to speed and current on:

– How humans are our weakest link in Corona times, in the new “Work From Anywhere” normal

– Cybersecurity “blind spots” which may have been revealed, or further disguised in Corona times

– Peek into the minds of a global Cyber research powerhouse and understand how it can benefit your security strategy

– Implications of a potential cyber “pandemic” on a different order of magnitude mirroring the biological pandemic

Bio

Tracy Jon Sargeant

Cyber Security Engineer Check Point Software Technologies

Sponsored by

Presentation

9:30 am

Effective Risk Management

Includes the methods and processes used to: manage risks and seize opportunities related to business objectives. Provides a framework to: identify threats and opportunities assess threats and opportunities in terms of likelihood and impact determine a response strategy and monitoring the process.

Includes the methods and processes used to:

  • manage risks
  • and seize opportunities related to business objectives.

Provides a framework to:

  • identify threats and opportunities
  • assess threats and opportunities in terms of likelihood and impact
  • determine a response strategy
  • and monitoring the process.
Bio

Ty Hollins

Chief Information Security Officer ProCircular

Sponsored by

Live Keynote

10:15 am

The Legacy Controls we are expected to have and are audited (i.e., firewalls, antivirus etc.)

Discussion includes     – Declining effectiveness of legacy solutions     – These are the only solutions auditors are familiar with and expect evidence from     – Declining controls in general with the growing usage of BYOD and SAAS solutions     – The increase in SAAS offerings read more…
Discussion includes
    – Declining effectiveness of legacy solutions
    – These are the only solutions auditors are familiar with and expect evidence from
    – Declining controls in general with the growing usage of BYOD and SAAS solutions
    – The increase in SAAS offerings puts companies data at higher risk (users can test and use a new solution in 30 min)
    – Data transfer between SAAS platforms no longer require IT or cyber so access
Bio

Darrell Jones

Chief Information Security Officer Tupperware

Presentation

11:30 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can read more…

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot Bio

Bob Ertl

Sr. Director, Product Marketing Accellion

Sponsored by

Live Panel Discussion

12:00 pm

Panel Discussion: Preparing for 2021 – a post-pandemic plan. Will we return to normalcy?

Everyone is anticipating to return to work at some point next year, as a CISO what does that mean for you? What will work look like? Will your job be changing? What risks will we face? Is it possible to return to the old normal?

Everyone is anticipating to return to work at some point next year, as a CISO what does that mean for you?

What will work look like? Will your job be changing? What risks will we face? Is it possible to return to the old normal?

Laureen Smith headshot Bio

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications
Bio

Mark Nardone

Chief Information Security Officer - Biological Sciences Division University of Chicago
Bio

Darrell Jones

Chief Information Security Officer Tupperware
Bio

Jack Sullivan

Global Chief Security and Resiliency Officer - Vice President Boston Scientific

Sponsored by

Presentation

1:15 pm

Seeing the forest through the trees - A risked based approach to maturing your VMP

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
Bio

Rob Walk

Sr. Security Engineer Tenable

Sponsored by

Presentation

1:45 pm

Securing the Future of Work: How Cyber AI Learns on the Job

Though parts of the world are slowly transitioning back to ‘normal’, cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges. Join Justin Fier, Darktrace’s Director of Cyber Intelligence and Analysis, as he discusses how traditional cyber security tools are ill-equipped to protect read more…

Though parts of the world are slowly transitioning back to ‘normal’, cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.

Join Justin Fier, Darktrace’s Director of Cyber Intelligence and Analysis, as he discusses how traditional cyber security tools are ill-equipped to protect today’s dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings.

In this presentation, discover how Cyber AI:
· Autonomously detects and responds to cyber-attacks in the first instance and before damage is done
· Thwarted a Covid-19 email impersonating the CEO of an electricity distributor
· Neutralized a SaaS takeover at a Panamanian bank

Bio

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace

Sponsored by

Presentation

2:20 pm

Ransomware – Sophistication you can see

Synopsis: In today’s broad threat landscape, Ransomware is a common and growing problem.  Many organizations are blind to it until it is too late.  Listen in to learn about how ransomware sophistication can actually help make it easier to see and stop in its tracks.  

Synopsis: In today’s broad threat landscape, Ransomware is a common and growing problem.  Many organizations are blind to it until it is too late.  Listen in to learn about how ransomware sophistication can actually help make it easier to see and stop in its tracks.

 

Bio

Steve Goers

Senior Solutions Architect CrowdStrike

Sponsored by

Presentation

2:50 pm

Achieving Cyber Resilience through Zero Trust

Bio

Tony Scott

Former Federal CIO of The United States and ColorTokens Board Member Colortokens

Sponsored by

Presentation

3:30 pm

Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT

Bio

Kelsey Nelson

Security Specialist Okta

Sponsored by

4:00 pm

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Closing Remarks

5:00 pm

Closing Remarks

Share This