Nashville, TN
Wednesday, November 15, 2023
Hybrid
Keynote Speaker
“"Cybersecurity resilience. Building a business continuity plan in order to recover from cyber attacks."”
Jason Beaty
Vice President of Information Technology and Security Officer Promises Behavioral Health
IT executive with 23 years’ experience in Management, Security Administration, Auditing, Network Administration, and Corporate Training. Extensive Experience building policies, procedures, and mechanisms for use in HIPAA, SOX and PCI compliance.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Kevin A. McGrail
Cloud Fellow and Deputy CISO Dito
Dr. Dennis E. Leber
Director of Cybersecurity/CISO. Honest Medical Group
Barbee Mooneyhan
VP | Security, IT, and Privacy, Woebot Health WiCyS TN Affiliate and BISO Affiliate Leader
Darin McCloy
Chief Information Security Officer PolicyCo
Ammar L. Ammar
Chief Information Security Officer | Chief Technical Officer The University of Tennessee Health Science Center
Roger Brotz
CISO Acadia Healthcare
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Hacking the Cloud: Play-by-Play Attack
Security Architect Ed Lin will demonstrate how an attacker uses off-the-shelf security tools, API calls, and scripting to discover secrets in a public repository. This leads to user impersonation, privilege escalation and sensitive data discovery, and ultimately data exfiltration. We’ll show you how we can help detect and defend against these types of attacks at every step.
Sponsored by
Presentation
AI & Cybersecurity: Fears, Fumbles and Fame
Kevin A. “KAM” McGrail enjoys moving the cybersecurity needle and loves the recent focus on Artificial Intelligence (AI) tools. During this talk, KAM will discuss his thoughts on the definition of AI, the need for Ethical AI, and using AI in cybersecurity, as well as regale attendees with some lessons learned from a few AI success and failure stories.
Sponsored by
Presentation
The Future of AI in Security
There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This talk will explore:
- The history of AI, ML, and automation already in your security stack
- The dangers and challenges of unrestricted GPT and other chat bots as information sources
- Ways humans and AI can work together
- How Exabeam uses ML today and is exploring AI in the future
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
DevSecOps Alchemy: Communications, Processes and Visibility
Sponsored by
Presentation
Moving Towards a Zero Trust Mindset
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
"Cybersecurity resilience. Building a business continuity plan in order to recover from cyber attacks."
Jason Beaty
Vice President of Information Technology and Security Officer Promises Behavioral Health
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Cloud Security Update: Trends, Learning and Best Practices
Sponsored by
Presentation
xIoT Hacking Demonstrations to Disappoint Bad Actors
We’ve unleashed our dark allies from the nightmare dimension on an unholy crusade to demonstrate cyberattacks for your enlightenment. If you love seeing devices compromised as much as we do, join us for hacking demonstrations, detailed security research findings, and threat mitigation techniques that will disappoint cybercriminals. We’ll demonstrate several hacks against xIoT, or Extended Internet of Things, devices. For those who would say, “But they’re just security cameras monitoring the parking garage, wireless access points in the cafeteria, PLCs controlling robotic welding arms, or our OT devices aren’t at risk like our IT devices are; what harm can they cause?” – this will illuminate that harm.
xIoT (IoT, OT and network assets) encompasses disparate but interrelated device groups with purpose-built hardware and firmware, are typically network-connected, run well-known operating systems and disallow the installation of traditional endpoint security controls. In addition, many xIoT devices have open ports, protocols, storage, memory, and processing capabilities. Even though most industrial environments have tens to hundreds of thousands of these devices in production, they go largely unmanaged and unmonitored and operate with weak credentials, old, vulnerable firmware, extraneous services, and problematic certificates.
Cybercriminals have shifted their focus to xIoT attacks. Why? Because they work. This massive, vulnerable attack surface is being successfully exploited by bad actors engaging in cyber espionage, data exfiltration, sabotage, and extortion, impacting xIoT assets. And this is especially true for operational technology as businesses gain powerful business benefits but increase their risk as OT and IT infrastructures converge.
Bad actors count on you being passive. They want you to fail so they can continue to evade detection and maintain persistence on your devices. Disappoint them! Take your devices back by understanding how to hack them, recognizing where they’re most vulnerable, and employing strategies to successfully protect them at scale.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Protecting Data in a Distributed World
Change is the only constant.
Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices.
Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.
Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.
No man steps in the same river twice
Sponsored by
Presentation
End Cyber Risk
In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape? Join us for a technical discussion on our mission to end cyber risk where we will demonstrate how you can navigate through your organization’s unique security journey, gain broad visibility into complex cyber-threats and set your security posture on the path of continuous improvement!
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!