Houston Cybersecurity Conference

Wednesday, December 4, 2024

DoubleTree by Hilton Hotel Houston - Greenway Plaza

Parking/Directions

Hybrid

Join Us in Houston for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

DoubleTree by Hilton Hotel Houston - Greenway Plaza

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

The New Digital Cold War

The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information read more…

The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information stealing, and social engineering attacks have become more prevalent. Governments and organizations worldwide are heightening their defenses, while some nations are exploring the contentious domain of offensive cyber forces.

The surge in cyberattacks in 2022 can be linked to geopolitical tensions, escalating patriotic hacktivist operations, increased state-sponsored cyber espionage activities, and the global shift to digitalization. However, a new threat landscape emerged in 2023 – religiously and politically motivated hacktivist groups disrupted organizations around the globe through a surge in Distributed Denial of Service (DDoS) attacks. As their influence expands, it poses a potential threat of being co-opted as a proxy for state-controlled cyber activities.

This presentation delves into the shifting cyber threat landscape, the rise of hacktivism, and its implications on global cybersecurity strategies. It further investigates the likelihood of nation-states exploiting hacktivism as a cyber weapon and the possible onset of a new digital cold war.

Bio

Neal Quinn

Head of Cloud Security Services Radware

Sponsored by

Presentation

9:15 am

Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into read more…

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

Bio

David Hagen

Cybersecurity Evangelist TPx

Sponsored by

9:45 am

Preventing Scams, Fraud, Theft, and International Espionage with Identity Proofing

What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of read more…

What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of proofing at the right moments. Chris Barngrover, Identity & Access Management Expert from Novacoast,  provides identity proofing best practices for 3 critical uses cases: new hires, customer calls, internal calls.

Bio

Chris Barngrover

Director Identity Services Novacoast

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

Presentation

11:15 am

Evolving Threats, Unified Defenses: Mastering API and SaaS Security for 2025

As organizations embrace SaaS platforms and API-driven architectures, attackers are rapidly exploiting vulnerabilities in these interconnected systems. This session will explore how the convergence of API security and SaaS Security Posture Management (SSPM) is reshaping cybersecurity strategies. Attendees will gain a deep understanding of: SaaS Security Challenges: The risks inherent read more…

As organizations embrace SaaS platforms and API-driven architectures, attackers are rapidly exploiting vulnerabilities in these interconnected systems. This session will explore how the convergence of API security and SaaS Security Posture Management (SSPM) is reshaping cybersecurity strategies. Attendees will gain a deep understanding of:

  • SaaS Security Challenges: The risks inherent in SaaS applications, from misconfigurations to data leakage, and their impact on operational resilience.
  • API Security Threats: Why APIs remain prime targets and how attackers exploit them to infiltrate broader ecosystems.
  • Interdependencies Between APIs and SaaS: How APIs serve as the gateways for SaaS functionality—and potential exploits—highlighting the need for integrated security strategies.

By examining real-world scenarios and emerging trends, this session will empower security leaders to anticipate and address these evolving threats, ensuring they stay ahead of attackers in 2025 and beyond.

Bio

Jeremy Ventura

Field CISO Myriad360

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm

Staying Cool in the Kitchen

Bio

Ivelisse Torres

Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Sponsored by

Presentation

2:15 pm

Redefining Priorities in Data Security: Why Protecting 'Low-Risk' Data is Key to Safeguarding High-Value Assets

In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Thales is at the forefront of read more…

In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Thales is at the forefront of redefining this paradigm, asserting the vital importance of safeguarding all data including that categorized as ‘low-risk.’

This counterintuitive strategy of prioritizing low-risk data protection is not just a wise allocation of resources, but a pivotal element in a more effective overall data security strategy. It is particularly crucial for safeguarding high-value and regulated data. In this session, we will explore potent, actionable strategies for successful data security programs. So join us to gain essential insights and tools that will revolutionize your approach to data security.

Bio

Paul Steen

Principal Security Evangelist Imperva a Thales Company

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Moving Towards a Zero Trust Mindset

With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your read more…

With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your security posture. This session offers insights into building a resilient framework that meets today’s security demands

Bio

Vasanth Balakrishnan

Senior Enterprise Solutions Engineer, Cloudflare

Sponsored by

Presentation

3:30 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Anil Varghese

Chief Information Security Officer Francisco Partners
Bio

Anna (Eleni) Drier

Vice President, South Texas ISSA Director, InfraGard Houston
Bio

Paul Yoder

Associate Vice Chancellor Information Security - CISO Lone Star College
Bio

Ivelisse Torres

Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Bio

Neal Quinn

Head of Cloud Security Services Radware
5:00 pm

Closing Remarks