Montreal, QC

Thursday, April 6, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

9:00 am

Overlooked Entry Point: Preventing Supply Chain and Insider Threat Attacks

In this session, Moti Shkolnik, Firedome’s CEO will share insight into the most commonly overlooked entry point to supply chain and insider threat attacks.
Based on his unique background as an attacker in the field for 15 years, the session will address unique challenges and means of securing IoT enterprise devices to prevent organizational attacks.

Moti Shkolnik

Founder & CEO Firedome

Sponsored by

Presentation

9:30 am

Role of IAM and Log forensics in thwarting insider threats

Cloud adoption boosts digital transformation for organizations embarking on a modernization program – the main reason organizations often opt for a hybrid active directory (AD) approach.
However, the other side of the coin to consider with the hybrid AD approach is that your network perimeters disappear. This is a critical factor leading to an increase in the number of threat incidents, especially insider threats.
To address this new challenge, organizations must build a unified security strategy with hybrid identity management and forensics at the center.
Join this session to learn:
1. What the new network perimeter looks like in a cloud environment
2. How organizations can balance application and data workload with hybrid AD
3. Why it is critical to close the security gap in the cloud
4. The role of IAM and Log forensics in mitigating insider threats

Vivin Sathyan

Senior Technology Consultant ManageEngine

Sponsored by

10:00 am

Networking

Presentation

10:30 am

We don’t know where we are compromised right now

When 7 out of 10 security leaders admit – “WE DON’T KNOW WHERE WE ARE COMPROMISED RIGHT NOW” – we have a problem – specifically a signal problem.

David Campbell

Regional Sales Manager Vectra

Sponsored by

11:00 am

Top 5 Ransomware Myths

The world’s largest taxi company doesn’t own any cars. The world’s largest accommodation company doesn’t own any property. And some of the largest ransomware groups are not deploying ransomware. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings. And the idea that we understand how ransomware works is one of the reasons why it is continuously on the rise. Join this session to learn about the latest innovations and business ideas that are shaping the world of cybercrime, and some of the ways how we can turn the modern ransomware ecosystem against itself.

Martin Zugec

Technical Solutions Director Bitdefender

Sponsored by

11:30 am

Networking

11:45 am

Lunch

Keynote

12:00 pm

"The New Frontline: Geopolitically Driven Cyber Threats and Risk in Financial Industry"

In today’s world, geopolitical tensions have become a significant driver of cyber threats and risks, particularly in the financial industry. The increasing sophistication of cyberattacks, coupled with geopolitical instability, has created a new frontline for cybersecurity professionals. In this keynote, we will explore the evolving landscape of geopolitically driven cyber threats and risks facing the financial industry. We will examine the unique challenges that financial institutions face in this environment. We will also discuss the role of international cooperation in mitigating these threats and the need for a collaborative approach to cybersecurity. Ultimately, this keynote will provide insights into how financial institutions can proactively protect themselves against the ever-changing and increasingly complex geopolitical cyber risks and threats.

MJF Rupom

Vice President & Head of Americas, Cyber Risk Intelligence BNP Paribas Canada
1:00 pm

Networking

Presentation

1:30 pm

Tokenizing the Dark Web : Applying NLP in the context of Cyber Threat Intelligence

Training a model using Natural Language Processing (NLP) is challenging. Training one adapted to the unique vocabulary of malicious actors becomes even more difficult. This complex process highlights the need of having a continuously adaptive lexical able to follow new trends in illicit communities.
To overcome the challenge of the distinct vocabulary used by malicious actors, we’ve created and made public the first open-source tokenizer trained on a corpus containing years of content from interactions on the Dark Web. The tokenizer and lexical are in the format of Byte-Pair-Encoding and will be available on GitHub.
We will demonstrate two applications of this model, applied to real world challenges and highlight some insights found by them. First, we will demonstrate how the ML auto-extractor is able to extract contents from a wide variety of illicit forums, without human configuration.  Then, we will show how we were able to regroup multiple actors’ monikers based on their writing style.
What you would learn during this talk:
How to avoid the pitfalls when training NLP on slang/jargon.
How to continuously adapt the lexical to follow new trends in illicit communities.
With the release of this open-source model, malware researchers and threat hunters will be able to automate interactions with cybercriminals, support infiltration engagements, and analyze communications and data leaks. Additionally, by constantly updating the lexical based on cybercriminals’ interactions, the model allows researchers to discover and track rising trends.

Mathieu Lavoie

Co-founder and CTO Flare

Olivier Michaud

Data Software Developer Flare

Sponsored by

Presentation

2:00 pm

The (hard) key to stop phishing: How Cloudflare stopped a targeted attack and you can too

In July 2022, Cloudflare was targeted in a sophisticated SMS phishing scheme in such a way that we believe most organizations would be likely to be breached. In this session we’ll detail the recent targeted phishing attack we saw at Cloudflare and more importantly, how we stopped it and steps you can take to protect your organization as well. We’ll cover topics like: why not all MFA is created equally, the role of Zero trust network access in rolling out strong authentication, and the importance of a blame-free culture around security.

Anand Guruprasad

Solutions Leader, Canada Cloudflare

Sponsored by

2:30 pm

Networking

Presentation

2:45 pm

How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
  • An automated investigation experience that replaces manual routines and effectively guides new insider threat teams

Michael Harrington

Senior Sales Engineer Exabeam

Sponsored by

Networking

3:15 pm

Networking

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Moti Shkolnik

Founder & CEO Firedome

Dan Elliott

Global Cyber Security Risk Advisor | Former Intelligence Officer Zurich Canada

MJF Rupom

Vice President & Head of Americas, Cyber Risk Intelligence BNP Paribas Canada

Guillaume Ross

Deputy CISO JupiterOne
5:00 pm

Closing Remarks

3:45 pm

Honoree Award Ceremony

Share This