Indianapolis, IN (Central Region)
Wednesday, October 7, 2020
Virtual
Fireside Keynote - Lessons in Leadership
“Fireside Keynote: Lessons in Leadership ”
Meredith R. Harper
Vice President, Chief Information Security Officer Eli Lilly and Company
Meredith Harper serves as vice president and chief information security officer at Eli Lilly and Company. She is responsible for the company’s global information security program. Prior to joining Lilly in 2018 as senior director, deputy chief information security officer, Meredith served as chief information privacy and security officer at Henry Ford Health System, where […]
Laureen Smith
Executive - Cybersecurity Advisory LJ Marketing & Communications
Laureen Smith brings over twenty years of experience in technology and information systems, with a more recent focus in cybersecurity. As a veteran executive in the industry, she has led relationship marketing, brand development, thought leadership, enterprise and channel sales, go to market and brand strategy, product management, and has consulted in many industry segments, […]
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Sponsor Virtual Booth Networking Time
Live Presentation
Five Critical Capabilities To Enable Data Privacy and CCPA Compliance
Learn how to implement five critical technology capabilities in a single technology framework for global data privacy to support regulations such as CCPA and GDPR. Starting from the Identification and discovery of structured, semi-structured, and unstructured data then classifying the data to determine which data falls within the scope of your organization’s privacy policy and regulations. Then apply meaningful actions on the data such as move/govern, remediate, protect through encryption, or dispose of relevant content as well as support data subject rights requests.
Sponsored by
On-Demand Presentation
What Archeology Teaches us about Protecting Our Critical Infrastructure.
Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them.
By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming your challenges into an array of options.
Unafraid to fire moonshots, nor to avoid addressing sensitive subject matter, Eddie will be sure to provoke an authentic, respectful dialogue, with a goal to upgrade our thinking & protect our colleagues & friends from cyber attack.Come learn what a new 15,000 year history of human civilization teaches us about the evolution of cyber space & how we can invest less to create a full security prevention architecture in this brave new world.
Sponsored by
Break
Break
Live Keynote
Fireside Keynote: Lessons in Leadership
COVID & the New Frontier: Lessons learned from responding to COVID and where do we go from here
- Security Program Impacts (e.g., Operations, Third Parties, Initiatives)
- Employee Well Being & Work Life Integration
- Talent Recruitment Opportunities
Diversity, Equity and Inclusion: Our responsibility as leaders to drive tangible change for 2020 and beyond
- Lilly’s Response to Social Injustice and Race Relations
- Examples of ways to address diversity, equity and inclusion
- Increasing Our Reach: Women & Minorities in IT/IS…are we really making progress?
Break
Break
On-Demand Presentation
Cloud(y) with a Chance of Data Breach
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing that successfully, however, requires a security strategy supported by effective identity and access management.
This presentation will explore how businesses should approach migrating data and applications safely to the cloud, and the strengths and shortcomings of the strategies many enterprises are using today.
Sponsored by
On-Demand Presentation
Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk
Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.
Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.
This session will explore:
• How nation-state attacks are changing
• How organizations can respond to the classic balance of security and productivity
• How organizational maturity in risk management is maintained whilst ensuring cyber defense
Sponsored by
Break
Break
On-Demand Presentation
Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT
Sponsored by
On-Demand Presentation
Making the SOC more effective by enabling automation with better data
SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.
Sponsored by
Break
Break
On-Demand Presentation
Seeing the forest through the trees - A risked based approach to maturing your VMP
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
Sponsored by
On-Demand Presentation
Endpoint Management – Are they even coming back to the office?
This year changed the way of life for IT Administrators in many ways and endpoint management became a whole new priority in organizations. What happen when the endpoints come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how those will affect the way of managing endpoints.