Orange County, CA (Western Region)
Wednesday, January 27, 2021
Virtual
Guest Keynote Speakers
“"Data Privacy" Celebrate Data Privacy Day Early- an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust”
Leslie K. Lambert
Chief Executive Officer Lambert Advanced Security and Privacy, LLC,
Leslie K. Lambert is the Chief Executive Officer for Lambert Advanced Security and Privacy, LLC, a woman-owned small business focused on delivering precise consulting on key information security, privacy and risk issues to high-level clients and partners. Prior to her targeted consulting activities, Lambert was the Chief Security and Strategy Officer for GuruCul Solutions, LLC […]
A View from the C-Suite: The Real-Life Story From an APT Insider Attack Victim and his Pivot to Help Defend the Digital Universe
Gary Berman
CEO of Cyberman Security, LLC Creator, The Cyber Hero Adventures: Defenders of the Digital Universe
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Live
Opening Introductions
Networking
Sponsor Booth Networking Time
Presentation
Building Cyber Resilience: Finding Factors not Fault
Sponsored by
Presentation
Seeing the forest through the trees - A risked based approach to maturing your VMP
Sponsored by
Live Keynote
"Data Privacy" Celebrate Data Privacy Day Early- an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust
Leslie K. Lambert has more than 35 years experience, Lambert’s deep IT knowledge base extends across architecture, business infrastructure, operations, security, data protection and technical infrastructure. Prior to Juniper Networks, Lambert was an IT executive at Sun Microsystems for 18 years and served as Sun’s CISO.
She received CSO Magazine’s 2010 Compass Award for security leadership and was named one of Computerworld’s Premier 100 IT Leaders in 2009. An Anita Borg Institute Ambassador since 2006, Lambert has mentored women across the world in technology. Lambert has also served on the board of the Bay Area CSO Council since 2005, and as its President since 2016.
Presentation
Making the SOC more effective by enabling automation with better data
SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.
Sponsored by
Live Interactive Session
A View from the C-Suite: The Real-Life Story From an APT Insider Attack Victim and his Pivot to Help Defend the Digital Universe
Gary Berman
CEO of Cyberman Security, LLC Creator, The Cyber Hero Adventures: Defenders of the Digital Universe
Presentation
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.
In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI
Sponsored by
Presentation
The need for post-quantum cybersecurity and its seamless integration.
Quantum advancements have rapidly accelerated in 2020 and continue to do so in 2021; this directly affects our current security measures. Some people say that quantum computers are years away just like there are still people believing the Earth is flat. Almost all big tech firms and government agencies are heavily invested in quantum advancements. In fact, in 2016 NSA suggested that corporations and agencies become quantum-safe.
Post-quantum cybersecurity is a cryptographic technology to withstand the hacking power of quantum computers. Most importantly, post-quantum cybersecurity is designed to be installed on conventional computers to allow current infrastructures to continue to be safe in the post-quantum era.
Sponsored by
Presentation
Uncover The Path to Ransomware
Many organizations in various industries have been the target of these specially crafted attacks. These attacks are well thought out and staged by some notorious syndicates.
Crime syndicates use different trojans and malware for reconnaissance and exfiltration before deploying ransomware. Braintrace continually researches the latest malware threats and consistently discovers new zero-day attacks. Understanding the latest threat landscape is essential to know the strategies of these bad actors. In doing so, it dramatically increases the chance to stop attacks before malware is deployed.
Join us to learn about how these threats are constructed and how to protect your organization from being impacted by malicious attacks.
Sponsored by
Presentation
Are you ready for Intelligent SOC?
Sponsored by
Presentation
Talking to the Board About the New Realities of IT Security
When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.
Join this virtual boardroom to discuss:
- Achieving alignment across the board
- Building a “roadmap to yes”
- Focusing on risk and reward for core business objectives
Sponsored by
Presentation
The Art of Compliance: How to build a defensible compliance program
When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources.
But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it.
Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps.
Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization.
During this event they will discuss:
-
Moving to a zero-trust model
-
Why certifications are just the start
-
How automation future-proofs for change
-
Reframing the narrative from a cost center to profit protector/business enabler