Nashville, TN

Wednesday, November 15, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Hacking the Cloud: Play-by-Play Attack

Security Architect Ed Lin will demonstrate how an attacker uses off-the-shelf security tools, API calls, and scripting to discover secrets in a public repository. This leads to user impersonation, privilege escalation and sensitive data discovery, and ultimately data exfiltration. We’ll show you how we can help detect and defend against read more…

Security Architect Ed Lin will demonstrate how an attacker uses off-the-shelf security tools, API calls, and scripting to discover secrets in a public repository. This leads to user impersonation, privilege escalation and sensitive data discovery, and ultimately data exfiltration. We’ll show you how we can help detect and defend against these types of attacks at every step.

Bio

Ed Lin

Security Architect Varonis

Sponsored by

Presentation

9:15 am

AI & Cybersecurity: Fears, Fumbles and Fame

Kevin A. “KAM” McGrail enjoys moving the cybersecurity needle and loves the recent focus on Artificial Intelligence (AI) tools.  During this talk, KAM will discuss his thoughts on the definition of AI, the need for Ethical AI, and using AI in cybersecurity, as well as regale attendees with some lessons read more…

Kevin A. “KAM” McGrail enjoys moving the cybersecurity needle and loves the recent focus on Artificial Intelligence (AI) tools.  During this talk, KAM will discuss his thoughts on the definition of AI, the need for Ethical AI, and using AI in cybersecurity, as well as regale attendees with some lessons learned from a few AI success and failure stories.

Bio

Kevin A. McGrail

Cloud Fellow and Deputy CISO Dito

Sponsored by

Presentation

9:45 am

The Future of AI in Security

There seems to be a new article every day  covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting read more…

There seems to be a new article every day  covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?

Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?

This talk will explore:

  • The history of AI, ML, and automation already in your security stack
  • The dangers and challenges of unrestricted GPT and other chat bots as information sources
  • Ways humans and AI can work together
  • How Exabeam uses ML today and is exploring AI in the future
Bio

Andrew Donahoe

Senior Solutions Engineer Exabeam

Sponsored by

Networking

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

DevSecOps Alchemy: Communications, Processes and Visibility

The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were read more…
The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus  good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps.
Bio

Kevin Sisney

Solutions Engineer Seemplicity

Sponsored by

Presentation

11:15 am

Moving Towards a Zero Trust Mindset

Bio

Ryan Benson

Field Solutions Engineer Cloudflare

Sponsored by

Networking

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

"Cybersecurity resilience. Building a business continuity plan in order to recover from cyber attacks."

Bio

Jason Beaty

Vice President of Information Technology and Security Officer Promises Behavioral Health

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Cloud Security Update: Trends, Learning and Best Practices

Bio

Mark Mastrangeli

Cloud Engagement Director Palo Alto Networks

Sponsored by

Presentation

2:15 pm

xIoT Hacking Demonstrations to Disappoint Bad Actors

We’ve unleashed our dark allies from the nightmare dimension on an unholy crusade to demonstrate cyberattacks for your enlightenment. If you love seeing devices compromised as much as we do, join us for hacking demonstrations, detailed security research findings, and threat mitigation techniques that will disappoint cybercriminals. We’ll demonstrate several read more…

We’ve unleashed our dark allies from the nightmare dimension on an unholy crusade to demonstrate cyberattacks for your enlightenment. If you love seeing devices compromised as much as we do, join us for hacking demonstrations, detailed security research findings, and threat mitigation techniques that will disappoint cybercriminals. We’ll demonstrate several hacks against xIoT, or Extended Internet of Things, devices. For those who would say, “But they’re just security cameras monitoring the parking garage, wireless access points in the cafeteria, PLCs controlling robotic welding arms, or our OT devices aren’t at risk like our IT devices are; what harm can they cause?” – this will illuminate that harm.

xIoT (IoT, OT and network assets) encompasses disparate but interrelated device groups with purpose-built hardware and firmware, are typically network-connected, run well-known operating systems and disallow the installation of traditional endpoint security controls. In addition, many xIoT devices have open ports, protocols, storage, memory, and processing capabilities. Even though most industrial environments have tens to hundreds of thousands of these devices in production, they go largely unmanaged and unmonitored and operate with weak credentials, old, vulnerable firmware, extraneous services, and problematic certificates.

Cybercriminals have shifted their focus to xIoT attacks. Why? Because they work. This massive, vulnerable attack surface is being successfully exploited by bad actors engaging in cyber espionage, data exfiltration, sabotage, and extortion, impacting xIoT assets. And this is especially true for operational technology as businesses gain powerful business benefits but increase their risk as OT and IT infrastructures converge.

Bad actors count on you being passive. They want you to fail so they can continue to evade detection and maintain persistence on your devices. Disappoint them! Take your devices back by understanding how to hack them, recognizing where they’re most vulnerable, and employing strategies to successfully protect them at scale.

Bio

John Vecchi

Chief Marketing Officer Phosphorus Cybersecurity

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Protecting Data in a Distributed World

Change is the only constant. Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices. Today that model has changed dramatically; both company confidential and customer read more…

Change is the only constant.

Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices.

Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.

Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.

No man steps in the same river twice

Bio

Ken Roberts

Senior Sales Engineer Next DLP

Sponsored by

Presentation

3:30 pm

End Cyber Risk

In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape?  Join us for a technical discussion on read more…

In an ever-changing cybersecurity landscape, it’s easy to get lost in a sea of new security tools. How do you know if you have the right security mix? Wouldn’t it be easier if your security posture evolved with the rapidly changing threat landscape?  Join us for a technical discussion on our mission to end cyber risk where we will demonstrate how you can navigate through your organization’s unique security journey, gain broad visibility into complex cyber-threats and set your security posture on the path of continuous improvement!

Bio

David Beasley

Senior Sales Engineer, Arctic Wolf

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Kevin A. McGrail

Cloud Fellow and Deputy CISO Dito
Bio

Dr. Dennis E. Leber

Director of Cybersecurity/CISO. Honest Medical Group
Bio

Barbee Mooneyhan

VP | Security, IT, and Privacy, Woebot Health | WiCyS TN Affiliate and BISO Affiliate Leader
Bio

Darin McCloy

Chief Information Security Officer PolicyCo
Bio

Ammar L. Ammar

Chief Information Security Officer | Chief Technical Officer The University of Tennessee Health Science Center
Bio

Roger Brotz

CISO Acadia Healthcare

Closing Remarks

5:15 pm

Closing Remarks

Share This