About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email firstname.lastname@example.org
Guest Keynote Speakers
Times are subject to change
Sponsor Booth Networking Time
Building Cyber Resilience: Finding Factors not Fault
Seeing the forest through the trees - A risked based approach to maturing your VMP
"Data Privacy" Celebrate Data Privacy Day Early- an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust
Leslie K. Lambert has more than 35 years experience, Lambert’s deep IT knowledge base extends across architecture, business infrastructure, operations, security, data protection and technical infrastructure. Prior to Juniper Networks, Lambert was an IT executive at Sun Microsystems for 18 years and served as Sun’s CISO.
She received CSO Magazine’s 2010 Compass Award for security leadership and was named one of Computerworld’s Premier 100 IT Leaders in 2009. An Anita Borg Institute Ambassador since 2006, Lambert has mentored women across the world in technology. Lambert has also served on the board of the Bay Area CSO Council since 2005, and as its President since 2016.
Making the SOC more effective by enabling automation with better data
Live Interactive Session
A View from the C-Suite: The Real-Life Story From an APT Insider Attack Victim and his Pivot to Help Defend the Digital Universe
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.
In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI
The need for post-quantum cybersecurity and its seamless integration.
Quantum advancements have rapidly accelerated in 2020 and continue to do so in 2021; this directly affects our current security measures. Some people say that quantum computers are years away just like there are still people believing the Earth is flat. Almost all big tech firms and government agencies are heavily invested in quantum advancements. In fact, in 2016 NSA suggested that corporations and agencies become quantum-safe.
Post-quantum cybersecurity is a cryptographic technology to withstand the hacking power of quantum computers. Most importantly, post-quantum cybersecurity is designed to be installed on conventional computers to allow current infrastructures to continue to be safe in the post-quantum era.
Uncover The Path to Ransomware
Many organizations in various industries have been the target of these specially crafted attacks. These attacks are well thought out and staged by some notorious syndicates.
Crime syndicates use different trojans and malware for reconnaissance and exfiltration before deploying ransomware. Braintrace continually researches the latest malware threats and consistently discovers new zero-day attacks. Understanding the latest threat landscape is essential to know the strategies of these bad actors. In doing so, it dramatically increases the chance to stop attacks before malware is deployed.
Join us to learn about how these threats are constructed and how to protect your organization from being impacted by malicious attacks.
Are you ready for Intelligent SOC?
Talking to the Board About the New Realities of IT Security
When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.
Join this virtual boardroom to discuss:
- Achieving alignment across the board
- Building a “roadmap to yes”
- Focusing on risk and reward for core business objectives
The Art of Compliance: How to build a defensible compliance program
When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources.
But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it.
Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps.
Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization.
During this event they will discuss:
Moving to a zero-trust model
Why certifications are just the start
How automation future-proofs for change
Reframing the narrative from a cost center to profit protector/business enabler