Indianapolis, IN
Wednesday, July 20, 2022
Hybrid
Keynote Speaker
“"Top Gun: Cyber School - Time to rip the band-aid off!"”
Ron Zochalski
Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Ron Zochalski
Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Dan Lohrmann
Award-winning CISO | Bestselling Author | Client Advisor | Blogger | Keynote Speaker | Mentor Presidio
Ray Trygstad
Associate Chair, Department of Information Technology & Management Illinois Institute of Technology
Riann Stroud
Sr Director Information Security GRC Clario
Brian Stanek
Enterprise Solution Architect / Chief Information Security Officer NAMIC Insurance Company
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Key Considerations for Choosing the Right Email Security Platform
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years.
Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.
Sponsored by
Presentation
Security Control Validation: A Pragmatic Approach to your Security Portfolio
Avi Avivi, SafeBreach Chief Information Security Officer, presents a practical approach to managing your security portfolio, balancing compliance with security, optimizing your controls, and continuously validating your security posture.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices
Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about.
Working globally with Fortune 500 enterprises and government agencies for the past six years, we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow.
Sponsored by
Presentation
Stopping Attacks, Not Your Business: AI & Autonomous Response
Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.
Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Break
Lunch
Keynote
"Top Gun: Cyber School - Time to rip the band-aid off!"
Top Gun: Cyber School – Time to rip the band-aid off!
Your mission: Zero Trust
What vendor weapons are available
I need more ground support!! – How to get the people you need
Ron Zochalski
Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Zero Trust Segmentation,Easier Than You Think
Sponsored by
Presentation
Security Operations in the Current Global State
The events of the last month, the last year, and even the last 3 years has proven that we are a part of a sinister new world. The idea of a best of breed security stack being enough to protect your environment is not only outdated, but it is also a dangerous belief. Security teams are overworked and outgunned in today’s world, but there are ways to shore up defenses.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Threat Detection & Response Beyond Your Endpoints
Combatting ransomware attacks requires effective endpoint threat detection & response (EDR). But EDR alone is not enough: teams need to defend their networks, identities, cloud infrastructures, and more—often without the necessary internal expertise to handle an incident appropriately.
That’s where Managed Detection & Response (MDR) providers can help. Join us for our upcoming webinar to learn how MDR extends your coverage beyond the endpoint, detects threats that bypass security products, and saves time and money by offloading labor-intensive tasks.
What you’ll learn
- How MDR extends EDR coverage
- The operational benefits of MDR
- How Red Canary MDR helps you detect more threats, faster
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!