Houston Cybersecurity Conference
Wednesday, December 4, 2024
DoubleTree by Hilton Hotel Houston - Greenway Plaza
Hybrid
Join Us in Houston for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Staying Cool in the Kitchen”
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Anil Varghese
Chief Information Security Officer Francisco Partners
Anna (Eleni) Drier
Vice President, South Texas ISSA Director, InfraGard Houston
Paul Yoder
Associate Vice Chancellor Information Security - CISO Lone Star College
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Neal Quinn
Head of Cloud Security Services Radware
Sponsors
Premier Platinum Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
DoubleTree by Hilton Hotel Houston - Greenway Plaza
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The New Digital Cold War
The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information stealing, and social engineering attacks have become more prevalent. Governments and organizations worldwide are heightening their defenses, while some nations are exploring the contentious domain of offensive cyber forces.
The surge in cyberattacks in 2022 can be linked to geopolitical tensions, escalating patriotic hacktivist operations, increased state-sponsored cyber espionage activities, and the global shift to digitalization. However, a new threat landscape emerged in 2023 – religiously and politically motivated hacktivist groups disrupted organizations around the globe through a surge in Distributed Denial of Service (DDoS) attacks. As their influence expands, it poses a potential threat of being co-opted as a proxy for state-controlled cyber activities.
This presentation delves into the shifting cyber threat landscape, the rise of hacktivism, and its implications on global cybersecurity strategies. It further investigates the likelihood of nation-states exploiting hacktivism as a cyber weapon and the possible onset of a new digital cold war.
Sponsored by
Presentation
Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense
The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.
Sponsored by
Preventing Scams, Fraud, Theft, and International Espionage with Identity Proofing
What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of proofing at the right moments. Chris Barngrover, Identity & Access Management Expert from Novacoast, provides identity proofing best practices for 3 critical uses cases: new hires, customer calls, internal calls.
Sponsored by
Sponsor Networking Time
Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
Presentation
Evolving Threats, Unified Defenses: Mastering API and SaaS Security for 2025
As organizations embrace SaaS platforms and API-driven architectures, attackers are rapidly exploiting vulnerabilities in these interconnected systems. This session will explore how the convergence of API security and SaaS Security Posture Management (SSPM) is reshaping cybersecurity strategies. Attendees will gain a deep understanding of:
- SaaS Security Challenges: The risks inherent in SaaS applications, from misconfigurations to data leakage, and their impact on operational resilience.
- API Security Threats: Why APIs remain prime targets and how attackers exploit them to infiltrate broader ecosystems.
- Interdependencies Between APIs and SaaS: How APIs serve as the gateways for SaaS functionality—and potential exploits—highlighting the need for integrated security strategies.
By examining real-world scenarios and emerging trends, this session will empower security leaders to anticipate and address these evolving threats, ensuring they stay ahead of attackers in 2025 and beyond.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Staying Cool in the Kitchen
Ivelisse Torres
Deputy Chief Information Security Officer | Global Cyber & Information Security Officer Medtronic
Sponsor Networking Time
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Presentation
Redefining Priorities in Data Security: Why Protecting 'Low-Risk' Data is Key to Safeguarding High-Value Assets
In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Thales is at the forefront of redefining this paradigm, asserting the vital importance of safeguarding all data including that categorized as ‘low-risk.’
This counterintuitive strategy of prioritizing low-risk data protection is not just a wise allocation of resources, but a pivotal element in a more effective overall data security strategy. It is particularly crucial for safeguarding high-value and regulated data. In this session, we will explore potent, actionable strategies for successful data security programs. So join us to gain essential insights and tools that will revolutionize your approach to data security.
Sponsored by
Sponsor Networking Time
Presentation
Moving Towards a Zero Trust Mindset
With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your security posture. This session offers insights into building a resilient framework that meets today’s security demands
Sponsored by
Presentation
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.