Indianapolis, IN

Thursday, October 12, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Breaches - how to prepare and manage vulnerabilities in the cloud

Bio

Ben Nicholson

Global Practice Leader for Prisma Cloud Palo Alto Networks

Sponsored by

Presentation

9:30 am

Kubernetes Security Is Impossible And You Should Probably Just Give Up

Security and compliance are complex and challenging. Kubernetes is definitely complex and challenging. And then you add a bunch of people into the mix. If this sounds like an impossible cocktail to overcome, you’re right! Join us for a session about how to enable zero-trust controls in Kubernetes, and how it will read more…

Security and compliance are complex and challenging. Kubernetes is definitely complex and challenging. And then you add a bunch of people into the mix. If this sounds like an impossible cocktail to overcome, you’re right! Join us for a session about how to enable zero-trust controls in Kubernetes, and how it will never work if we just throw more tools at the problem.

Bio

Jorn Knuttila, Sr.

K8S Security Solutions Engineer NeuVector by SUSE

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Visibility on the Unknown - Network Visibility Use Cases, Trends and a Mature SOC

Bio

Rajaswi L. Das

SE Arista

Sponsored by

Presentation

11:00 am

Don't Trust Your Inbox

As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.Moreover, these attacks don’t need sophisticated malware read more…

As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to email

Bio

Jeffrey Mueller

Regional Account Manager - Great Lakes Cloudflare

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

"Using the Right Metrics to Communicate the Business Value of Your Information Security Program"

Bio

Adam Stone

Vice President Services Delivery and Chief Privacy Officer TrustMAPP

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

DevSecOps Alchemy: Communications, Processes and Visibility

The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were read more…
The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus  good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps.
Bio

Cole Moss

Enterprise Account Executive Seemplicity

Sponsored by

Presentation

2:00 pm

Git Em’: Threat Actors and the usage of Git as a Delivery Mechanism

Git is a popular tool for version control and source code management among developers and software engineers in small and large enterprises alike. However, threat actors have taken a liking to using Git as well. This talk will dive into how threat actors are using Git and popular services that read more…

Git is a popular tool for version control and source code management among developers and software engineers in small and large enterprises alike. However, threat actors have taken a liking to using Git as well. This talk will dive into how threat actors are using Git and popular services that leverage Git. We’ll dive into commodity attacks, APT usage, and more techniques that leverage Git or Git powered services.

Bio

Jacob Latonis

Sr. Threat Research Engineer Proofpoint

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Securing Gen AI in a Post Pandemic World

Bio

Matt Gaehring

Sr. Channel Sales Engineer Forcepoint

Sponsored by

Networking

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

3:45 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Ron Zochalski

Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
Bio

Adam Stone

Vice President Services Delivery and Chief Privacy Officer TrustMAPP
Bio

Darryl Togashi

Vice President, InfraGard Indiana Indiana State Director, Collegiate Cyber Defense Competition Cybersecurity Professor, Purdue University Global
Bio

David Sims

Staff Vice President, Security Technology Services Elevance Health
Bio

Bernie Hirsch

CIO/CISO/CQO MicroVote General Corporation
Bio

Thomas Riebe

Chief Technology Officer Ivy Tech Community College of Indiana

Closing Remarks

4:45 pm

Closing Remarks