Minneapolis, MN

Thursday, March 10, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Seize The Breach: Why breaches still occur and how to mitigate them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that read more…

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Bio

Ben Burkholder

Senior Sales Engineer Exabeam

Sponsored by

9:30 am

Navigating the Current Threat Landscape: Best Practices for Addressing Top Security Risks

The current threat landscape makes the ongoing task of defending against relentless attackers one that requires specialized expertise, dedicated technology, and constant vigilance. Security leaders are faced with new challenges including an abundance of alerts, labor shortages, underutilized security tools, and a hybrid or remote workforce. Rena Stern, Sr. Director, read more…

The current threat landscape makes the ongoing task of defending against relentless attackers one that requires specialized expertise, dedicated technology, and constant vigilance. Security leaders are faced with new challenges including an abundance of alerts, labor shortages, underutilized security tools, and a hybrid or remote workforce.

Rena Stern, Sr. Director, Product Marketing, Deepwatch, will discuss the top security challenges and threats facing mid-sized businesses, and specific actions security leaders can take to address these challenges to mitigate threats.

Bio

Rena Stern

Sr. Director, Product Marketing Deepwatch

Sponsored by

Presentation

10:30 am

Building Cyber Resilience into the Software Supply Chain

Cyber resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to read more…

Cyber resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth.

Bio

Eric Popiel

Cybersecurity Strategist/Evangelist, Security, Risk and Governance Micro Focus

Sponsored by

Presentation

11:00 am

Fast and Furious Attacks: Using AI to Surgically Respond

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Just Fier, Director of Cyber Intelligence & Analytics, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Just Fier, Director of Cyber Intelligence & Analytics, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.

Bio

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace

Sponsored by

Keynote

12:00 pm

CISO “Chief Information Storytelling Officer”

Bio

Jeff Norem

Deputy Chief Information Security Officer Freddie Mac

Presentation

1:30 pm

Driving Zero Trust at Two Different Companies: Lessons Learned

As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises read more…
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
The audience will gain understanding in:
  • How to get started: Selling the strategy, people, process and technology
  • How to make real progress in months, not years.  Demonstrating continued business value
  • Real world examples. Highlighting improvements to user experience and security posture.
  • Tips and tricks, lessons learned and what to avoid
Bio

Den Jones

Chief Security Officer Banyan Security

Sponsored by

Presentation

2:00 pm

Zero Trust Microsegmentation, Easier Than You Think

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

2:45 pm

The ransomware industry, and examination of crime-as-a-service and why it won’t stop

Ransomware attacks have been proliferating over the past five years, becoming an easy source of revenue for cybercriminals and putting businesses at risk. How did we get here? What can security teams do differently to detect and respond to attacks more effectively? In this session, Security researcher Jamison Utter shares research on why ransomware exists and why it is read more…

Ransomware attacks have been proliferating over the past five years, becoming an easy source of revenue for cybercriminals and putting businesses at risk. How did we get here? What can security teams do differently to detect and respond to attacks more effectively? In this session, Security researcher Jamison Utter shares research on why ransomware exists and why it is booming as a business. He shares how he built his own ransomware campaign from Darkweb building blocks and how simple it was. Jamison will conclude with perspective on why so many modern security tools are failing to help in the ransomware fight and what companies should be doing to elevate their detection and response: You will learn about the following:

  • The importance of Tactical and Strategic thinking
  • The Value of CTI (Cyber Threat Intel) sharing and leveraging
  • The criticality of speed
Bio

Jamison Utter

Cyber Security Specialist Infoblox

Sponsored by

Presentation

3:15 pm

Compliance as a Catalyst for Reducing Risk

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s read more…

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.

  • Challenges in Compliance and Risk Programs
  • Five Best Practices in starting a Risk Program
  • Compliance Considerations that will Improve Your Risk Posture
Bio

Rob Ellis

Chief Strategy Officer Reciprocity

Sponsored by

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Christopher Hamm

Security Director Micro Focus | CyberRes
Bio

Tom Erickson

Director, Global Cybersecurity Operations Cummins Inc.
Bio

Tina Meeker, MBA, CISSP, CIPP-US

Sr. Director of Information Security at Sleep Number Corporation VP - Minnesota Chapter of WiCyS - Women in CyberSecurity
Bio

Judy Hatchett

VP, CISO SureScripts President - Minnesota Chapter WiCys
Bio

Jeff Norem

Deputy Chief Information Security Officer Freddie Mac
5:00 pm

Closing Remarks