Eastern-January

Wednesday, January 13, 2021

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions

Networking

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am

Going Passwordless: Buzzword or Reality?

“Passwordless” is a fashionable term in cybersecurity, with its usage increasing as the field advances. But is it a conceivable reality, or just a pipedream? In this presentation, we will discuss what passwordless means, the empowering abilities of a passwordless solution, and some common misconceptions surrounding the technology. We will also cover: The chronic pain and agony of passwords that we’ve all read more…

“Passwordless” is a fashionable term in cybersecurity, with its usage increasing as the field advances. But is it a conceivable reality, or just a pipedream?

In this presentation, we will discuss what passwordless means, the empowering abilities of a passwordless solution, and some common misconceptions surrounding the technology. We will also cover:

  • The chronic pain and agony of passwords that we’ve all grown accustomed to
  • Questions to ask yourself regarding your current authentication practices
  • Viewing authentication as a continuum vs. a single binary event
  • The challenges and latest best practices for state-of-the-art authentication
  • The sheer delight of replacing your passwords with a highly secure and frictionless alternative
  • How to phase in passwordless auth in an environment that still uses passwords
Bio

Shahrokh Shahidzadeh

CEO Acceptto
Bio

Alan Krassowski

VP of Technology Acceptto

Sponsored by

Live Presentation

9:40 am

Making access management secure, scalable and fun!

With 37% of breaches in 2019 using compromised credentials and 30% involving internal actors, privileged accounts are one of the biggest attack vectors in almost every organization. Access management is a demonstrably critical issue, and yet most companies struggle to do it right. By manually granting and revoking permissions, teams read more…

With 37% of breaches in 2019 using compromised credentials and 30% involving internal actors, privileged accounts are one of the biggest attack vectors in almost every organization. Access management is a demonstrably critical issue, and yet most companies struggle to do it right. By manually granting and revoking permissions, teams end up with security policies scattered across documents, tickets, and configuration files. This is how most organizations become incapable of deriving a holistic view of their security status.

We discuss how recent shifts in the development process can be applied in a security context to address these challenges. Strategies such as Policy as Code and ChatOps make access management granular, auditable, and agile, thus enabling teams to establish proper security posture without all the headache.

Key Takeaways

  • Ideal access control systems enable granular access control and effective auditing without obstructing day to day operations.

  • Policy as Code leverages version control and code generation to encourage minimum privileges and enable teams to review the who, what, when, and why of access control changes.

  • ChatOps tools remove bottlenecks by empowering individuals to interact with their organization’s systems in a familiar way while leveraging messaging interfaces for auditability.

Bio

Timothy Nguyen

Engineering Lead Cyral

Sponsored by

Live Keynote

10:30 am

Trust No Longer Exists As You Know It

Traditional trust models have failed us. Frameworks are just a panacea that mask a bigger problem. What happens when a determined adversary analyzes human weakness in order to exploit vulnerabilities in technology? SUNBURST and SolarWinds. Was this a failure of cybersecurity, or a failure of imagination? Could this be a read more…

Traditional trust models have failed us. Frameworks are just a panacea that mask a bigger problem. What happens when a determined adversary analyzes human weakness in order to exploit vulnerabilities in technology? SUNBURST and SolarWinds. Was this a failure of cybersecurity, or a failure of imagination? Could this be a prelude to war enabled by a massive intelligence failure, or just a black swan? It’s time to question everything we believe in order to create a lasting solution.

Bio

Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne

Sponsored by

Live Presentation

11:45 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can read more…

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot Bio

Bob Ertl

Sr. Director, Product Marketing Accellion

Sponsored by

Live Panel Discussion

12:10 pm

CISO Panel: Hear from cybersecurity leaders and experts on current cyber threats and practices

Hear from cybersecurity leaders and experts on: Current cybersecurity threats and practices Post-pandemic security

Hear from cybersecurity leaders and experts on:

    • Current cybersecurity threats and practices
    • Post-pandemic security
Laureen Smith headshot Bio

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications
Bio

Gerald Beuchelt

Chief Information Security Officer LogMeIn, Inc.
Bio

Alicia Lynch

Senior Vice President, Chief Information Security Officer Cognizant
Bio

Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne
Bio

Gregory Crab

Vice President, Chief Information Security Officer U.S .Postal Service

Sponsored by

1:25 pm

Threat Hunting and the Rise of Targeted eCrime Intrusions

The term threat hunting has frequently been thrown around in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? How would an organization start doing threat hunting? In this session, Jason will dive into what read more…

The term threat hunting has frequently been thrown around in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? How would an organization start doing threat hunting? In this session, Jason will dive into what threat hunting means and how you can use it to actively find intrusions. We will examine threat hunting techniques executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplished, and how the threat actors attempted to avoid discovery.

Bio

Jason Wood

Senior Tactical Intelligence Researcher CrowdStrike

Sponsored by

On-Demand Presentation

1:55 pm

Building Cyber Resilience: Finding Factors not Fault

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this read more…
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Bio

Mark Sangster

Industry Security Strategist eSentire

Sponsored by

Presentation

2:35 pm

Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT

Bio

Kelsey Nelson

Security Specialist Okta

Sponsored by

Presentation

3:00 pm

Arm Your Security Team Against Advanced Attacks with XDR

Many security teams are overwhelmed by the sheer volume of security alerts with no clear path to resolution. Security analysts, working in small teams and with smaller budgets, are often presented with more alerts than are humanly possible to triage and investigate, granting adversaries more time to evade detection because read more…

Many security teams are overwhelmed by the sheer volume of security alerts with no clear path to resolution. Security analysts, working in small teams and with smaller budgets, are often presented with more alerts than are humanly possible to triage and investigate, granting adversaries more time to evade detection because of the time required analyze and respond to threats. In this presentation, our COO, Jerry Mancini, discusses using integrated and automated platforms like eXtended Detection and Response (XDR) solutions to increase ROI, reduce alert fatigue, and automate response to detected threats.

Bio

Jerry Mancini

COO Fidelis Security

Sponsored by

Presentation

3:40 pm

5 Critical Pillars for the SOC of the Future

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the read more…

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Bio

Keith McCammon

Chief Security Officer & Co-Founder Red Canary

Sponsored by

Presentation

4:10 pm

Ransomware: It's Still a Big Deal

Bio

Austin Merritt

Cyber Threat Intelligence Analyst Digital Shadows

Sponsored by

Closing Remarks

4:45 pm

Closing Remarks

Share This