Philadelphia, PA

Thursday, April 4, 2024

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Operationalizing Cyber Threat Intelligence To Optimize Your Defenses

Bio

Brendon Anderson

Cyber Security Engineer Interpres Security

Sponsored by

Presentation

9:15 am

Cybersecurity Program Management in the Complex Environment of Cybersecurity

Bio

Craig Stamm

CEO Zyston

Sponsored by

Presentation

9:45 am

Weaponizing DNS to Defend the Enterprise

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats.  Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats.  Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Bio

Colby Hoefer

Cybersecurity Specialist Infoblox

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

DDoS attacks are on the rise: see a live attack and mitigation demo

What does a DDoS (Distributed Denial of Service) attack really look like? What problems can it present for your organization? And why is it important to be able to immediately mitigate such attacks? Join Alex Bakshtein, a global DDoS expert, to see a DDoS attack simulation and mitigation. Alex will read more…
What does a DDoS (Distributed Denial of Service) attack really look like? What problems can it present for your organization? And why is it important to be able to immediately mitigate such attacks? Join Alex Bakshtein, a global DDoS expert, to see a DDoS attack simulation and mitigation. Alex will discuss and show:
  • The current DDoS threat landscape
  • The risks every organization faces if they are not prepared for an attack
  • A simulated live attack, it’s mitigation and post mortem
Bio

Alex Bakshtein

Global Solution Architect Imperva, a Thales company

Sponsored by

Presentation

11:15 am

30 Years of Arguing with Adults

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems read more…

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Bio

Paul Dant

Senior Director, Cybersecurity Research Illumio

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm

"Emotional Intelligence: Does your cybersecurity leadership have it?"

Bio

Jessica Hoffman

Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

AI for Security

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.

Bio

Ken Roberts

Senior Sales Engineer Next DLP

Sponsored by

2:15 pm

Attack Surface Management – The Missing Middle of Cybersecurity

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices. In this presentation, we will discuss: The role of CAASM and attack surface management (ASM) in the future of risk management technologies Key steps including, asset discovery, read more…

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.

In this presentation, we will discuss:

The role of CAASM and attack surface management (ASM) in the future of risk management technologies

Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack

Different methods of ASM and benefits of automation for continuous management

Bio

Phil Guerin

Senior Technical Account Manager Cavelo

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
3:00 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Kyle Dion

Sr. Cyber Threat Intelligence Specialist Proofpoint

Sponsored by

Presentation

3:30 pm

Moving Towards a Zero Trust Mindset

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Bio

Gina Sledd

Solutions Engineer Cloudflare

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Jessica Hoffman

Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Bio

Michael Pilch

Information Security Officer Delaware Valley University
Bio

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Tammy Klotz

Chief Information Security Officer Trinseo
Bio

Craig Stamm

CEO Zyston
5:15 pm

Closing Remarks

Share This