Phoenix, AZ

Thursday, November 2, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Case For Ransomware Containment Rather Than Prevention

Bio

Mike Lipnisky

Director of Sales BullWall

Sponsored by

Presentation

9:30 am

How Can WE Become Unhackable

Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review current security methods, discuss current flaws, and understand why a Zero Trust solution is read more…
Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review current security methods, discuss current flaws, and understand why a Zero Trust solution is the best solution.
Bio

Robert Kauffman

Senior Systems Engineer Versa Networks

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Behind the Scenes of Teams and OneDrive: The Secret Life of Shared Files

With the accelerated use of Microsoft 365, we are shooting more sensitive and confidential data into the cloud than we are aware of. Keeping track of what files users are sharing among each other in Teams and OneDrive and knowing who else has access to seems an impossible task. What read more…

With the accelerated use of Microsoft 365, we are shooting more sensitive and confidential data into the cloud than we are aware of. Keeping track of what files users are sharing among each other in Teams and OneDrive and knowing who else has access to seems an impossible task. What can you do about it? Find out in this talk.

Topics covered include:

– What goes on in the background when we share data in Teams & OneDrive.

– Why more people have access to shared files than we think.

– How tenfold helps you keep track of permissions and shared files once and for all

Bio

Patryk Stachowiak

Chief Product Evangelist tenfold

Sponsored by

Presentation

11:00 am

What's Missing In Your API Security Program

API security has emerged as a major attack vector in 2023. As more organizations rely on APIs to communicate and share data between applications and systems, the number of APIs and API integrations grow, and with that the potential for security breaches also increases. An API security program is quickly becoming read more…
API security has emerged as a major attack vector in 2023As more organizations rely on APIs to communicate and share data between applications and systems, the number of APIs and API integrations grow, and with that the potential for security breaches also increases. An API security program is quickly becoming essential to the modern app stack to protect sensitive data, prevent unauthorized access, and maintain the integrity and availability of services.

In this session, we’ll be learning about the 3 common challenges that are easy to miss in an API security program. This will include:

  • Challenges of building dynamic API inventories inclusive of known, shadow, and zombie APIs.
  • Best practices in triaging API vulnerabilities and different approaches you should take in testing your environment.
  • How to scale and measure how successful your API Security program is performing.
Bio

Josiah Alvira

AppSec Strategist Data Theorem

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

"I Tricked AI, and I Liked It"

Bio

Michael Manrod

Chief Information Security Officer Grand Canyon Education, Inc.
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

Presentation

2:00 pm

Best Practices from Phoenix's CISO

– What my day is like. – How can everyone better prepare for a breach. – What is your biggest fear?
– What my day is like.
– How can everyone better prepare for a breach.
– What is your biggest fear?
Bio

Shannon Lawson

Chief Information Security Officer City of Phoenix
Bio

Mike McMullen

Regional Sales Director Stellar Cyber

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Cloud Security Update: Trends, Learning and Best Practices From Recent Cyber Attacks

Bio

Brooke Noelke

Cloud Engagement Director Palo Alto Networks

Sponsored by

Presentation

3:15 pm

Solving for the complexities of an "everywhere world”

Getting visibility and control of Cloud, SaaS, Internet, and on prem is getting more difficult. IT teams need to securely connect everyone and everything everywhere. How can IT teams close the gap, and gain control?

Getting visibility and control of Cloud, SaaS, Internet, and on prem is getting more difficult. IT teams need to securely connect everyone and everything everywhere.
How can IT teams close the gap, and gain control?

Bio

Brian Marks

Strategic Solutions Engineer Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Kane Eustace

Chief Technology Officer Bluebell Behavioral Health PLLC
Bio

Keith Stocks

VP, Third Party Cyber Risk Management Transformation and Governance Leader State Street
Bio

Dr. Rebecca Wynn

Chief Cybersecurity Strategist & CISO Click Solutions Group
Bio

Michael Manrod

Chief Information Security Officer Grand Canyon Education, Inc.
Bio

Demetrius Comes

Chief Technology Officer Sovrn
5:00 pm

Closing Remarks

Share This