Detroit, MI (Central Region)
Wednesday, January 20, 2021
Virtual
Keynote Speaker
“Incident Response Planning: The Missing Runbook”
Ashley Ferguson
President & Managing Member Cyber Investigations & Intelligence Agency (CI2A)
Ashley Ferguson is President & Managing Member of Cyber Investigations & Intelligence Agency (CI2A), creators of the world’s first comprehensive CyberVIP® Protection Framework. Ashley brings almost two decades of risk management, compliance, privacy, and security experience to CI2A across the fields of information technology, oil and gas, utilities, financial services, healthcare, retail, legal and entertainment. Ashley utilizes her unique multi- industry combination of risk management, compliance, security, privacy, and business resilience experience to help her peers and clients to build effective and risk appropriate security programs that result in compliance, but are not driven by compliance. Ashley has helped numerous clients to not only create effective programs, but also learn how to effectively communicate with their Board of Directors, gain the support of their executive peers, build confidence within their teams, and reduce both their organizational and individual cybercrime exposure.
Prior to CI2A, Ashley was the Global Director of Advisory Services including the Executive Advisory, Governance, Risk & Compliance (GRC) and the Security Architecture & Design (SDA) practices at Dell SecureWorks. In this role, Ashley was responsible for the strategic direction, vision, and alignment of these practices globally and the founder of the Executive Advisory Center, Advisory CISO and Executive & Board Advisory service portfolios.
Prior to Dell SecureWorks, Ashley spent almost six years leading the IT Risk Management and Security program at Energen Corporation. In this role, Ashley was responsible for all IT Security, Access Provisioning, Change Management, Quality Assurance, Data Loss Prevention, Data Privacy, Business Continuity, Risk Management and Compliance for Energen Corporation and all subsidiaries. While at Energen, Ashley served as a part of the American Gas Association’s Cybersecurity Strategy Force, assisting the Department of Energy in the development of the NIST Cybersecurity Implementation Guidance for the Energy Sector. Prior to Energen, Ashley was the Vice President and Manager of Business Continuity at BBVA Compass and an IT auditor and controls specialist for PricewaterhouseCoopers LLP and Ernst & Young, LLP.
Ashley received her Bachelor of Science degree in Accounting from the University of Alabama Culverhouse School of Accountancy and a Master’s in Business Administration from Tennessee Technological University with a concentration in Management Information Systems. Ashley is a Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) and a Certified Data Privacy Solutions Engineer (CDPSE).
Ashley has been an avid speaker and contributor to the Evanta executive programs across multiple regions, including serving as Co-Chair of the Evanta Charlotte CXO Summits, past Governing Body Member for the Evanta Atlanta CISO Summits and as a CISO contributor to the Professional Development Academy. Ashley has also served as a past judge and co-Master of Ceremonies for the Information Security Executive (ISE) Southeast Awards, speaker at Dell EMC World, RSA, Goldman Sachs CTO Conferences, the feature speaker in the Security in the Boardroom Webcast series, and keynote speaker at the 2019 Global Cyber FinTech Conference.
Ashley serves on numerous industry and non-profit boards and is currently Chairman of the Board of the University of Alabama Culverhouse Cyber Executive Board of Advisors, Chairman of the SCS Education Foundation Board and Past Chairman of the Board of the American Red Cross Mid Alabama Region. Ashley was the 2013 Information Security Executive (ISE) Southeast People’s Choice Winner, a top eight finalist for the 2013 Southeast Executive of the Year, a nominee for 2013 Information Security Executive North America Executive of the Year and a finalist for the 2020 ATP Startup Disruptor Award. Ashley has been featured in various publications, including the October 2015 issue of the ISSA Journal’s Women in Security.
Chris Bullock
CEO | CISO and Managing Member Cyber Investigations & Intelligence Agency (CI2A)
Chris Bullock is CEO & Managing Member of Cyber Investigations & Intelligence Agency (CI2A). After Chris reduced his successful and decorated ten-year, full-time law enforcement career to part-time in 1996, he moved into a successful private sector cybersecurity career. Chris earned his Associate of Applied Science in Electronic Technology and his Bachelor’s in Criminal Justice. Chris graduated Cum Laude. Chris holds multiple certifications including Certified Information Security Systems Professional (CISSP), Certified Computer Forensic Technician (CCFT), Certified Computer Examiner (CCE), GIAC Web Application Penetration Tester (GWAPT), Certified Cyber Crime Examiner (CCCE) and is a Georgia Cyber Safety Initiative Instructor (GaCSI). Chris has held several executive level security positions in his private sector career across several large, Atlanta based companies subsequently building and maturing their cybersecurity programs.
