Home / / Philadelphia, PA

Philadelphia Cybersecurity Conference

Thursday, May 4, 2023

Live in Person @ Sheraton Valley Forge Hotel

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

“Building a Stronger Cybersecurity Community”

Keith McMenamin

Vice President of Information Technology Visit Philadelphia

Keith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 16 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building the technical infrastructure for an award-winning organization that was responsible for creating $12 billion dollars in economic impact for the city of Philadelphia in 2019. Over the years, he quickly became a trusted advisor to C-Suite executives along with evolving into the “go-to tech guy” for friends and colleagues in the local tourism marketing and media industries.

Keith is a regular speaker and panelist at national industry conferences. He serves on the advisory council of two local schools to review technology curriculum taught to students. He is an active mentor in many groups for aspiring IT professionals in the Philadelphia area. Outside of the office Keith enjoys playing sports, spending time with his family and taking long vacations to Southern California. He earned a bachelor’s degree in computer science from Purdue University Global and is the proud father of his new baby girl Michaela.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Keith McMenamin

Vice President of Information Technology
Visit Philadelphia

Bio

Dr. Dele Bankole

Director, IT Security
Center for Employment Opportunities

Bio

David Lingenfelter

Vice President of Information Security
Penn Entertainment

Bio

Anahi Santiago

Chief Information Security Officer
ChristianaCare

Bio

Brian Martin

Chief Information Security Officer
Liticode

Bio

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

9:00 am

AI and Zero Trust : The inevitable enrichments of SIEM and IAM

Anandh Palanisamy

Senior Product Expert ManageEngine
Bio

Presentation

9:30 am

How AI Can Think Like an Attacker

Ryan Schuler

Senior Cyber Technology Specialist Darktrace
Bio

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

AI and You: Is it a Shared Future?

Amidst the fear and hype surrounding AI, it’s important to take a grounded and realistic approach to understanding its potential impact on humanity. We examine the current state of AI and its potential trajectory, and what will it take to shape the future.

Fayyaz Makhani

Global Security Architect Viking Cloud
Bio

Presentation

11:00 am

Prioritize Your Attack Surface

Cyber security is hard, and often one hears that being breached is not a question of “if” but “when?”  In this talk, we will give you reasons why ensuring good cybersecurity is a “winnable” battle, and how it starts with knowing your attack surface.  Of course, this begs the question, “what is my attack surface?”  By looking at it from an attacker’s perspective, we’ll explore how complex this question can be, and discuss steps you can take to minimize the risks involved.

Glenn Wong, PhD

Director of Product Management, Technology Partnerships Recorded Future
Bio

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:15 pm

“Building a Stronger Cybersecurity Community”

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Java Security: Focused, Effective, and Under-Complicated

As one of the most popular software languages 20+ years running, Java has many security capabilities built into it already. Instead of shifting left with work and adding steps, you can shift a decision left about how you’ll use the JVM with things it already does. Instead of bolting security on (just earlier), you can integrate it more easily. This means more trust with your development and operations teams because they don’t need to do as much, and your team sounds more credible and influential by speaking the same terms that developers use. As you will learn in this interactive session, simple adjustments or ways of discussing the JVM can yield big security improvements.

Erik Costlow

Senior Director of Product Management Azul
Bio

Presentation

2:15 pm

Secure Networks

Suraj Chandrasekaran

Global SASE PreSales Leader Versa Networks
Bio

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices—showing risk faster
  • An automated investigation experience that replaces manual routines and effectively guides new insider threat teams

Abel Morales

Principal Security Engineer Exabeam
Bio

Networking

3:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Dr. Dele Bankole

Director, IT Security Center for Employment Opportunities
Bio

David Lingenfelter

Vice President of Information Security Penn Entertainment
Bio

Anahi Santiago

Chief Information Security Officer ChristianaCare
Bio

Brian Martin

Chief Information Security Officer Liticode
Bio

5:00 pm

Closing Remarks

Register

Share This