About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
Hear from cybersecurity leaders and experts on current cyber threats and practices
Premium Platinum Sponsors
Sponsor Virtual Booth Networking Time
Going Passwordless: Buzzword or Reality?
“Passwordless” is a fashionable term in cybersecurity, with its usage increasing as the field advances. But is it a conceivable reality, or just a pipedream?
In this presentation, we will discuss what passwordless means, the empowering abilities of a passwordless solution, and some common misconceptions surrounding the technology. We will also cover:
- The chronic pain and agony of passwords that we’ve all grown accustomed to
- Questions to ask yourself regarding your current authentication practices
- Viewing authentication as a continuum vs. a single binary event
- The challenges and latest best practices for state-of-the-art authentication
- The sheer delight of replacing your passwords with a highly secure and frictionless alternative
- How to phase in passwordless auth in an environment that still uses passwords
Making access management secure, scalable and fun!
With 37% of breaches in 2019 using compromised credentials and 30% involving internal actors, privileged accounts are one of the biggest attack vectors in almost every organization. Access management is a demonstrably critical issue, and yet most companies struggle to do it right. By manually granting and revoking permissions, teams end up with security policies scattered across documents, tickets, and configuration files. This is how most organizations become incapable of deriving a holistic view of their security status.
We discuss how recent shifts in the development process can be applied in a security context to address these challenges. Strategies such as Policy as Code and ChatOps make access management granular, auditable, and agile, thus enabling teams to establish proper security posture without all the headache.
Ideal access control systems enable granular access control and effective auditing without obstructing day to day operations.
Policy as Code leverages version control and code generation to encourage minimum privileges and enable teams to review the who, what, when, and why of access control changes.
ChatOps tools remove bottlenecks by empowering individuals to interact with their organization’s systems in a familiar way while leveraging messaging interfaces for auditability.
Trust No Longer Exists As You Know It
Traditional trust models have failed us. Frameworks are just a panacea that mask a bigger problem. What happens when a determined adversary analyzes human weakness in order to exploit vulnerabilities in technology? SUNBURST and SolarWinds. Was this a failure of cybersecurity, or a failure of imagination? Could this be a prelude to war enabled by a massive intelligence failure, or just a black swan? It’s time to question everything we believe in order to create a lasting solution.
Conquering Cyber Risk in 3rd Party Communications
The Enterprise Content Firewall
To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.
Live Panel Discussion
CISO Panel: Hear from cybersecurity leaders and experts on current cyber threats and practices
Hear from cybersecurity leaders and experts on:
- Current cybersecurity threats and practices
- Post-pandemic security
Threat Hunting and the Rise of Targeted eCrime Intrusions
The term threat hunting has frequently been thrown around in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? How would an organization start doing threat hunting? In this session, Jason will dive into what threat hunting means and how you can use it to actively find intrusions. We will examine threat hunting techniques executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplished, and how the threat actors attempted to avoid discovery.
Building Cyber Resilience: Finding Factors not Fault
Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT
Arm Your Security Team Against Advanced Attacks with XDR
Many security teams are overwhelmed by the sheer volume of security alerts with no clear path to resolution. Security analysts, working in small teams and with smaller budgets, are often presented with more alerts than are humanly possible to triage and investigate, granting adversaries more time to evade detection because of the time required analyze and respond to threats. In this presentation, our COO, Jerry Mancini, discusses using integrated and automated platforms like eXtended Detection and Response (XDR) solutions to increase ROI, reduce alert fatigue, and automate response to detected threats.
5 Critical Pillars for the SOC of the Future
This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
- Threat intelligence
- Threat research
- Detection engineering
- Incident handling
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.