Snehal Contractor is responsible for Worldwide Systems Engineering and Technical Service at Stellar Cyber. He is an engineering professional with over 30 years of experience in technical sales, marketing, and management. Snehal has worked for startup companies such as Netscreen, Palo Alto Networks, Riverbed, Fortinet, Aerohive, Cisco, and USRobotics. During his tenure at these companies, he has supported the largest Service Providers and System Integrators globally. Some of the accounts he has supported are Accenture, Dimension Data, Verizon, French Telecom, ATT, Forsythe Security, and Sprint; these accounts eventually became the top partners for his company. Snehal is called upon to be a trusted consultant to on-board these global partners from business development to complete technical enablement. Snehal earned his Bachelor of Science in Electrical Engineering and Computer Science from University of Illinois.
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
Anne Marie Zettlemoyer is a senior security executive with over 20 years of experience in 8 industries. Sitting at the intersection of business, security, and analytics, Anne Marie has served as a trusted advisor for Fortune 500 companies, government agencies, law enforcement, security vendors, and think tanks. She is a Vice President of Security Engineering and Business Security Officer at Mastercard, a visiting National Security Institute Fellow at GMU’s Scalia Law School, and has held a number of strategic and technical security leadership roles including the Head of Security Architecture, Engineering, and Solutions at Freddie Mac, Director of the Cyber Think Tank at Capital One, Director of Business Analytics at FireEye, and Special Advisor for the Director of the US Secret Service. She has served on the board of directors and advisors for security companies and non profits, and advocated for security policies and improvements on Capitol Hill. In addition to CISSP and CeH certifications, Anne Marie holds an MBA from the University of Michigan-Ann Arbor as well as undergraduate degrees in both Accounting and Finance.
Premier Platinum Sponsors
Times are subject to change
7 Habits of Highly Effective CISOs
Evolution of Security Operations, the rise of the X Factor
"Strategies to Improve SOC Efficacy"
Conquering Cyber Risk in 3rd Party Communications
The Enterprise Content Firewall
To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.
“Cybercriminals are Watching, Are You Watching Them?"
The criminals know everything about us and we typically know little or nothing about them until an attack begins. Which means every piece of intelligence we can gather improves our chances of deflecting an attack. Enhanced visibility and intelligence lets organizations close off weak links in their supply chains and eliminate vulnerable points of entry. Join us to learn what cybersecurity leaders are doing in counter intelligence to respond to cyberthreats in real time.
Death, Taxes, & Ransomware: Make the Inevitable, Avoidable
Hybrid. It’s Never Only One Thing.
Cyber Resilience for Digital Operations
Leveraging IAM for Effective and Efficient Threat Mitigation
The Past, Present and Future of Strong Authentication
Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective. Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.
In this talk, we will discuss:
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
The Battle of Algorithms: How AI is beating AI at its own game
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike. In this session, discover:
- How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
- What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
- Why defensive AI technologies are uniquely positioned to fight back