About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email firstname.lastname@example.org
Fireside Keynote - Lessons in Leadership
Meredith R. Harper
Vice President, Chief Information Security Officer Eli Lilly and Company
Meredith Harper serves as vice president and chief information security officer at Eli Lilly and Company. She is responsible for the company’s global information security program. Prior to joining Lilly in 2018 as senior director, deputy chief information security officer, Meredith served as chief information privacy and security officer at Henry Ford Health System, where…
VP Global Strategic Alliances Accellion
Laureen Smith joined Accellion in 2017 and is responsible for the Company’s channel sales and strategic partnerships. She brings many years of experience in enterprise software sales and marketing, and strategic partnership development with expertise in Enterprise File Sync and Sharing, Collaboration, and Content Management. Prior to Accellion, Laureen was Vice President of North America…
Times are subject to change
Sponsor Virtual Booth Networking Time
Five Critical Capabilities To Enable Data Privacy and CCPA Compliance
What Archeology Teaches us about Protecting Our Critical Infrastructure.
Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them.
By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming your challenges into an array of options.
Unafraid to fire moonshots, nor to avoid addressing sensitive subject matter, Eddie will be sure to provoke an authentic, respectful dialogue, with a goal to upgrade our thinking & protect our colleagues & friends from cyber attack.Come learn what a new 15,000 year history of human civilization teaches us about the evolution of cyber space & how we can invest less to create a full security prevention architecture in this brave new world.
Fireside Keynote: Lessons in Leadership
COVID & the New Frontier: Lessons learned from responding to COVID and where do we go from here
- Security Program Impacts (e.g., Operations, Third Parties, Initiatives)
- Employee Well Being & Work Life Integration
- Talent Recruitment Opportunities
Diversity, Equity and Inclusion: Our responsibility as leaders to drive tangible change for 2020 and beyond
- Lilly’s Response to Social Injustice and Race Relations
- Examples of ways to address diversity, equity and inclusion
- Increasing Our Reach: Women & Minorities in IT/IS…are we really making progress?
Cloud(y) with a Chance of Data Breach
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. However, this shift to the cloud has not gone unnoticed by threat actors. In fact, data breaches in the cloud due to misconfigurations and privileged credential abuse have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing that successfully, however, requires a security strategy supported by effective identity and access management.
This presentation will explore how businesses should approach migrating data and applications safely to the cloud, and the strengths and shortcomings of the strategies many enterprises are using today.
Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk
Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.
Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.
This session will explore:
• How nation-state attacks are changing
• How organizations can respond to the classic balance of security and productivity
• How organizational maturity in risk management is maintained whilst ensuring cyber defense
Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT
Making the SOC more effective by enabling automation with better data
Seeing the forest through the trees - A risked based approach to maturing your VMP
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
Endpoint Management – Are they even coming back to the office?
This year changed the way of life for IT Administrators in many ways and endpoint management became a whole new priority in organizations. What happen when the endpoints come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how those will affect the way of managing endpoints.