Detroit, MI
Thursday, February 15, 2024
Hybrid
Join FutureCon CyberSecurity Events in Detroit!
This event is the perfect opportunity to discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.
Fireside Chat
"Emerging Cyber Trends and the Security & Privacy Risk Nexus"
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Arun DeSouza
Chief Information Security Officer Profortis Solutions
Kristie Pfosi
Sr. Director Enterprise Security (CISO) Delta Faucet Company
EJ Widun
Chief Technology Officer Oakland County, Michigan Government
Hemanth Tadepalli
Cybersecurity Compliance Engineer May Mobility
Roni Ahmed
Chief Technology Officer MISS DIG 811
Sponsors
Gold Sponsors
Silver Sponsors
Partner
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The What, Who For, and Why of MXDR
In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments
Sponsored by
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Sponsor Networking Time
Presentation
The Balance Between Data Use and Data Security
Sponsored by
Presentation
Moving towards a Zero Trust Mindset
Sponsored by
Sponsor Networking Time
Lunch
Fireside Chat
"Emerging Cyber Trends and the Security & Privacy Risk Nexus"
Sponsor Networking Time
Exposure Management - Just another buzzword? Or, a crucial strategy for mitigating risks and ensuring organizational resilience?
This presentation explores the imperative need for a robust Cyber Exposure Management Program as a proactive strategy to mitigate cyber risks and fortify organizational resilience
Sponsored by
Presentation
Data Security in a Hybrid World
The title “Why is critical data being compromised?” delves into the persistent issue of data breaches that make headlines regularly. Despite companies investing considerable resources in addressing this problem, critical data remains vulnerable. This inquiry aims to unravel the reasons behind the ongoing challenges in securing sensitive information. By scrutinizing the root causes, we seek to identify crucial aspects that demand a company’s attention
Sponsored by
Sponsor Networking TIme
Presentation
AI for Security
Sponsored by
Presentation
It's All About Readiness: Why You've Been Doing Cyber Training Wrong
- How people learn new skills, and why some methods are better than others
- Why traditional tech training and certs aren’t adequate
- The keys to building an effective cyber training program