Philadelphia, PA
Thursday, April 4, 2024
Hybrid
Keynote Speaker
“"Emotional Intelligence: Does your cybersecurity leadership have it?"”
Jessica Hoffman
Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Jessica Hoffman
Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Michael Pilch
Information Security Officer Delaware Valley University
Keith McMenamin
Vice President of Information Technology Visit Philadelphia
Tammy Klotz
Chief Information Security Officer Trinseo
Craig Stamm
CEO Zyston
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Operationalizing Cyber Threat Intelligence To Optimize Your Defenses
Sponsored by
Presentation
Cybersecurity Program Management in the Complex Environment of Cybersecurity
Sponsored by
Presentation
Weaponizing DNS to Defend the Enterprise
Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats. Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.
Sponsored by
Sponsor Networking Time
Presentation
DDoS attacks are on the rise: see a live attack and mitigation demo
-
The current DDoS threat landscape
-
The risks every organization faces if they are not prepared for an attack
-
A simulated live attack, it’s mitigation and post mortem
Sponsored by
Presentation
30 Years of Arguing with Adults
In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
"Emotional Intelligence: Does your cybersecurity leadership have it?"
Jessica Hoffman
Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Sponsor Networking Time
Presentation
AI for Security
What to know when talking to vendors about their implementation of Artificial Intelligence into their products.
Sponsored by
Attack Surface Management – The Missing Middle of Cybersecurity
Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.
In this presentation, we will discuss:
The role of CAASM and attack surface management (ASM) in the future of risk management technologies
Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack
Different methods of ASM and benefits of automation for continuous management
Sponsored by
Sponsor Networking Time
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Presentation
Moving Towards a Zero Trust Mindset
Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.