Detroit, MI
Wednesday, April 6, 2022
Hybrid
Keynote Speaker
“"Cybersecurity Horizons & The Evolution of the CISO Role"”
Arun DeSouza
Chief Information Security Officer Profortis Solutions
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Opening Introductions | Check In | Networking
Presentation
Seize The Breach: Why breaches still occur and how to mitigate them
Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:
- Why breaches are usually occurring
- How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
- A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Sponsored by
Presentation
Demystifying Zero Trust and its Role in Cybersecurity
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, why businesses are adopting it, and how this technology protects your business from malware and other malicious cyber threats.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Mystery of the 8 Second Breach
How is it that when the average time it takes to detect and contain a breach is 230 days, a contractor to AmeriGas was able to address theirs in 8 seconds?
This presentation will compare and contrast two breaches that have been reported on publicly in 2021 to identify how each took a different approach to security, and how those approaches yielded differing results. Using the NIST CSF as a model for discussing these different approaches, the presentation will make the case for rebalancing security spending to emphasize detection and remediation capabilities, and look at how as an industry we in information security have conditioned ourselves to focus on prevention to the detriment of most of the other domains in the NIST CSF.
In addition, the presentation will touch on the problems with paying ransoms, and the limitations of cyber insurance as a curative measure.
Sponsored by
Presentation
Rise of the Humans
The bad behavior of end users is a celebrated cliche in the world of Security. Despite spending BILLIONS of dollars on education and awareness, phishing and social engineering attacks remain the number one threat vector for cyber attacks. Meanwhile, the world of security tools and services relies increasingly on Artificial Intelligence and automation to supplant the inefficiencies unavailability of human security analysts. But WHAT IF this wholesale discounting of the human factor is the true vulnerability in our security philosophies? Emerging security services and studies are demonstrating that human-led security training AND human-led A.I tools provide the greatest success for security programs. This talk examines some telling statistics along with compelling anecdotal evidence around the importance of human-machine integration in security operations.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Presentation
Fast and Furious Attacks: Using AI to Surgically Respond
Sponsored by
Keynote
"Cybersecurity Horizons & The Evolution of the CISO Role"
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Sponsored by
Presentation
Optimizing the Human Element in Cybersecurity
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Protecting Your Email and Office 365 Environment
Whether its “Shields Up” warnings from the US government, or daily concerns over ransomware, phishing attacks, and account takeover attempts, in today’s hyper-connected world, elevated risk is everywhere. Barracuda Networks will share the latest threat intelligence, including most recent trends in social engineering, the current methods being used to trick victims, and the best practices to protect your business from these evolving attacks.
Sponsored by
Presentation
CNAPP – Finding the worst security risks
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!