Phoenix Cybersecurity Conference
Wednesday, October 30, 2024
Hybrid
Join Us in Phoenix for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“The Accidental CISO - A tale of transformation and the invaluable lessons learned along the way.”
Jason Hayek
Global Chief Information Security Officer & VP IT Infrastructure Circle K (Couche-Tard)
Customer focused and entrepreneurial executive leader with proven ability to mature, lead change, and sustain effective Information Security, Risk Management, and Information Technology programs within Fortune 50 enterprise, middle market companies, and start-ups. Comprehensive understanding of risk management frameworks, information security operations, cloud security (AWS, GCP, Azure) models and controls (SaaS, IaaS, PaaS), technology transformation pitfalls, governance/risk/compliance, and regulatory/industry expectations including GLBA, HIPAA / HITRUST, PCI DSS, CCPA / GDPR, NY DFS, FFIEC, and NIST.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Dara Gibson
President Arizona InfraGard
Keith Stocks
VP, Third Party Cyber Risk Management Transformation and Governance Leader State Street
Michael Manrod
Chief Information Security Officer Grand Canyon Education, Inc.
Seema Patel
Assistant CISO Maricopa County
Bindi Davé
Deputy CISO DigiCert
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
HYATT REGENCY PHOENIX
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Can an AI-Infused MXDR lead to an Autonomous SOC?
Organizations must detect and respond to cyber-attacks before the attacker’s objective is completed. Managed XDR is central to the job. AI is poised to be the force multiplier we’ve been awaiting. But is it a near-term reality? This presentation will cover:
- Typical attack sequence and observable signals
- Why is it so hard to catch the bad guys?
- What is the detection and response process?
- Historical AI in cyber, changes with LLMs
- The next wave of AI: Agents
- Whether to be bullish or bearish on SOC AI near-term potential
Sponsored by
Presentation
Cyber insurance is an important part of cyber resilience, but is it creating monoculture cybersecurity
As a cybersecurity product and services company, we are aware that recent events have caused many organizations to revisit their cyber resilience strategy – where cyber risk insurance is often seen as an essential element. Join us to gain a comprehensive insight into some of the recent major cyber-incidents, discoveries by researchers, the role insurers are playing in improving cybersecurity posture and their approach to managing risk. Understanding insurance requirements and how they change could provide valuable insight into risk reduction. We will also discuss how insurers may be increasing the danger of a monoculture cybersecurity ecosystem.
Sponsored by
Sponsor Networking Time
Presentation
The Radical Future of App and API Security Testing
Application security testing (AST) in pre-prod can be highly effective but robust regimens for doing so are shockingly rare. What you see instead are a few underutilized tools introduced mostly to check a compliance box without significantly reducing actual risk. On the other hand, current tools and techniques for doing AST in production are very limited.
This talk explores technology and techniques to do it effectively in production which in turn fundamentally changes the economics of being able to do it well in pre-prod.
The parallel is that over the last decade or so, application performance and load testing moved from pre-prod to production with the introduction of efficient APM agents and practices like canary deploys. The motivations are the same. Production is the REAL context, not mocked or assumed. User behavior is also REAL, not simulated with automated or manual tests.
What are the equivalent technology and techniques so we can create an application vulnerability monitoring (AVM) movement? How close are we to perfecting them? What can you do to accelerate their adoption?
Sponsored by
Multiple Personalities: Making Decisions in a Cyber Crisis
In a cyber crisis, the decisions made can be the difference between a controlled event and a business disrupting incident. The question is, who should be making these decisions: The senior person? The technical expert? The self-appointed hero? In this session, Mark Sangster will delve into the critical aspect of crisis leadership-removing the emotion. Human biases, office politics, and perceived personal fears often influence or delay sound decision-making. The key to success lies in our ability to harness these human factors to share expertise and ensure personal benefit does not trump organizational objections.
We invite you to join us for this insightful session with cybersecurity expert and author, Mark Sangster. He will be identifying common crisis personalities, exploring human bias, and considering leadership and learning models to help navigate the pitfalls of the human element in cyber incidents. Your presence and participation will add value to the discussion.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
The Accidental CISO - A tale of transformation and the invaluable lessons learned along the way.
Jason Hayek
Global Chief Information Security Officer & VP IT Infrastructure Circle K (Couche-Tard)
Sponsor Networking Time
Presentation
Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense
The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.
Sponsored by
Presentation
Securing Your Revenue Stream: Protecting Applications and APIs from Bot Threats
With automation changing the landscape, global cyber losses now average between $68-$116B annually. In this overview, we’ll review the scope of the challenge based upon Imperva’s data and provide practical steps you can take to prepare for the inevitable security incident.
Sponsored by
Sponsor Networking Time
Presentation
Moving Towards a Zero Trust Mindset
Sponsored by
Presentation
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.