Philadelphia, PA
Thursday, May 4, 2023
Hybrid
Keynote Speaker
““Building a Stronger Cybersecurity Community””
Keith McMenamin
Vice President of Information Technology Visit Philadelphia
Keith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 16 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building the technical infrastructure for an award-winning organization that was responsible for creating $12 billion dollars in economic impact for the city of Philadelphia in 2019. Over the years, he quickly became a trusted advisor to C-Suite executives along with evolving into the “go-to tech guy” for friends and colleagues in the local tourism marketing and media industries.
Keith is a regular speaker and panelist at national industry conferences. He serves on the advisory council of two local schools to review technology curriculum taught to students. He is an active mentor in many groups for aspiring IT professionals in the Philadelphia area. Outside of the office Keith enjoys playing sports, spending time with his family and taking long vacations to Southern California. He earned a bachelor’s degree in computer science from Purdue University Global and is the proud father of his new baby girl Michaela.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Keith McMenamin
Vice President of Information Technology Visit Philadelphia
Dr. Dele Bankole
Director, IT Security Center for Employment Opportunities
David Lingenfelter
Vice President of Information Security Penn Entertainment
Anahi Santiago
Chief Information Security Officer ChristianaCare
Brian Martin
Chief Information Security Officer Liticode
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Opening Introductions | Check In | Networking
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
AI and Zero Trust : The inevitable enrichments of SIEM and IAM
Sponsored by
Presentation
How AI Can Think Like an Attacker
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
AI and You: Is it a Shared Future?
Amidst the fear and hype surrounding AI, it’s important to take a grounded and realistic approach to understanding its potential impact on humanity. We examine the current state of AI and its potential trajectory, and what will it take to shape the future.
Sponsored by
Presentation
Prioritize Your Attack Surface
Cyber security is hard, and often one hears that being breached is not a question of “if” but “when?” In this talk, we will give you reasons why ensuring good cybersecurity is a “winnable” battle, and how it starts with knowing your attack surface. Of course, this begs the question, “what is my attack surface?” By looking at it from an attacker’s perspective, we’ll explore how complex this question can be, and discuss steps you can take to minimize the risks involved.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
“Building a Stronger Cybersecurity Community”
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Java Security: Focused, Effective, and Under-Complicated
As one of the most popular software languages 20+ years running, Java has many security capabilities built into it already. Instead of shifting left with work and adding steps, you can shift a decision left about how you’ll use the JVM with things it already does. Instead of bolting security on (just earlier), you can integrate it more easily. This means more trust with your development and operations teams because they don’t need to do as much, and your team sounds more credible and influential by speaking the same terms that developers use. As you will learn in this interactive session, simple adjustments or ways of discussing the JVM can yield big security improvements.
Sponsored by
Presentation
Secure Networks
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
How to Build an Insider Threat Program
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices—showing risk faster
- An automated investigation experience that replaces manual routines and effectively guides new insider threat teams
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!