Indianapolis, IN (Central Region)

Wednesday, October 7, 2020

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am

Five Critical Capabilities To Enable Data Privacy and CCPA Compliance

Learn how to implement five critical technology capabilities in a single technology framework for global data privacy to support regulations such as CCPA and GDPR. Starting from the Identification and discovery of structured, semi-structured, and unstructured data then classifying the data to determine which data falls within the scope of read more…

Learn how to implement five critical technology capabilities in a single technology framework for global data privacy to support regulations such as CCPA and GDPR. Starting from the Identification and discovery of structured, semi-structured, and unstructured data then classifying the data to determine which data falls within the scope of your organization’s privacy policy and regulations. Then apply meaningful actions on the data such as move/govern, remediate, protect through encryption, or dispose of relevant content as well as support data subject rights requests.

Bio

Eric Popiel

Cybersecurity Strategist/Evangelist, Security, Risk and Governance Micro Focus

Sponsored by

On-Demand Presentation

9:30 am

What Archeology Teaches us about Protecting Our Critical Infrastructure.

Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them. By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming read more…

Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them.

By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming your challenges into an array of options.

Unafraid to fire moonshots, nor to avoid addressing sensitive subject matter, Eddie will be sure to provoke an authentic, respectful dialogue, with a goal to upgrade our thinking & protect our colleagues & friends from cyber attack.Come learn what a new 15,000 year history of human civilization teaches us about the evolution of cyber space & how we can invest less to create a full security prevention architecture in this brave new world.

Bio

Eddie Doyle

Cyber Security Evangelist Check Point Software Technologies, Inc.

Sponsored by

Break

10:15 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Keynote

10:30 am

Fireside Keynote: Lessons in Leadership

COVID & the New Frontier: Lessons learned from responding to COVID and where do we go from here Security Program Impacts (e.g., Operations, Third Parties, Initiatives) Employee Well Being & Work Life Integration Talent Recruitment Opportunities Diversity, Equity and Inclusion: Our responsibility as leaders to drive tangible change for 2020 read more…

COVID & the New Frontier: Lessons learned from responding to COVID and where do we go from here

  • Security Program Impacts (e.g., Operations, Third Parties, Initiatives)
  • Employee Well Being & Work Life Integration
  • Talent Recruitment Opportunities

Diversity, Equity and Inclusion: Our responsibility as leaders to drive tangible change for 2020 and beyond

  • Lilly’s Response to Social Injustice and Race Relations
  • Examples of ways to address diversity, equity and inclusion
  • Increasing Our Reach: Women & Minorities in IT/IS…are we really making progress?
Bio

Meredith R. Harper

Vice President, Chief Information Security Officer Eli Lilly and Company
Laureen Smith headshot Bio

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications

Break

11:30 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

11:45 am

Cloud(y) with a Chance of Data Breach

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few read more…

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing that successfully, however, requires a security strategy supported by effective identity and access management.

This presentation will explore how businesses should approach migrating data and applications safely to the cloud, and the strengths and shortcomings of the strategies many enterprises are using today.

Bio

Dr. Torsten George

Cybersecurity Evangelist Centrify

Sponsored by

On-Demand Presentation

12:15 pm

Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how read more…

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.

Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.

This session will explore:

• How nation-state attacks are changing

• How organizations can respond to the classic balance of security and productivity

• How organizational maturity in risk management is maintained whilst ensuring cyber defense

Bio

JR Tietsort

Chief Information Security Officer, Americas Darktrace
Bio

Marcus Fowler

Director of Strategic Threat Darktrace

Sponsored by

Break

12:45 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:00 pm

Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT

Bio

Kelsey Nelson

Security Specialist Okta

Sponsored by

On-Demand Presentation

1:30 pm

Making the SOC more effective by enabling automation with better data

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This read more…

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.

Bio

Alex Kirk

Global Principal, Suricata Corelight

Sponsored by

Break

2:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

2:15 pm

Seeing the forest through the trees - A risked based approach to maturing your VMP

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.

Bio

Rob Walk

Sr. Security Engineer Tenable

Sponsored by

On-Demand Presentation

2:45 pm

Endpoint Management – Are they even coming back to the office?

This year changed the way of life for IT Administrators in many ways and endpoint management became a whole new priority in organizations. What happen when the endpoints come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may read more…

This year changed the way of life for IT Administrators in many ways and endpoint management became a whole new priority in organizations. What happen when the endpoints come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how those will affect the way of managing endpoints.

Bio

Axel Peters

Executive Sales Manager Baramundi Software USA

Sponsored by

Break

3:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

3:15 pm

Cyber Convergence: When Security & Technology “Finally Meet”

Bio

Chris Usserman

Principal Security Architect Infoblox

Sponsored by

Networking

3:45 pm

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
4:45 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC Bio

Kim Hakim

CEO and Founder FutureCon, LLC