Detroit, MI

Wednesday, April 6, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Seize The Breach: Why breaches still occur and how to mitigate them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that read more…

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Bio

Ben Burkholder

Senior Sales Engineer Exabeam

Sponsored by

Presentation

9:30 am

Demystifying Zero Trust and its Role in Cybersecurity

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, why businesses are adopting it, and how this technology protects your business from malware and other malicious cyber threats.

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, why businesses are adopting it, and how this technology protects your business from malware and other malicious cyber threats.

Bio

Ryan Bowman

Director of Solutions Engineering ThreatLocker

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Mystery of the 8 Second Breach

How is it that when the average time it takes to detect and contain a breach is 230 days, a contractor to AmeriGas was able to address theirs in 8 seconds?   This presentation will compare and contrast two breaches that have been reported on publicly in 2021 to identify read more…

How is it that when the average time it takes to detect and contain a breach is 230 days, a contractor to AmeriGas was able to address theirs in 8 seconds?

 

This presentation will compare and contrast two breaches that have been reported on publicly in 2021 to identify how each took a different approach to security, and how those approaches yielded differing results. Using the NIST CSF as a model for discussing these different approaches, the presentation will make the case for rebalancing security spending to emphasize detection and remediation capabilities, and look at how as an industry we in information security have conditioned ourselves to focus on prevention to the detriment of most of the other domains in the NIST CSF.

In addition, the presentation will touch on the problems with paying ransoms, and the limitations of cyber insurance as a curative measure.

Bio

Bill Bernard

AVP, Security Strategy deepwatch

Sponsored by

Presentation

11:00 am

Rise of the Humans

The bad behavior of end users is a celebrated cliche in the world of Security. Despite spending BILLIONS of dollars on education and awareness, phishing and social engineering attacks remain the number one threat vector for cyber attacks. Meanwhile, the world of security tools and services relies increasingly on Artificial Intelligence read more…

The bad behavior of end users is a celebrated cliche in the world of Security. Despite spending BILLIONS of dollars on education and awareness, phishing and social engineering attacks remain the number one threat vector for cyber attacks. Meanwhile, the world of security tools and services relies increasingly on Artificial Intelligence and automation to supplant the inefficiencies unavailability of human security analysts. But WHAT IF this wholesale discounting of the human factor is the true vulnerability in our security philosophies? Emerging security services and studies are demonstrating that human-led security training AND human-led A.I tools provide the greatest success for security programs. This talk examines some telling statistics along with compelling anecdotal evidence around the importance of human-machine integration in security operations.

Bio

Chris Pittman

Systems Engineer, Presales, Senior Arctic Wolf

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Presentation

11:45 am

Fast and Furious Attacks: Using AI to Surgically Respond

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Just Fier, Director of Cyber Intelligence & Analytics, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack read more…
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Just Fier, Director of Cyber Intelligence & Analytics, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
Bio

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace

Sponsored by

Keynote

12:15 pm

"Cybersecurity Horizons & The Evolution of the CISO Role"

Bio

Arun DeSouza

Chief Information Security Officer Profortis Solutions

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next read more…

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

2:15 pm

Optimizing the Human Element in Cybersecurity

Bio

Tanner Howell

Sr. Director of Solutions Engineering RangeForce

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Protecting Your Email and Office 365 Environment

Whether its “Shields Up” warnings from the US government, or daily concerns over ransomware, phishing attacks, and account takeover attempts, in today’s hyper-connected world, elevated risk is everywhere.  Barracuda Networks will share the latest threat intelligence, including most recent trends in social engineering, the current methods being used to trick read more…

Whether its “Shields Up” warnings from the US government, or daily concerns over ransomware, phishing attacks, and account takeover attempts, in today’s hyper-connected world, elevated risk is everywhere.  Barracuda Networks will share the latest threat intelligence, including most recent trends in social engineering, the current methods being used to trick victims, and the best practices to protect your business from these evolving attacks.

Bio

Mike Gorman

Consulting Solutions Architect Barracuda

Sponsored by

Presentation

3:30 pm

CNAPP – Finding the worst security risks

Bio

Mike Griffin

Solutions Engineer Wiz

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Douglas Lubahn

VP Threat Intelligence BlackFog
Bio

Earl Duby

Vice President and CISO Lear Corporation
Bio

Wallace Dalrymple Jr

Chief Information Security Officer Emerging Markets BCBS Michigan
Bio

Christy Wheaton

VP, Chief Information Security Officer Henry Ford Health System

Closing Remarks

5:15 pm

Closing Remarks

Share This