Nashville, TN
Wednesday, November 2, 2022
Hybrid
Keynote Speaker
““The Future of Cybersecurity””
Dr. Dennis E. Leber
Director of Cybersecurity/CISO. Honest Medical Group
- Named one of the top 100 CISOs 2021
- Named to the Cybersecurity Hall of Fame 2020
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Mark Bruns
SVP | CISO FirstBank
Dr. Dennis E. Leber
Director of Cybersecurity/CISO. Honest Medical Group
Robert Wagner
Field CISO | Executive Advisor/Strategist | Client Advocate | Highly Rated Keynote Speaker | Hak4Kidz Co-Founder Fletch
Peter Gallinari
Data Privacy Officer State of Tennessee
Daniel Clayton
VP Global Security Operations and Services Bitdefender
Barbee Mooneyhan
Security and Privacy Leader WiCyS TN Affiliate and BISO Affiliate Leader
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Overcoming the Global Cyber Skills Shortage to Build High-Performing Cyber Teams
As cyber professionals we are all navigating a perfect storm: The industry today is worth $362 billion, up from $156 billion in 2021, the number of cyber attacks doubled between 2020 and 2021 and yet the global cyber skills shortage continues to dominate the cyber job market and we’re now dealing with the post-pandemic ‘Great Reset’. Daniel will discuss the challenges of building cyber teams in this environment, the importance of providing careers and not jobs and provide some guidance on getting your chance in they Cyber Security industry.
Sponsored by
Presentation
Zero Trust at the Endpoint: Fighting Ransomware
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.
Sponsored by
Presentation
Is Your Defensive Stack Ready For A Targeted Attack?
Sponsored by
Presentation
See Risk Differently! Surface unseen risk to get ahead of threats!
Sponsored by
Keynote
“The Future of Cybersecurity”
Presentation
Cameras, CACs & Clocks: xIoT Security Sucks: A story of millions of interrogated Things
Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes.
Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer.
We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks.
These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets.
We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers.
Sponsored by
Presentation
End Cyber Risk
In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape? Join us for a technical discussion on Arctic Wolf’s mission to end cyber risk where we will demonstrate how you can navigate through your organization’s unique security journey, gain broad visibility into complex cyber-threats and set your security posture on the path of continuous improvement!
Sponsored by
Presentation
Cybersecurity Insurance: Where to Start & How to Qualify
The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.
In this upcoming session with Chris Hills, Chief Security Strategist at BeyondTrust hear how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Chris will also answer some common questions:
- How can I qualify for cybersecurity insurance – what are carriers requiring for coverage?
- What can I expect when applying for cybersecurity insurance?
- What areas of risk are most important?
Learn how your organization can not only reduce cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.
Sponsored by
Presentation
How AI Can Think Like an Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.