Nashville CyberSecurity Conference
Wednesday, November 2, 2022 CT
Live in Person @ Omni Nashville Hotel
In Person | Virtual | Hybrid
Earn up to 10 CPE credits
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email firstname.lastname@example.org
“The Future of Cybersecurity”
Dr. Dennis E. Leber
Interim Chief Information Security Officer UConn Health
Dennis is a proud Kentuckian who now calls Tennessee home; he is a father, Husband, Grand Father, and Veteran. Dennis started his Information Security career in the Military and has worked in the Automotive, Healthcare, Federal Government, Higher Education, and Finance Industries as an Information Security Leader. Dennis currently serves as the Chief Information Security Officer (CISO) for UCONN Health. Previous roles include the CISO & Chief Technology Officer (CTO) at The University of Tennessee Health and Science Center (UTHSC), and CISO for the Cabinet for Health and Family Services (CHFS) at the Commonwealth of Kentucky.
Dennis has a passion for Information Security and igniting that same passion in others to create future leaders. Dennis teaches Information Security courses at different colleges and regularly speaks at conferences and group events.
Dennis holds an Associate’s Degree in Business Management, a Bachelor’s of Science in Information Security, a Master’s of Information Systems, and a Ph.D. in Technology – Cybersecurity.
Some of Dennis’ most recent accomplishments include:
- Named one of the top 100 CISOs 2021
- Named to the Cybersecurity Hall of Fame 2020
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Field CISO | Executive Advisor/Strategist | Client Advocate | Highly Rated Keynote Speaker | Hak4Kidz Co-Founder
Premier Platinum Sponsors
Times are subject to change
Opening Introductions | Check In | Networking
Overcoming the Global Cyber Skills Shortage to Build High-Performing Cyber Teams
As cyber professionals we are all navigating a perfect storm: The industry today is worth $362 billion, up from $156 billion in 2021, the number of cyber attacks doubled between 2020 and 2021 and yet the global cyber skills shortage continues to dominate the cyber job market and we’re now dealing with the post-pandemic ‘Great Reset’. Daniel will discuss the challenges of building cyber teams in this environment, the importance of providing careers and not jobs and provide some guidance on getting your chance in they Cyber Security industry.
Zero Trust at the Endpoint: Fighting Ransomware
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.
Cyber Hero ThreatLocker
Is Your Defensive Stack Ready For A Targeted Attack?
Solutions Engineer Pentera
See Risk Differently! Surface unseen risk to get ahead of threats!
Director of Technical Product Management Reciprocity
“The Future of Cybersecurity”
Cameras, CACs & Clocks: xIoT Security Sucks: A story of millions of interrogated Things
Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes.
Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer.
We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks.
These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets.
We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers.
Chief Marketing Officer Phosphorus Cybersecurity
End Cyber Risk
In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape? Join us for a technical discussion on Arctic Wolf’s mission to end cyber risk where we will demonstrate how you can navigate through your organization’s unique security journey, gain broad visibility into complex cyber-threats and set your security posture on the path of continuous improvement!
SE Director Arctic Wolf
Cybersecurity Insurance: Where to Start & How to Qualify
The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.
In this upcoming session with Chris Hills, Chief Security Strategist at BeyondTrust hear how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Chris will also answer some common questions:
- How can I qualify for cybersecurity insurance – what are carriers requiring for coverage?
- What can I expect when applying for cybersecurity insurance?
- What areas of risk are most important?
Learn how your organization can not only reduce cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.
Deputy Chief Technology Officer BeyondTrust
How AI Can Think Like an Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.