Omaha, NE

Wednesday, April 19, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Future of Cybersecurity Operations

Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate read more…

Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.

Bio

Jeffrey Wheat

CTO Lumu

Sponsored by

Presentation

9:30 am

How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic read more…

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
Bio

Wanda Miles

Senior Security and Compliance Program Manager Exabeam

Sponsored by

Networking

10:00 am

Networking

Presentation

10:30 am

Can the phishing problem be solved?

Bio

Carlos Munoz

Territory Manager Cloudflare

Sponsored by

Presentation

11:00 am

CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss read more…

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Bio

Jamion Aden

Solutions Architect IP Pathways
Bio

Michael Leggett

Solutions Architect Avertium

Sponsored by

11:30 am

Networking

11:45 am

Lunch

Keynote

12:15 pm

"Information security, it's time to ask why"

The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.

The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.

Bio

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh

Networking

1:15 pm

Networking

Presentation

1:45 pm

Anatomy of a Disaster: Why We’re Still Losing to Ransomware

In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.

In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.

Bio

Paul Dant

Senior Director, Cybersecurity Research Illumio

Sponsored by

Presentation

2:15 pm

Great eXpeltations: cyber defense trends for 2023

We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023. Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security read more…

We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023.

Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security operations center (SOC) saw in 2022, based on our full customer base: from small and midsize companies to enterprise orgs, at every phase of the security journey, across every industry Expel serves.

Join Chris Hencinski, Solutions Architect, Expel, for a deep dive into the numbers and their real-world incident counterparts, including examples of pre-ransomware, business application compromise, credential harvester phishing, SaaS compromise, and an attack against cloud infrastructure.

Bio

Christopher Hencinski

Solutions Architect Expel

Sponsored by

Networking

2:45 pm

Networking

Presentation

3:00 pm

Operational Technology Examined: Learning from OT attacks in the past

Bio

Stephen Mozia

Senior Practice Manager, IoT and OT Security Optiv

Sponsored by

Networking

3:30 pm

Networking

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

Manoj Regmi

VP, Technology Farmers Edge
Bio

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
Bio

Dr. Lisa McKee

Founding Partner, American Security and Privacy | Creator of ComPriSec and Zero Trust Privacy
Bio

Joshua Fugate

Director, Cybersecurity Architecture & Strategy Charles Schwab
5:00 pm

Closing Remarks

Share This