Home / / Indianapolis, IN (Central Region)

VIRTUAL Central CyberSecurity Conference

October 7, 2020 @ 10am CST

(KS, MO, IL, IN, MI, OH, NE, IA, MN)

Earn up to 9 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

CISO Keynote Speaker

Meredith R. Harper

Vice President, Chief Information Security Officer Eli Lilly and Company

Meredith Harper serves as vice president and chief information security officer at Eli Lilly and Company. She is responsible for the company’s global information security program.

Prior to joining Lilly in 2018 as senior director, deputy chief information security officer, Meredith served as chief information privacy and security officer at Henry Ford Health System, where she had ultimate responsibility for the protection of Henry Ford’s provider, insurance, retail and research businesses.

Meredith is an active member of the Health Care Compliance Association and the International Association of Privacy Professionals. She holds dual certifications in healthcare compliance and privacy. She is certified as a HealthCare Information Security & Privacy Practitioner through the International Information System Security Certification Consortium Inc. and a Certified Information Security Manager through the Information Systems Audit and Control Association.

She earned a master’s degree in health services administration and a bachelor’s degree in computer information systems from the University of Detroit Mercy. She also earned a master’s of jurisprudence in health law from Loyola University Chicago School of Law.

Meredith serves on several advisory boards in support of empowering women and minorities to embark upon careers in technology, especially in information security. She has also served her community for 28 years through her Diamond Life membership in Delta Sigma Theta Sorority Inc.

Panel Discussion: Dark Web, Insider Threat, Cyber Resilience

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Live Presentation

9:00 am – 9:30 am

Powering Digital Transformation

MicroFocus Logo

Live Keynote

10:00 am – 11:00 am

Keynote Speaker: Meredith R. Harper, Vice President, Chief Information Security Officer, Eli Lilly and Company

Meredith R. Harper

Vice President, Chief Information Security Officer Eli Lilly and Company
Bio

Live Panel Discussion

12:50 am – 1:50 pm

Panel Discussion: Dark Web, Insider Threat, Cyber Resilience

Industry leaders come together discussing latest challenges in their world of Cyber Securit

On-Demand Presentation

Cloud(y) with a Chance of Data Breach

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing that successfully, however, requires a security strategy supported by effective identity and access management.

This presentation will explore how businesses should approach migrating data and applications safely to the cloud, and the strengths and shortcomings of the strategies many enterprises are using today.

Dr. Torsten George

Cybersecurity Evangelist Centrify
Bio
Centrify Logo

On-Demand Presentation

World-Leading Cyber AI

Darktrace Logo

On-Demand Presentation

Okta is the identity company that stands for trust.

Okta Logo

On-Demand Panel Discussion

Secure Your Everything

checkpoint logo

On-Demand Presentation

Analysts Need Answers

Corelight Logo

On-Demand Presentation

We are the Cyber Exposure Company

Rob Walk

Sr. Security Engineer Tenable
Bio
Tenable Logo

On-Demand Presentation

Empower Your IT

Baramundi logo

On-Demand Presentation

Next Level Networking: Secure Cloud-Managed Network Services

infoblox logo

Register