Chris combines and utilizes his unique hybrid of experience and training in criminal intelligence, cyber threat intelligence, specialized technologies, executive management, and law enforcement to build award-winning and effective cybersecurity programs and to protect companies’ most valuable trade secrets and sensitive customer and employee data. Chris has built several large cybersecurity programs from the ground up and has experience across many verticals, including retail, financial, energy, government, gaming, healthcare, and sports entertainment. Chris created and managed the first information security program for the Georgia Lottery Corporation between 2009 -2011 and was voted 85th Top Ranking CISO in the United States in 2012 by ExecuRank. Chris created the first Cyber Executive Protection Programs uniquely combining his technical, investigative, executive protection and executive cyber security management expertise into highly effective cyber executive protection programs. Chris also has experience as a Managing Principal for one of the largest and respected global cyber security consulting firms where he advised Chief Information Security Officers (CISOs) globally on facets of their job duties, how to effectively report to their Board of Directors, and how to create, implement and mature effective cyber security programs. Chris has been nominated several times for the T.E.N. ISE Security Executive of the Year award.
Chris has previously served as a Board of Directors member with the National Technology Security Coalition (NTSC) as well as several other governing body roles within cyber security-focused organizations including Evanta and has spoken at major security events and conferences including Secure World, FBI InfraGard, HTCIA, and the CISO Summit. Chris also enjoys contributing to the tradecraft by writing articles on cybersecurity and has been featured in publications including Security Current, CSO Online, and PenTest Magazine. Chris has participated as a guest speaker in the Evanta Leadership Development Academy and was featured as an Evanta “Breakaway Leadership Profile” spotlight in 2016. Chris is a charter member of the International Association of Cyber and Economic Crime Professionals through the National White Collar Crime Center (‘NW3C’).
Chris has experience managing multimillion-dollar budgets and is an experienced and seasoned penetration tester, computer forensics/e-discovery, intelligence, and incident response specialist. Chris still commits a significant amount of his free time working as a certified and sworn active reserve police investigator and is attached as an affiliate member of a statewide task force with the Georgia Bureau of Investigation performing investigations, and special operations to arrest and convict criminals who prey on and exploit children. Chris also volunteers and helps educate the community by teaching parents and children about cyber safety and is certified as a GaCSI Instructor under the Georgia Cyber Safety Initiative program. Chris has extensive physical security and executive protection experience, is SWAT qualified, and served for years on an advanced tactical team with a Georgia law enforcement agency.
A Special “Chat with Dr. Chase Cunningham”
Dr. Chase Cunningham
Dr. Zero Trust Chief Strategy Officer, Ericom Software
Interactive conversation with audience on the 2021 journey in cyber and talk about some of the predictions that have been made
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Live
Opening Introductions
Networking
Sponsor Virtual Booth Networking Time
Live Presentation
Cybersecurity and cyber resilience: It's an evolution
Cyber security and cyber resilience are often used interchangeably. While they are related, they’re far from being synonyms, and it’s crucial for everyone to understand the difference. In practical terms, a cyber-resilient organization assumes that at some point it will be successfully attacked. We must adapt to this reality and still enable the business to operate. Stan will get into the distinctions between what we know and how we can evolve to a more resilient state.
Sponsored by
Live Presentation
How to Detect Common Threats Targeting Your Cloud Infrastructure
Join Amanda Berlin, Sr. Incident Detection Engineer at Blumira for a discussion on common cloud security detections and how to detect threats targeting your cloud infrastructure.
In this talk, you’ll learn about:
- Different types of attacks targeting cloud infrastructure platforms like Microsoft Azure, Office 365, Okta, G Suite and Amazon Web Services
- Common vulnerabilities that may lead to a compromise
- How to properly detect cloud-related misconfigurations and potential threats to reduce your overall attack surface
Sponsored by
Keynote
Incident Response Planning: The Missing Runbook
Sponsored by
Presentation
CIAM in an Uncertain World
In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner. That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and compliance standards, but also create frictionless customer experiences to meet customers where they are and in the ways they need. Join our sessions as we discuss CIAM in more detail, how priorities have shifted this year and what CIAM maturity looks like.
Sponsored by
Live Interactive Session
A Special “Chat with Dr. Chase Cunningham”
Interactive conversation with audience on the 2021 journey in cyber and talk about some of the predictions that have been made
Presentation
Seeing the forest through the trees - A risked based approach to maturing your VMP
Sponsored by
Presentation
Transitioning DNS from IT Utility to Security Strategy
Sponsored by
Presentation
Ransomware: It's Still a Big Deal
Sponsored by
Presentation
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.
In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI
Sponsored by
Presentation
Making Zero Trust Real
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.