Home / / Houston, TX (Western Region)

VIRTUAL Western CyberSecurity Conference

October 21, 2020 @ 8am PDT

(CA, TX, CO, WA, AZ)

Earn up to 9 CPE credits

 

Access the event by clicking here: https://virtual.boomset.com/

Enter your email address and create your profile. You MUST use the same email you used to register for the event, otherwise you will not be allowed to enter.

Check your email for your unique log-on only valid for your email

Tap the event’s name: VIRTUAL WESTERN CYBERSECURITY CONFERENCE

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

James M.T. Morrison

Distinguished Technologist – Cyber Security Hewlett Packard Enterprise

Lessons Learned from 2020 and what will 2021 Bring

James Morrison joined Hewlett Packard Enterprise (HPE) in December 2019 from the Federal Bureau of Investigation (FBI) as a Distinguished Technologist - Cyber Security in the office of the North America CTO.
He spent 22 years with the FBI as a Senior Computer Scientist focused on cyber security. James worked on numerous national security and criminal intrusion investigations and was active as a cyber security expert security vulnerabilities and implement solutions. He was a regional program manager for the FBI Computer Science program and directed the program towards strategic information sharing and enhanced training and mentoring programs. James was a critical member of the Adjunct Faculty Program for the FBI and taught multiple classes at Quantico and internationally. He continues to serve as an Adjunct Professor of Digital Forensics at Houston Community College. James was a member of the US Air Force for 8 years as a UNIX Administrator for satellite telemetry and command and control at Falcon AFB (now Shriever AFB) and a computer communications troubleshooter at Clark AB, Republic of the Philippines.
James graduated with a Bachelor of Science in Computer Engineering from Colorado Technical University, a Masters of Business Administration in Technical Management from the University of Phoenix, and a Masters of Art in US History from the University of New Mexico. James also holds multiple professional certifications including the Certified Ethical Hacker certificate.
He enjoys driving his Jeep on the beach, video/board games, reading, and discussing history and genealogy. He also provides online safety presentations across the Houston area to churches and schools.
James is based in Houston, Texas with his fiancée, Angela.

CISO Panel: The Security Impact of The Coronavirus

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances
Accellion

Josh Kuntz

Chief Information Security Officer
Texas Workforce Commission

Jeff Lush

Chief Information Officer
Air University at United States Air Force

Richard Rushing

Chief Information Security Officer
Motorola Mobility

Premium Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Live

8:00 am – 8:05 am

Opening Introductions

Networking

8:00 am – 9:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

9:00 am – 9:30 am

Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.

Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.

This session will explore:

• How nation-state attacks are changing

• How organizations can respond to the classic balance of security and productivity

• How organizational maturity in risk management is maintained whilst ensuring cyber defense

JR Tietsort

Chief Information Security Officer, Americas Darktrace
Bio

Marcus Fowler

Director of Strategic Threat Darktrace
Bio
Darktrace Logo

Live Presentation

9:30 am – 9:50 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content FirewallTo do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.
Bob Ertl headshot

Bob Ertl

Sr. Director, Product Marketing Accellion
Bio

Networking

9:50 am – 10:00 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Panel Discussion

10:00 am – 11:00 am

CISO Panel: The Security Impact of The Coronavirus

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances Accellion
Bio

Josh Kuntz

Chief Information Security Officer Texas Workforce Commission
Bio

Jeff Lush

Chief Information Officer Air University at United States Air Force
Bio

Richard Rushing

Chief Information Security Officer Motorola Mobility
Bio

Networking

11:00 am – 11:20 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

11:20 am – 11:50 am

Best Practices – PAM Security and Data Privacy

Christopher Hills

Deputy Chief Technology Officer BeyondTrust
Bio
BeyondTrust logo

On-Demand Presentation

11:50 am – 12:20 pm

Seeing the forest through the trees - A risked based approach to maturing your VMP

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.

Rob Walk

Sr. Security Engineer Tenable
Bio
Tenable Logo

On-Demand Presentation

12:20 pm – 12:50 pm

Secure Shell Privileged Access: Risk & Compliance Challenges

Sean Lunell

VP Sales SSH.COM
Bio
SSH Logo

Break

12:50 pm – 1:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:00 pm – 1:30 pm

Making the Case for Authentication as a Platform

As organizations adopt advanced authentication practices, it’s critical to consider the varied modalities your organization requires. The “solution” should not be one that’s built from a collection of point solutions. For this reason, many businesses are turning to authentication solutions that are built as a platform. This holistic solution is accommodating to different modalities, applications and form factors. It can also control the authentication and credential management lifecycle. In this session, the experts from HID® Global will:

  • Address the most common challenges and concerns for enterprise organizations attempting to streamline authentication
  • Detail the intricacies of the authentication lifecycle
  • Help you identify what to look for in an authentication platform that meets your organization’s needs

Yves Massard

Product Marketing Director HID Global
Bio
HID Logo

Live Keynote

1:30 pm – 2:30 pm

Lessons Learned from 2020 and what will 2021 Bring

James M.T. Morrison

Distinguished Technologist – Cyber Security Hewlett Packard Enterprise
Bio

Networking

2:30 pm – 2:50 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

2:50 pm – 3:20 pm

The Growing Need for Identity & Access Management to Support Digital Business Initiatives

Niamh Muldoon

Senior Director of Trust and Security OneLogin
Bio
OneLogin Logo

On-Demand Presentation

3:20 pm – 3:50 pm

Rational Approach to Zero Trust

Security vendors and analysts are pushing the “zero trust” message – but zero trust is not a product that can be bought. It is an approach to security policy and processes. This brief talk discusses the “low hanging fruit” in applying zero trust principles to an organization’s security program.

Chris Pittman

Senior Manager, Sales Engineering Blackberry
Bio

On-Demand Presentation

3:50 am – 4:20 pm

Destructive Objects: The New Attack Vector

Files and destructive objects are emerging as a significant new attack vector, disrupting businesses’ efforts to bring products and services online via new web and mobile applications. These new digital processes rely on the creation, transfer, and sharing of rich content as files which transport this data to deliver the right experience to the recipient. However, these same files can be leveraged by attackers by inserting malware into these binary objects, which often go undetected thereby introducing significant risk to the business.

In this session, we’ll discuss:
• What are destructive objects and why are they a concern to your business, your digital ecosystem, and subsequently your employees, partners, and customers
• How are these files impacting organizations, including your digital experience, SOC performance, and software supply chains
• How is explainable threat intelligence improving detection rates, accelerating response times, and creating greater SOC and DevOps efficiencies

Chip Epps

Director of Product & Solutions ReversingLabs
Bio
Reversing Labs

Break

4:20 pm – 4:30 pm

Announcements with Kim Hakim

Stick around for our prize drawings!

Networking

4:30 pm – 5:00 pm

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Closing Remarks

5:00 pm – 5:00 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC

Kim Hakim

CEO and Founder FutureCon, LLC
Bio

Register