Nashville, TN

Wednesday, November 2, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Overcoming the Global Cyber Skills Shortage to Build High-Performing Cyber Teams

As cyber professionals we are all navigating a perfect storm: The industry today is worth $362 billion, up from $156 billion in 2021, the number of cyber attacks doubled between 2020 and 2021 and yet the global cyber skills shortage continues to dominate the cyber job market and we’re now read more…

As cyber professionals we are all navigating a perfect storm: The industry today is worth $362 billion, up from $156 billion in 2021, the number of cyber attacks doubled between 2020 and 2021 and yet the global cyber skills shortage continues to dominate the cyber job market and we’re now dealing with the post-pandemic ‘Great Reset’.  Daniel will discuss the challenges of building cyber teams in this environment, the importance of providing careers and not jobs and provide some guidance on getting your chance in they Cyber Security industry.

Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender

Sponsored by

Presentation

9:30 am

Zero Trust at the Endpoint: Fighting Ransomware

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.

Bio

Chad Maskill

Cyber Hero ThreatLocker

Sponsored by

Presentation

10:30 am

Is Your Defensive Stack Ready For A Targeted Attack?

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing read more…
Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.
Bio

Jake Flynn

Solutions Engineer Pentera

Sponsored by

Presentation

11:00 am

See Risk Differently! Surface unseen risk to get ahead of threats!

Bio

Meghan Maneval

Director of Technical Product Management Reciprocity

Sponsored by

Keynote

12:00 pm

“The Future of Cybersecurity”

Bio

Dr. Dennis E. Leber

Director of Cybersecurity/CISO. Honest Medical Group

Presentation

1:30 pm

Cameras, CACs & Clocks: xIoT Security Sucks: A story of millions of interrogated Things

Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices read more…

Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes.

Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer.

We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks.

These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets.

We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers.

Bio

John Vecchi

Chief Marketing Officer Phosphorus Cybersecurity

Sponsored by

Presentation

2:00 pm

End Cyber Risk

In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape? Join us for a technical discussion on read more…

In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape? Join us for a technical discussion on Arctic Wolf’s mission to end cyber risk where we will demonstrate how you can navigate through your organization’s unique security journey, gain broad visibility into complex cyber-threats and set your security posture on the path of continuous improvement!

Bio

Adam Herbert

SE Director Arctic Wolf

Sponsored by

Presentation

2:45 pm

Cybersecurity Insurance: Where to Start & How to Qualify

The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent. In this upcoming session with Chris Hills, Chief Security Strategist read more…

The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.

In this upcoming session with Chris Hills, Chief Security Strategist at BeyondTrust hear how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Chris will also answer some common questions:

  • How can I qualify for cybersecurity insurance – what are carriers requiring for coverage?
  • What can I expect when applying for cybersecurity insurance?
  • What areas of risk are most important?

Learn how your organization can not only reduce cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.

Bio

Christopher Hills

Deputy Chief Technology Officer BeyondTrust

Sponsored by

Presentation

3:15 pm

How AI Can Think Like an Attacker

 In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to read more…

 In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Bio

Cameron Molfetto

Cybersecurity Specialist Darktrace

Sponsored by

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Mark Bruns

SVP | CISO FirstBank
Bio

Dr. Dennis E. Leber

Director of Cybersecurity/CISO. Honest Medical Group
Bio

Robert Wagner

Field CISO | Executive Advisor/Strategist | Client Advocate | Highly Rated Keynote Speaker | Hak4Kidz Co-Founder Fletch
Bio

Peter Gallinari

Data Privacy Officer State of Tennessee
Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender
Bio

Barbee Mooneyhan

Security and Privacy Leader WiCyS TN Affiliate and BISO Affiliate Leader

Closing Remarks

5:00 pm

Closing Remarks

Share This