Philadelphia, PA

Thursday, May 4, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

9:00 am

AI and Zero Trust : The inevitable enrichments of SIEM and IAM

Bio

Anandh Palanisamy

Senior Product Expert ManageEngine

Sponsored by

Presentation

9:30 am

How AI Can Think Like an Attacker

Bio

Ryan Schuler

Senior Cyber Technology Specialist Darktrace

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

AI and You: Is it a Shared Future?

Amidst the fear and hype surrounding AI, it’s important to take a grounded and realistic approach to understanding its potential impact on humanity. We examine the current state of AI and its potential trajectory, and what will it take to shape the future.

Amidst the fear and hype surrounding AI, it’s important to take a grounded and realistic approach to understanding its potential impact on humanity. We examine the current state of AI and its potential trajectory, and what will it take to shape the future.

Bio

Fayyaz Makhani

Global Security Architect Viking Cloud

Sponsored by

Presentation

11:00 am

Prioritize Your Attack Surface

Cyber security is hard, and often one hears that being breached is not a question of “if” but “when?”  In this talk, we will give you reasons why ensuring good cybersecurity is a “winnable” battle, and how it starts with knowing your attack surface.  Of course, this begs the question, read more…

Cyber security is hard, and often one hears that being breached is not a question of “if” but “when?”  In this talk, we will give you reasons why ensuring good cybersecurity is a “winnable” battle, and how it starts with knowing your attack surface.  Of course, this begs the question, “what is my attack surface?”  By looking at it from an attacker’s perspective, we’ll explore how complex this question can be, and discuss steps you can take to minimize the risks involved.

Bio

Glenn Wong, PhD

Director of Product Management, Technology Partnerships Recorded Future

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:15 pm

“Building a Stronger Cybersecurity Community”

Bio

Keith McMenamin

Vice President of Information Technology Visit Philadelphia

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Java Security: Focused, Effective, and Under-Complicated

As one of the most popular software languages 20+ years running, Java has many security capabilities built into it already. Instead of shifting left with work and adding steps, you can shift a decision left about how you’ll use the JVM with things it already does. Instead of bolting security on (just earlier), read more…

As one of the most popular software languages 20+ years running, Java has many security capabilities built into it already. Instead of shifting left with work and adding steps, you can shift a decision left about how you’ll use the JVM with things it already does. Instead of bolting security on (just earlier), you can integrate it more easily. This means more trust with your development and operations teams because they don’t need to do as much, and your team sounds more credible and influential by speaking the same terms that developers use. As you will learn in this interactive session, simple adjustments or ways of discussing the JVM can yield big security improvements.

Bio

Erik Costlow

Senior Director of Product Management Azul

Sponsored by

Presentation

2:15 pm

Secure Networks

Bio

Suraj Chandrasekaran

Global SASE PreSales Leader Versa Networks

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic read more…

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices—showing risk faster
  • An automated investigation experience that replaces manual routines and effectively guides new insider threat teams
Bio

Abel Morales

Principal Security Engineer Exabeam

Sponsored by

Networking

3:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Dr. Dele Bankole

Director, IT Security Center for Employment Opportunities
Bio

David Lingenfelter

Vice President of Information Security Penn Entertainment
Bio

Anahi Santiago

Chief Information Security Officer ChristianaCare
Bio

Brian Martin

Chief Information Security Officer Liticode
5:00 pm

Closing Remarks

Share This