Omaha, NE
Wednesday, April 19, 2023
Hybrid
Keynote Speaker
“"Information security, it's time to ask why"”
David Elfering
Chief Information Security Officer Carrix
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Marc Johnson
CISO / Director / vCISO / vCIO Impact Advisors
Manoj Regmi
VP, Technology Farmers Edge
David Elfering
Chief Information Security Officer Carrix
Dr. Lisa McKee
Founding Partner, American Security and Privacy | Creator of ComPriSec and Zero Trust Privacy
Joshua Fugate
Director, Cybersecurity Architecture & Strategy Charles Schwab
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The Future of Cybersecurity Operations
Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.
Sponsored by
Presentation
How to Build an Insider Threat Program
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
Sponsored by
Networking
Networking
Presentation
Can the phishing problem be solved?
Sponsored by
Presentation
CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach
Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.
Sponsored by
Networking
Lunch
Keynote
"Information security, it's time to ask why"
The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.
Networking
Networking
Presentation
Anatomy of a Disaster: Why We’re Still Losing to Ransomware
In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.
Sponsored by
Presentation
Great eXpeltations: cyber defense trends for 2023
We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023.
Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security operations center (SOC) saw in 2022, based on our full customer base: from small and midsize companies to enterprise orgs, at every phase of the security journey, across every industry Expel serves.
Join Chris Hencinski, Solutions Architect, Expel, for a deep dive into the numbers and their real-world incident counterparts, including examples of pre-ransomware, business application compromise, credential harvester phishing, SaaS compromise, and an attack against cloud infrastructure.