Indianapolis, IN

Wednesday, July 20, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Key Considerations for Choosing the Right Email Security Platform

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Unfortunately, email threats are only growing in number. Business email compromise read more…

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.

Bio

Dan Clark

SE Abnormal

Sponsored by

Presentation

9:30 am

Security Control Validation: A Pragmatic Approach to your Security Portfolio

Avi Avivi, SafeBreach Chief Information Security Officer, presents a practical approach to managing your security portfolio, balancing compliance with security, optimizing your controls, and continuously validating your security posture.

Avi Avivi, SafeBreach Chief Information Security Officer, presents a practical approach to managing your security portfolio, balancing compliance with security, optimizing your controls, and continuously validating your security posture.

Bio

Avishai Avivi

CISO Safebreach

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices

Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security read more…

Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about.

Working globally with Fortune 500 enterprises and government agencies for the past six years, we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow.

Bio

Brian Contos

Chief Security Officer Phosphorus Cybersecurity

Sponsored by

Presentation

11:00 am

Stopping Attacks, Not Your Business: AI & Autonomous Response

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds. Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow read more…

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough

Bio

Victoria Kolotov

Cybersecurity Account Executive Darktrace

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Break

11:45 am

Lunch

Keynote

12:00 pm

"Top Gun: Cyber School - Time to rip the band-aid off!"

Top Gun: Cyber School – Time to rip the band-aid off! Your mission: Zero Trust What vendor weapons are available I need more ground support!! – How to get the people you need

Top Gun: Cyber School – Time to rip the band-aid off!

Your mission: Zero Trust

What vendor weapons are available

I need more ground support!! – How to get the people you need

Bio

Ron Zochalski

Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Zero Trust Segmentation,Easier Than You Think

Bio

Jeff Stauffer

Technical Engineer Illumio

Sponsored by

Presentation

2:00 pm

Security Operations in the Current Global State

The events of the last month, the last year, and even the last 3 years has proven that we are a part of a sinister new world. The idea of a best of breed security stack being enough to protect your environment is not only outdated, but it is also read more…

The events of the last month, the last year, and even the last 3 years has proven that we are a part of a sinister new world. The idea of a best of breed security stack being enough to protect your environment is not only outdated, but it is also a dangerous belief. Security teams are overworked and outgunned in today’s world, but there are ways to shore up defenses.

Bio

Greg Coy

Senior SE Arctic Wolf

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Threat Detection & Response Beyond Your Endpoints

Combatting ransomware attacks requires effective endpoint threat detection & response (EDR). But EDR alone is not enough: teams need to defend their networks, identities, cloud infrastructures, and more—often without the necessary internal expertise to handle an incident appropriately. That’s where Managed Detection & Response (MDR) providers can help. Join us read more…

Combatting ransomware attacks requires effective endpoint threat detection & response (EDR). But EDR alone is not enough: teams need to defend their networks, identities, cloud infrastructures, and more—often without the necessary internal expertise to handle an incident appropriately.

That’s where Managed Detection & Response (MDR) providers can help. Join us for our upcoming webinar to learn how MDR extends your coverage beyond the endpoint, detects threats that bypass security products, and saves time and money by offloading labor-intensive tasks.

What you’ll learn

  • How MDR extends EDR coverage
  • The operational benefits of MDR
  • How Red Canary MDR helps you detect more threats, faster
Bio

Laura Hamel

Principal of Managed Detection and Response Red Canary

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Ron Zochalski

Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Bio

Dan Lohrmann

Award-winning CISO | Bestselling Author | Client Advisor | Blogger | Keynote Speaker | Mentor Presidio
Bio

Ray Trygstad

Associate Chair, Department of Information Technology & Management Illinois Institute of Technology
Bio

Riann Stroud

Sr Director Information Security GRC Clario
Bio

Brian Stanek

Enterprise Solution Architect / Chief Information Security Officer NAMIC Insurance Company

Closing Remarks

5:00 pm

Closing Remarks

Share This