Kansas City, KS (Central Region)

Wednesday, September 22, 2021

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Check In | Networking

Presentation

9:00 am

CIS Controls in the Real World

As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In read more…

As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8,  and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.

 

Bio

Ted Gruenloh

Chief Operating Officer Sentinel IPS

Sponsored by

Presentation

9:30 am

A Strategy For Securing Your Everything; How Non-Integrated Solutions Challenge Overall Enterprise Security

Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies. These global read more…

Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

Join Grant Asplund, Growth Technologies Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:

  • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
Bio

Grant Asplund

Growth Technologies Evangelist Check Point Software Technologies

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

10:30 am

What Elon Musk and SpaceX Can Teach Us About Ransomware and Cybersecurity

As a kid I always assumed that when you shot a rocket into space, other than the capsule, all the other parts burned up on re-entry into the atmosphere. Elon Musk asked why couldn’t you just reuse the rocket? And SpaceX was launched. To change cybersecurity, we have to change read more…
As a kid I always assumed that when you shot a rocket into space, other than the capsule, all the other parts burned up on re-entry into the atmosphere. Elon Musk asked why couldn’t you just reuse the rocket? And SpaceX was launched. To change cybersecurity, we have to change our mindset. In 30 minutes I will challenge conventional thinking, proverbial wisdom, and ask a new question.
Bio

Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne

Sponsored by

Networking

11:30 am

Lunch

Networking

12:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

12:15 pm

Build vs. Buy: Advantages of a Pre-Built Solution

In this session John Wilke will guide you through the advantages of a pre-built identity solution. He will review how identity used to be a cost center and now it is viewed as a business enabler and strategic initiative. He will also help you compare the options when looking to build out a read more…

In this session John Wilke will guide you through the advantages of a pre-built identity solution. He will review how identity used to be a cost center and now it is viewed as a business enabler and strategic initiative. He will also help you compare the options when looking to build out a modern identity solution. We look forward to seeing you!

Bio

John Wilke

Senior Product Marketing Manager Okta

Sponsored by

Presentation

12:30 pm

Protecting Your Organization from the Business of Ransomware

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s read more…

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative?

Join this session to learn more about:

  • The business of ransomware
  • The evolving threat landscape
  • Ransomware Protection Tactics and Techniques
  • Your Security Roadmap for Hybrid and Remote Workers
  • Leveraging an EDR with Limited Security Staff
Bio

Robert Zamani

Senior Director of Engineering Malwarebytes

Sponsored by

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:15 pm

Rise of Secure Access Service Edge (SASE)

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While read more…

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases.
  • Architectural considerations you should keep in mind when comparing SASE vendors. 
Bio

Kevin Sheu

Senior VP of Marketing Bitglass

Sponsored by

Presentation

1:40 pm

Transforming the Employee Experience with a Zero Trust Strategy

Support your employees working remotely by providing more secure access to corporate resources through continuous assessment and intent-based policies. Listen to Sue Bohn and Ann Johnson explain Zero Trust.

Support your employees working remotely by providing more secure access to corporate resources through continuous assessment and intent-based policies. Listen to Sue Bohn and Ann Johnson explain Zero Trust.

Bio

Sue Bohn

Vice President of Program Management Identity & Network Access Division at Microsoft
Bio

Ann Johnson

Corporate Vice President - Security, Compliance, & Identity Microsoft

Sponsored by

Networking

2:05 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:20 pm

Transitioning DNS from IT Utility to Security Strategy

Bio

Jeff Miller

Specialist Infoblox

Sponsored by

Presentation

2:50 pm

Best Practice: PAM Data Privacy & Security

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how read more…

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why:
• Analyzing Best Practice
• Security considerations
• Key components for a successful PAM strategy

Bio

Christopher Hills

Deputy Chief Technology Officer BeyondTrust

Sponsored by

Networking

3:20 pm

Happy Hour | Networking

Live Panel Discussion

3:50 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on: Current cybersecurity threats and practices Post-pandemic security

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Bio

Ted Gruenloh

Chief Operating Officer Sentinel IPS
Bio

Britney Hommertzheim

Director, Cyber Operations Cardinal Health
Bio

Kurt Manske

Senior Director for Strategy Privacy and Risk Coalfire
r. Cheryl Cooper portrait Bio

Dr. Cheryl Cooper

Cyber Security Risk Manager T-Mobile
Bio

Ryan Louisa

Director of Project Management / Chief Technology Officer, Board Member, Mentor and GSD rescuer Evogen
4:50 pm

Prize Drawing | Closing

Share This