Detroit, MI (Central Region)
Wednesday, January 20, 2021
Virtual
Keynote Speakers
“Incident Response Planning: The Missing Runbook”
Ashley Ferguson
President & Managing Member Cyber Investigations & Intelligence Agency (CI2A)
Ashley Ferguson is President & Managing Member of Cyber Investigations & Intelligence Agency (CI2A), creators of the world’s first comprehensive CyberVIP® Protection Framework. Ashley brings almost two decades of risk management, compliance, privacy, and security experience to CI2A across the fields of information technology, oil and gas, utilities, financial services, healthcare, retail, legal and entertainment. […]
Chris Bullock
CEO | CISO and Managing Member Cyber Investigations & Intelligence Agency (CI2A)
Chris Bullock is CEO & Managing Member of Cyber Investigations & Intelligence Agency (CI2A). After Chris reduced his successful and decorated ten-year, full-time law enforcement career to part-time in 1996, he moved into a successful private sector cybersecurity career. Chris earned his Associate of Applied Science in Electronic Technology and his Bachelor’s in Criminal Justice. […]
A Special “Chat with Dr. Chase Cunningham”
Dr. Chase Cunningham
Dr. Zero Trust Chief Strategy Officer, Ericom Software
Interactive conversation with audience on the 2021 journey in cyber and talk about some of the predictions that have been made
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Live
Opening Introductions
Networking
Sponsor Virtual Booth Networking Time
Live Presentation
Cybersecurity and cyber resilience: It's an evolution
Cyber security and cyber resilience are often used interchangeably. While they are related, they’re far from being synonyms, and it’s crucial for everyone to understand the difference. In practical terms, a cyber-resilient organization assumes that at some point it will be successfully attacked. We must adapt to this reality and still enable the business to operate. Stan will get into the distinctions between what we know and how we can evolve to a more resilient state.
Sponsored by
Live Presentation
How to Detect Common Threats Targeting Your Cloud Infrastructure
Join Amanda Berlin, Sr. Incident Detection Engineer at Blumira for a discussion on common cloud security detections and how to detect threats targeting your cloud infrastructure.
In this talk, you’ll learn about:
- Different types of attacks targeting cloud infrastructure platforms like Microsoft Azure, Office 365, Okta, G Suite and Amazon Web Services
- Common vulnerabilities that may lead to a compromise
- How to properly detect cloud-related misconfigurations and potential threats to reduce your overall attack surface
Sponsored by
Keynote
Incident Response Planning: The Missing Runbook
Sponsored by
Presentation
CIAM in an Uncertain World
In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner. That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and compliance standards, but also create frictionless customer experiences to meet customers where they are and in the ways they need. Join our sessions as we discuss CIAM in more detail, how priorities have shifted this year and what CIAM maturity looks like.
Sponsored by
Live Interactive Session
A Special “Chat with Dr. Chase Cunningham”
Interactive conversation with audience on the 2021 journey in cyber and talk about some of the predictions that have been made
Presentation
Seeing the forest through the trees - A risked based approach to maturing your VMP
Sponsored by
Presentation
Transitioning DNS from IT Utility to Security Strategy
Sponsored by
Presentation
Ransomware: It's Still a Big Deal
Sponsored by
Presentation
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.
In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI
Sponsored by
Presentation
Making Zero Trust Real
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.