Home / / New Jersey

New Jersey CyberSecurity Conference

November 5, 2020

Hybrid Event

Earn up to 8 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

CISO Keynote Speaker

Renee Guttmann

Chief Information Security Officer Campbell Soup Company

Renee Guttmann is Chief Information Security Officer (CISO) for the Campbell Soup Company.
As CISO, Renee is responsible for enhancing and maintaining the information security program
to ensure that information assets and associated technology, applications, systems, infrastructure
and processes are adequately protected in the digital ecosystem in which we operate.

Renee is an accomplished information security executive with over 25 years of experience
managing technology risk for global corporations across multiple industries.

Renee started her career in Information Security at GlaxoSmithKline before the Internet was
accessible for commercial use. She implemented firewalls and encryption products to support the
protection of the GSK’s crown jewels, including patient information.

She was recruited to Capital One to build the first global information security program and enable
customers to retrieve their credit card statements online.

She then spent 11 years at Time Warner, where she built the information security program for Time Inc. as well as leading the Incident Response Program for AOL Time Warner from 2000 – 2007.
In 2008, Renee became the first Chief Privacy Officer for Time Warner and established the privacy program for the Company’s Shared Service Systems.

Consumer products came next as Renee built the first global Information
Security program for Coca-Cola from 2011 – 2014.

Prior to joining Campbell, Renee established the Information Security Program at Royal Caribbean
Cruise Lines, where she built that industry’s very first Maritime Cybersecurity program to protect
ships and passengers at sea.

As an information security practitioner, Renee was one of the first women in the field. She is
considered a thought leader as well as an early adopter of the technologies and best practices that
are considered standard in the industry today. She has mentored dozens of employees who are
now leading global information security programs at other companies across many industries.
Renee brings experience and a passion for the industry to Campbell’s.

In her spare time, she serves on the Board for Hillside Community Services for Children in Atlanta and is an advisor to the Rutgers University Cybersecurity Program.

Panel Discussion: The Next Generation of Cybersecurity

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances
Accellion

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

8:00 am – 8:45 am

Networking Coffee and Lite Fare

Presentation

8:45 am – 9:15 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Joel York

Chief Marketing Officer Accellion
Bio

Presentation

9:15 am – 9:45 am

Decision Automation Software for Security Operations

Presentation

9:45 am – 10:15 am

Detect. Hunt. Respond.

10:15 am – 10:45 am

Vendor and Peer Networking

Presentation

10:45 am – 11:15 am

Scaling network security

Corsa Logo

Presentation

11:15 am – 11:45 am

Managing Passwords Isn’t Enough – A Universal Approach to PAM

Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment, and once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware and inflict damage.Enterprises of all sizes have experienced a privilege explosion, driven by trends like cloud computing, DevOps, edge computing and the proliferation of non-human identities and accounts. As a result, privileged access is pervasive across the modern IT environment, yet it is often inadequately managed and monitored. Many organizations assume that password management will solve the privilege problem—but it’s only a partial solution. Relying on password management alone leaves dangerous gaps in protection, and further steps must be done to disrupt the cyberattack chain with privileged access security controls.

By attending this session, you will understand:

  • Why relying on password management alone leaves dangerous gaps in protection
  • How to disrupt the cyberattack chain with privileged access security controls
  • Steps to achieving rapid leaps in risk reduction
  • Keys to a frictionless PAM solution that is invisible to end users

Join our conversation as we discussbest practices around securing privileged accountsand how a Universal Privilege Management (UPM) model can be used to secure every user, session and asset across your IT environment.

Donald Hasson

Senior Director, Product Management BeyondTrust
Bio
BeyondTrust logo

11:45 am – 12:00 pm

Vendor and Peer Networking

Keynote

12:00 pm – 1:00 pm

Lunch / Keynote Speaker

]

Renee Guttmann

Chief Information Security Officer Campbell Soup Company
Bio

Presentation

1:00 pm – 1:30 pm

Simple is better

OneLogin Logo

Presentation

1:30 pm – 2:00 pm

Zero Trust Privilege

Centrify Logo

Presentation

2:00 pm – 2:30 pm

World-Leading Cyber AI

Darktrace Logo

2:30 pm – 2:45 pm

Vendor and Peer Networking

Presentation

2:45 pm – 3:15 pm

Empower all organizations to understand and reduce their cyber risk

Tenable Logo

Presentation

3:15 pm – 3:45 pm

Innovating access to critical IT infrastructure

How can access management keep up with a multi-vendor (AWS, Azure, GCP, OpenStack), multi-role (3rd party, developer, database admin) and multi-protocol (SSH/RDP/HTTPS) world where nothing is static?

We will discusses why granting, revoking and managing access to the critical infrastructure needs innovation. Learn how identities are federated, access management is mostly automated with Zero Trust authentication, global cloud inventories auto-discovered, deployment is fast & scalable – and access is granted just-in-time, with the right amount of privilege for the task at hand.

Markku Rossi

Chief Technology Officer SSH Communications Security
Bio
SSH Logo

3:45 pm – 4:00 pm

Peer Networking / Cocktail Reception

Panel Discussion

4:00 pm – 4:45 pm

Panel Discussion: The Next Generation of Cybersecurity

Traditionally, CISOs have focused on protecting the business. But if CISOs prevent the business from operating efficiently, bullet proof cybersecurity is pointless. How do CISOs protect their organizations without losing sight of the bigger picture of business growth? Today’s cybersecurity leaders share key strategies, technologies, and processes they utilize to strike the appropriate balance.

This panel of experts will share lessons learned and how to apply them to:

  • Which technologies are must have’s vs. which are nice-to-have’s
  • Managing third party risk
  • Combatting the insider threat
  • Zero-trust security – a great idea in theory but is it realistic?
  • The impact of AI on threat intelligence
Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances Accellion
Bio

4:45 pm – 6:00 pm

Closing Remarks / Networking Cocktail Reception

Live Presentation

HARNESSING THE "POWER OF UNIFIED IT"

Register