Pittsburgh, PA (Eastern Region)

Wednesday, July 28, 2021

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Live

8:00 am

Opening Introductions

Presentation

9:00 am

Warning:Cyber attacks ahead, what's your cybersecurity strategy?

Bio

Harish Sekar

Senior Evangelist ManageEngine

Sponsored by

Presentation

9:30 am

7 Habits of Highly Effective Cybersecurity Operations

Bio

Ricardo Villadiego

Founder & CEO Lumu Technologies

Sponsored by

Live Keynote

10:15 am

“Protecting the Ecosystem from Supply Chain Attacks – We’re all in this Together!”

Bio

Dawn Cappelli

Director of OT-CERT at Dragos, Former VP and Chief Information Security Officer at Rockwell Automation

Presentation

11:25 am

The Need for Invisibility over the public Internet

Cyber security vulnerabilities are being leveraged by cyber criminals at an ever increase pace and level of sophistication, inflicting damage on networks and network resources world-wide. Typical approaches to inhibiting these attacks have not resulted in the protection needed for critical asset security and privacy. With the expanded use of read more…

Cyber security vulnerabilities are being leveraged by cyber criminals at an ever increase pace and level of sophistication, inflicting damage on networks and network resources world-wide.

Typical approaches to inhibiting these attacks have not resulted in the protection needed for critical asset security and privacy. With the expanded use of cloud computing and the significant move to remote operating environments, the public internet has become new enterprise network.  The internet was never designed for security.  Therefore, there is a need to look at novel approaches to eliminating the risk of operating on the internet. There is a need to make users, devices, information, and critical networks resources invisible on the public internet.

Bio

Tom Badders

Sr Product Manager Telos

Sponsored by

Live Panel Discussion

12:05 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Hear from cybersecurity leaders and experts on: Current cybersecurity threats and practices Post-pandemic security

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Bio

Andy Swenson

CEO/CIO/CISO Delbridge Group
Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica
Bio

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Art Thompson

Chief Information Officer City of Detroit

Presentation

1:20 pm

5 Ways to Optimize Your SOC

As more and more businesses adopt a SOC team for managing operations, the scope of work for SOC managers and operators continually grows. More sources, more events, and higher expectations. In this session, Jamie Zajac, VP of Product at Recorded Future will speak to 5 ways you can optimize your SOC, emphasizing changes you can make that don’t require you to buy new read more…
As more and more businesses adopt a SOC team for managing operations, the scope of work for SOC managers and operators continually grows. More sources, more events, and higher expectations. In this session, Jamie Zajac, VP of Product at Recorded Future will speak to 5 ways you can optimize your SOC, emphasizing changes you can make that don’t require you to buy new tools promising to be a silver bullet.
Bio

Jamie Zajac

Vice President of Product Recorded Future

Sponsored by

Presentation

1:50 pm

5 Lessons Learned Fighting Ransomware

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will read more…

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam

Bio

Rick Vanover

Senior Director of Product Strategy Veeam
Bio

Karinne Bessette

Technologist, Product Strategy Veeam

Sponsored by

Presentation

2:30 pm

5 Critical Pillars of the SOC of the Future

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the read more…

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Bio

Chris Abbey

Incident Handling Manager Red Canary

Sponsored by

Presentation

2:55 pm

Stay Ahead of the Hacker with Continuous Security Testing

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to: Build up your cyber resilience with continuous risk validation Prioritize remediation efforts with a threat-facing perspective Increase the productivity of your security teams

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

  • Build up your cyber resilience with continuous risk validation

  • Prioritize remediation efforts with a threat-facing perspective

  • Increase the productivity of your security teams

Bio

Sion Retzkin

Head of Knowledge Pentera

Sponsored by

Presentation

3:30 pm

Stop Repetitive MFA Requests with the Power of AI and Machine Learning

In today’s world, CISO’s around the world have deployed MFA as a means to counter credential theft. This leads to introducing endless MFA prompts throughout the IT ecosystem whether that be a cloud service, perimeter network device or an internal resource. In this session you will learn how AI and read more…

In today’s world, CISO’s around the world have deployed MFA as a means to counter credential theft. This leads to introducing endless MFA prompts throughout the IT ecosystem whether that be a cloud service, perimeter network device or an internal resource. In this session you will learn how AI and Machine Learning can dramatically reduce the number of times a user is ever asked to provide MFA. You’ll also learn about:

  • What a user’s authentication journey would look like by using machine learning
  • How it can drastically reduce account take over
  • Why traditional MFA/SSO context engines provide a false sense of security
  • Why it’s important to consider user behavior during an authentication request
Bio

Matt Sparks

Director of Sales Engineering Acceptto

Sponsored by

Presentation

4:00 pm

Leveraging IAM for Effective and Efficient Threat Mitigation

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions. Faced with the challenge of managing identities and securing access to data and applications from a read more…

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.

Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?

Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your busines

Bio

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin

Sponsored by

Presentation

4:30 pm

Crawl, Walk, Run Your Segmentation Strategy for Zero Trust

While there are varying definitions of what zero trust actually means, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on? Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which read more…

While there are varying definitions of what zero trust actually means, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on? Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Live

5:10 pm

Closing Remarks

Share This