Kansas City, KS
Thursday, June 8, 2023
Live
Keynote Speaker
““Embracing Disruption””
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The Weaponization of DNS
Focused on the security benefits of enterprise-grade DNS controls, this talk walks through how the trusting nature of DNS has been abused by threat actors for years.
Looking to turn the tables and use DNS to our advantage, we discuss how security practitioners can gain unprecedented visibility into client communications and stop attacks as early as possible in the communication process.
Sponsored by
Presentation
Modern Data Protection
Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Sponsored by
Sponsor Networking Time
Presentation
Digital Transformation, AI, & Cybersecurity: Surviving the Perfect Storm
This presentation by Cloudflare’s Field CTO, John Engates, navigates the complex convergence of digital transformation, AI, and cybersecurity. Addressing the emerging cyber threats and regulatory challenges against the backdrop of a rapidly evolving digital landscape, Engates offers effective strategies for resilience, performance, and security. The talk further underscores the need for a holistic approach to cybersecurity, and provides insights through relevant case studies to empower businesses to withstand the ‘perfect storm’ of our digital era.
Sponsored by
Presentation
Digital Sovereignty
This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world. We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.
Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.
Sponsored by
Networking
Sponsor Networking Time
Lunch
Keynote
“Embracing Disruption”
Sponsor Networking Time
Presentation
Leveraging an AI that Knows You, to Stay Ahead of Today’s Attacks
To protect organizations today and tomorrow, we are required to not only shift our thinking, but shift how we approach security within the context of our business operations. In this session, Darktrace will share how thousands of organisations are incorporating AI into their organizational ecosystem to bolster operational resilience by preventing, detecting, and responding to attacks – empowering businesses to deliver business as usual, while staying one step ahead of attackers.
Sponsored by
Shielding Your IT Ecosystem: A Guide to Layered Security, Compliance and Awareness
Tony Parlato, Solutions Architect for IP Pathways will be discussing security as an ever-evolving landscape. In this presentation you will learn how organizations must stay one step ahead of the curve to protect themselves from malicious actors as new technologies and threats emerge. A comprehensive security strategy involves not only understanding the latest security trends and compliance requirements, but also implementing multiple layers of security to protect their systems and data.
Sponsored by
Sponsor Networking Time
Presentation
Eliminate, Simplify, Automate
Sponsored by
Presentation
Improving Software Supply Chain Security for Java Workloads
Current approaches to protecting the Software Supply Chain tend to rely on scanning or application instrumentation. These solutions suffer from the following drawbacks:
– They are generally point-in-time, which means they cannot see what is actually happening while workloads are continuously running in Production
– They create extra work and friction between stakeholders in the software development lifecycle
– Instrumentation approaches are intrusive and may introduce unacceptable overhead for Production workloads
This talk will introduce a JVM-native approach to securing the Java Software Supply Chain. A JVM-native approach introduces no extra work for anyone, while providing zero-overhead, continuous, code level Software Composition Analysis. It provides organizations with a continuous understanding of their Java workloads’ exposure to known vulnerabilities in all environments including Production.