Detroit, MI

Thursday, February 15, 2024

Hybrid

Join FutureCon CyberSecurity Events in Detroit!

This event is the perfect opportunity to discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.

Sponsors

Gold Sponsors

Silver Sponsors

Partner

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The What, Who For, and Why of MXDR

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the read more…

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments

Bio

Neal Hartsell

Chief Marketing Officer Gradient Cyber

Sponsored by

Presentation

9:30 am

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Kyle Dion

Sr. Cyber Threat Intelligence Specialist Proofpoint

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Balance Between Data Use and Data Security

Bio

Troy Gabel

AVP, North America - East Forcepoint

Sponsored by

Presentation

11:00 am

Moving towards a Zero Trust Mindset

Bio

Jeremy Kissell

Solutions Engineer Cloudflare

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Fireside Chat

12:00 pm

"Emerging Cyber Trends and the Security & Privacy Risk Nexus"

Bio

Hemanth Tadepalli

Cybersecurity Compliance Engineer May Mobility
Bio

Arun DeSouza

Chief Information Security Officer Profortis Solutions
Bio

Kristie Pfosi

Sr. Director Enterprise Security (CISO) Delta Faucet Company
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
1:30 pm

Exposure Management - Just another buzzword? Or, a crucial strategy for mitigating risks and ensuring organizational resilience?

This presentation explores the imperative need for a robust Cyber Exposure Management Program as a proactive strategy to mitigate cyber risks and fortify organizational resilience

This presentation explores the imperative need for a robust Cyber Exposure Management Program as a proactive strategy to mitigate cyber risks and fortify organizational resilience

Bio

Tara Jaques

Technical Director Tenable

Sponsored by

Presentation

2:00 pm

Data Security in a Hybrid World

The title “Why is critical data being compromised?” delves into the persistent issue of data breaches that make headlines regularly. Despite companies investing considerable resources in addressing this problem, critical data remains vulnerable. This inquiry aims to unravel the reasons behind the ongoing challenges in securing sensitive information. By scrutinizing read more…

The title “Why is critical data being compromised?” delves into the persistent issue of data breaches that make headlines regularly. Despite companies investing considerable resources in addressing this problem, critical data remains vulnerable. This inquiry aims to unravel the reasons behind the ongoing challenges in securing sensitive information. By scrutinizing the root causes, we seek to identify crucial aspects that demand a company’s attention

Bio

Kalyan Bhavanasi

Senior Solutions Architect Thales

Sponsored by

2:30 pm

Sponsor Networking TIme

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

AI for Security

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

Presentation

3:15 pm

It's All About Readiness: Why You've Been Doing Cyber Training Wrong

How do teams get—and stay—truly ready to defend against threats?When it comes to cyber readiness, traditional technical training and certs aren’t adequate solutions to ensure a strong defensive posture. So how do you keep your defenders prepared and your organization safe?In this session, attendees will learn: How people learn new read more…
How do teams get—and stay—truly ready to defend against threats?When it comes to cyber readiness, traditional technical training and certs aren’t adequate solutions to ensure a strong defensive posture. So how do you keep your defenders prepared and your organization safe?In this session, attendees will learn:
  • How people learn new skills, and why some methods are better than others
  • Why traditional tech training and certs aren’t adequate
  • The keys to building an effective cyber training program
Bio

Tanner Howell

Sr. Director of Solutions Engineering RangeForce

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Arun DeSouza

Chief Information Security Officer Profortis Solutions
Bio

Kristie Pfosi

Sr. Director Enterprise Security (CISO) Delta Faucet Company
Bio

EJ Widun

Chief Technology Officer Oakland County, Michigan Government
Bio

Hemanth Tadepalli

Cybersecurity Compliance Engineer May Mobility
Bio

Roni Ahmed

Chief Technology Officer MISS DIG 811
5:00 pm

Closing Remarks