Home / / Indianapolis, IN (Central Region)

VIRTUAL Central CyberSecurity Conference

October 7, 2020 @ 10am CST

(KS, MO, IL, IN, MI, OH, NE, IA, MN)

Earn up to 9 CPE credits

 

1.      Access the Event by clicking here: https://virtual.boomset.com/event/106836

2.      Enter your email address. You MUST use the same email you used to register for the event

3.      Check your email for your unique log-on only valid for your email

4.      Tap the event’s name: VIRTUAL CENTRAL CYBERSECURITY CONFERENCE

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Fireside Keynote - Lessons in Leadership

Fireside Keynote: Lessons in Leadership

Meredith R. Harper

Vice President, Chief Information Security Officer Eli Lilly and Company

Meredith Harper serves as vice president and chief information security officer at Eli Lilly and Company. She is responsible for the company’s global information security program. Prior to joining Lilly in 2018 as senior director, deputy chief information security officer, Meredith served as chief information privacy and security officer at Henry Ford Health System, where…

Read More

Laureen Smith headshot

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications

Laureen Smith brings over twenty years of experience in technology and information systems, with a more recent focus in cybersecurity. As a veteran executive in the industry, she has led relationship marketing, brand development, thought leadership, enterprise and channel sales, go to market and brand strategy, product management, and has consulted in many industry segments,…

Read More

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Networking

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am

Five Critical Capabilities To Enable Data Privacy and CCPA Compliance

Learn how to implement five critical technology capabilities in a single technology framework for global data privacy to support regulations such as CCPA and GDPR. Starting from the Identification and discovery of structured, semi-structured, and unstructured data then classifying the data to determine which data falls within the scope of your organization’s privacy policy and regulations. Then apply meaningful actions on the data such as move/govern, remediate, protect through encryption, or dispose of relevant content as well as support data subject rights requests.

Eric Popiel

Cybersecurity Strategist/Evangelist, Security, Risk and Governance Micro Focus
Bio

On-Demand Presentation

9:30 am

What Archeology Teaches us about Protecting Our Critical Infrastructure.

Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them.

By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming your challenges into an array of options.

Unafraid to fire moonshots, nor to avoid addressing sensitive subject matter, Eddie will be sure to provoke an authentic, respectful dialogue, with a goal to upgrade our thinking & protect our colleagues & friends from cyber attack.Come learn what a new 15,000 year history of human civilization teaches us about the evolution of cyber space & how we can invest less to create a full security prevention architecture in this brave new world.

Eddie Doyle

Cyber Security Evangelist Check Point Software Technologies, Inc.
Bio

Break

10:15 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Keynote

10:30 am

Fireside Keynote: Lessons in Leadership

COVID & the New Frontier: Lessons learned from responding to COVID and where do we go from here

  • Security Program Impacts (e.g., Operations, Third Parties, Initiatives)
  • Employee Well Being & Work Life Integration
  • Talent Recruitment Opportunities

Diversity, Equity and Inclusion: Our responsibility as leaders to drive tangible change for 2020 and beyond

  • Lilly’s Response to Social Injustice and Race Relations
  • Examples of ways to address diversity, equity and inclusion
  • Increasing Our Reach: Women & Minorities in IT/IS…are we really making progress?

Meredith R. Harper

Vice President, Chief Information Security Officer Eli Lilly and Company
Bio
Laureen Smith headshot

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications
Bio

Break

11:30 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

11:45 am

Cloud(y) with a Chance of Data Breach

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing that successfully, however, requires a security strategy supported by effective identity and access management.

This presentation will explore how businesses should approach migrating data and applications safely to the cloud, and the strengths and shortcomings of the strategies many enterprises are using today.

Dr. Torsten George

Cybersecurity Evangelist Centrify
Bio
Centrify Logo

On-Demand Presentation

12:15 pm

Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.

Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.

This session will explore:

• How nation-state attacks are changing

• How organizations can respond to the classic balance of security and productivity

• How organizational maturity in risk management is maintained whilst ensuring cyber defense

JR Tietsort

Chief Information Security Officer, Americas Darktrace
Bio

Marcus Fowler

Director of Strategic Threat Darktrace
Bio

Break

12:45 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:00 pm

Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT

Kelsey Nelson

Security Specialist Okta
Bio

On-Demand Presentation

1:30 pm

Making the SOC more effective by enabling automation with better data

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.

Alex Kirk

Global Principal, Suricata Corelight
Bio

Break

2:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

2:15 pm

Seeing the forest through the trees - A risked based approach to maturing your VMP

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.

Rob Walk

Sr. Security Engineer Tenable
Bio

On-Demand Presentation

2:45 pm

Endpoint Management – Are they even coming back to the office?

This year changed the way of life for IT Administrators in many ways and endpoint management became a whole new priority in organizations. What happen when the endpoints come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how those will affect the way of managing endpoints.

Axel Peters

Executive Sales Manager Baramundi Software USA
Bio
Baramundi logo

Break

3:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

3:15 pm

Cyber Convergence: When Security & Technology “Finally Meet”

Chris Usserman

Principal Security Architect Infoblox
Bio

Networking

3:45 pm

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

4:45 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC

Kim Hakim

CEO and Founder FutureCon, LLC
Bio

Register

Share This