About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
A nationally recognized expert, David is a Senior Vice President in Marsh’s Emerging Risks Group. Prior to Marsh, David served at ReSource Pro, a global insurance services firm, as their global security executive after a 23-year career with Werner Enterprises.
In his role, David actively advises numerous enterprise CISOs, security teams, technology leaders, business executives, and Boards, with particular emphasis on cyber strategy and risk issues. The Emerging Risks Group sits at the intersection of strategy and risk deploying advanced quantitative methods to understand, measure, and manage complex risks.
In his previous position at ReSource Pro, David established a global security program across the U.S., India, and China and worked with insurance industry clients. David ensured secure delivery of services for over 6,000 offshore employees via an ISO 27001 and SSAE18 certified security program. Key initiatives included establishing global security culture, expanded internal SOC services and rapid increases in program maturity required by Fortune 500 clients.
David served as the enterprise security leader for Werner Enterprises, a nation-wide transportation services and global logistics provider. He established core security processes and underlaying technology/security systems to support complex, business aligned growth strategies. Some of his key initiatives included quantitative risk management, enterprise Identity & Access Management (IAM), vulnerability risk management, third party risk management, and board-level reporting. During this time he was also a part-time member of the SANS Institute, implementing and delivering courses.
Prior to his IT and security career, he served as an operational team member and Flight Operations Director at Goddard Space Flight Center. David also served in the U.S. Air Force as part of the Defense Meteorological Satellite Program (DMSP).
David holds a Bachelor of Science degree from the University of Maryland University College, is a Certified in Risk and Information Systems Control (CRISC) and Open FAIR.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Times are subject to change
Opening Introductions | Check In | Networking
The Future of Cybersecurity Operations
Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.
How to Build an Insider Threat Program
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
Can the phishing problem be solved?
CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach
Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.
"Information security, it's time to ask why"
The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.
Anatomy of a Disaster: Why We’re Still Losing to Ransomware
In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.
Great eXpeltations: cyber defense trends for 2023
We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023.
Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security operations center (SOC) saw in 2022, based on our full customer base: from small and midsize companies to enterprise orgs, at every phase of the security journey, across every industry Expel serves.
Join Chris Hencinski, Solutions Architect, Expel, for a deep dive into the numbers and their real-world incident counterparts, including examples of pre-ransomware, business application compromise, credential harvester phishing, SaaS compromise, and an attack against cloud infrastructure.