Kansas City, KS

Thursday, June 8, 2023

Live

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Weaponization of DNS

Focused on the security benefits of enterprise-grade DNS controls, this talk walks through how the trusting nature of DNS has been abused by threat actors for years. Looking to turn the tables and use DNS to our advantage, we discuss how security practitioners can gain unprecedented visibility into client communications read more…

Focused on the security benefits of enterprise-grade DNS controls, this talk walks through how the trusting nature of DNS has been abused by threat actors for years.

Looking to turn the tables and use DNS to our advantage, we discuss how security practitioners can gain unprecedented visibility into client communications and stop attacks as early as possible in the communication process.

Bio

Chad Hurt

Cyber Security Specialist Infoblox

Sponsored by

Presentation

9:30 am

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Digital Transformation, AI, & Cybersecurity: Surviving the Perfect Storm

This presentation by Cloudflare’s Field CTO, John Engates, navigates the complex convergence of digital transformation, AI, and cybersecurity. Addressing the emerging cyber threats and regulatory challenges against the backdrop of a rapidly evolving digital landscape, Engates offers effective strategies for resilience, performance, and security. The talk further underscores the need read more…

This presentation by Cloudflare’s Field CTO, John Engates, navigates the complex convergence of digital transformation, AI, and cybersecurity. Addressing the emerging cyber threats and regulatory challenges against the backdrop of a rapidly evolving digital landscape, Engates offers effective strategies for resilience, performance, and security. The talk further underscores the need for a holistic approach to cybersecurity, and provides insights through relevant case studies to empower businesses to withstand the ‘perfect storm’ of our digital era.

Bio

John Engates

Field CTO Cloudflare

Sponsored by

Presentation

11:00 am

Digital Sovereignty

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations. Finally, we will explore read more…

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.

Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.

Bio

Mike Jordan

Senior Solutions Architect Thales Cloud Security

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

“Embracing Disruption”

Bio

Britney Kennedy

Global BISO & Business Partnership Cardinal Health
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Leveraging an AI that Knows You, to Stay Ahead of Today’s Attacks

To protect organizations today and tomorrow, we are required to not only shift our thinking, but shift how we approach security within the context of our business operations. In this session, Darktrace will share how thousands of organisations are incorporating AI into their organizational ecosystem to bolster operational resilience by read more…

To protect organizations today and tomorrow, we are required to not only shift our thinking, but shift how we approach security within the context of our business operations. In this session, Darktrace will share how thousands of organisations are incorporating AI into their organizational ecosystem to bolster operational resilience by preventing, detecting, and responding to attacks – empowering businesses to deliver business as usual, while staying one step ahead of attackers. 

Bio

JonCarlo DeFeudis

Cybersecurity Team Lead Darktrace

Sponsored by

2:00 pm

Shielding Your IT Ecosystem: A Guide to Layered Security, Compliance and Awareness

Tony Parlato, Solutions Architect for IP Pathways will be discussing security as an ever-evolving landscape. In this presentation you will learn how organizations must stay one step ahead of the curve to protect themselves from malicious actors as new technologies and threats emerge. A comprehensive security strategy involves not only understanding read more…

Tony Parlato, Solutions Architect for IP Pathways will be discussing security as an ever-evolving landscape. In this presentation you will learn how organizations must stay one step ahead of the curve to protect themselves from malicious actors as new technologies and threats emerge. A comprehensive security strategy involves not only understanding the latest security trends and compliance requirements, but also implementing multiple layers of security to protect their systems and data.

Bio

Tony Parlato

Solutions Architect IP Pathways

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Eliminate, Simplify, Automate

Bio

Dan McIntyre

SVP of Strategic Cyber Operations and CTO Conquest Cyber
Bio

Donny Hubener

Information Security Department Manager Burns & McDonnell

Sponsored by

Presentation

3:15 pm

Improving Software Supply Chain Security for Java Workloads

Current approaches to protecting the Software Supply Chain tend to rely on scanning or application instrumentation. These solutions suffer from the following drawbacks: – They are generally point-in-time, which means they cannot see what is actually happening while workloads are continuously running in Production – They create extra work and read more…

Current approaches to protecting the Software Supply Chain tend to rely on scanning or application instrumentation. These solutions suffer from the following drawbacks:

– They are generally point-in-time, which means they cannot see what is actually happening while workloads are continuously running in Production

– They create extra work and friction between stakeholders in the software development lifecycle

– Instrumentation approaches are intrusive and may introduce unacceptable overhead for Production workloads

This talk will introduce a JVM-native approach to securing the Java Software Supply Chain. A JVM-native approach introduces no extra work for anyone, while providing zero-overhead, continuous, code level Software Composition Analysis. It provides organizations with a continuous understanding of their Java workloads’ exposure to known vulnerabilities in all environments including Production.

Bio

Robert Statsinger

Senior Solutions Architect Azul

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

April Boyd-Noronha

Senior Engineer, Information Security & Risk Cardinal Health
Bio

Nathaniel Cole

Chief Information Security Officer Trevipay
Bio

Reanna Schultz

Team Leader of Information Security Garmin
5:00 pm

Closing Remarks

Share This