Join Us in Pittsburgh for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Geopolitics meets Cybersecurity: Safeguarding Your Security in a Shifting World”
Dawn Cappelli
Director of OT-CERT at Dragos, Former VP and Chief Information Security Officer at Rockwell Automation
Dawn Cappelli is Director of OT-CERT (Operational Technology – Cyber Emergency Readiness Team) at Dragos. Cybersecurity risks in OT environments continue to rise, and many organizations struggle with the resources or expertise to address them, especially small to medium-sized businesses. OT-CERT provides free resources to help them build a foundational OT cybersecurity program. Dawn was CISO for Rockwell Automation from 2016-2022, after serving as Director, Insider Risk. She was Founder and Director of Carnegie Mellon’s CERT Insider Threat Center and started her career as a software engineer programming nuclear power plants for Westinghouse. She co-authored “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes,” which was inducted into the Cybersecurity Canon – a list of must-read books for all cybersecurity practitioners.
Cappelli is a Certified Information Systems Security Professional, holds a BS in Computer Science and Mathematics from the University of Pittsburgh, is co-founder of the Open Source Insider Threat information sharing group and is a member of the RSA Conference Program Committee and the CyberWire Hash Table. She was awarded the Pittsburgh Technology Council’s 2022 CIO Choice Lifetime Achievement Award, inducted into the ISSA Hall of Fame in 2021, honored as a member of the 2021 CISOs Top 100 CISOs, 2020 Global CISO 100, and named Pittsburgh CISO of the Year in 2018.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Anahi Santiago
Chief Information Security Officer ChristianaCare
Jim Mahony
Chief Information Security Officer Robert Morris University
Sam Merrell
Chief Information Security Officer Kennametal
Jessica Hoffman
Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Pittsburgh Marriott City Center
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
AI-Infused MXDR and the Autonomous SOC
MXDR helps organizations detect and respond to cyber-attacks before the attacker’s objective is completed. This presentation will cover:
- What is ‘getting left of bang’?
- Why is it so hard?
- How MXDR makes it easy
- Customer use cases
- 2023: Findings from 35,000 Customer SitReps
- How AI will drive the “Autonomous SOC”
Our presentation will show how MXDR compresses mean-time-to-detect and mean-time-to-respond at the lowest possible cost, and how AI will soon collapse all three.
Sponsored by
Presentation
2024 Cybersecurity Trends and threat predictions
Recent Arctic Wolf research discovered that 48% of organizations identified a data breach incident within the last 12 months, despite over $71B USD being spent on mitigation efforts every year. When we factor in the average cost of a ransomware attack growing year-over-year, it becomes obvious these attacks are big business with no end in sight. Still the question remains, what do we do to address and prepare for future threats and how are cybersecurity leaders taking steps to secure their organizations? This discussion will focus on Arctic Wolf research into security threats and trends facing security teams and what are the top threats predictions practitioners should be preparing for.
Sponsored by
Sponsor Networking Time
Presentation
Navigating the Cyber Storm: Understanding Today’s Cyber Risk Insurance Landscape
Sponsored by
Six Things DevOps Wants from InfoSec
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Geopolitics meets Cybersecurity: Safeguarding Your Security in a Shifting World
Dawn Cappelli
Director of OT-CERT at Dragos, Former VP and Chief Information Security Officer at Rockwell Automation
Sponsor Networking Time
Presentation
Browser Security: The Alpha and Omega of Account Takeover Protection
The shift to the cloud has driven most organizations to place their sensitive data in SaaS apps. This has triggered a chain reaction, turning the browser into the most critical working interface and making account takeover the ultimate adversary goal.
As a result, malicious browser extensions, compromise of reused passwords, and advanced phishing attacks are increasing in volume and sophistication, and prove to be a challenge security teams cannot overcome.
In this session we’ll take a closer look at account takeover attacks. We’ll analyze their flow and understand the multiple ways they use and exploit the browser – accessing the critical identity data it stores, as a place to lure victims to with social engineering, and, most importantly, a malicious access vector to targeted SaaS resources. Through this analysis we’ll come to understand why these attacks are a blind spot for today’s network and identity controls. We’ll conclude by revisiting the browser and show how a security mechanism that operates on the browser session itself can fundamentally change the equation and make protection against account takeover within reach.
Sponsored by
Security Validation as the Heart of Exposure Management
To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments. Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary’s view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls. During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security validation.
Sponsored by
Sponsor Networking Time
Presentation
Web Security Unleashed with DNS: A Ransomware Defense Strategy
In today’s ever-evolving threat landscape, securing your assets and infrastructure has become a formidable challenge. Traditional defense walls have fallen with rise on-the-go workforces and the relentless onslaught of cyber adversaries. Adversaries now armed with generative AI, evading defenses and fooling users. But fear not, there’s a beacon of hope from the most fundamental internet infrastructure used for almost everything on the web—DNS.
In this session, we’ll break down the power of DNS as a pivotal web security element in safeguarding your business against ransomware and other insidious threats:
- Unmasking the Phishing Threat: How deceptive phishing tactics open the door to digital mayhem and how to spot them to keep your organization safe.
- Multi-Layered Defense with Web Filtering Using DNS: Discover why the DNS layer is your first line of web defense and how it can safeguard your assets and infrastructure from ransomware attacks.
- Using AI to Supercharge DNS: How AI can be used to keep up with the constantly evolving Internet and how ML can be used to analyze each DNS query to prevent zero-day threats before they have a chance to resolve and infect a machine.
- Compliance and Security Frameworks: Using DNS as a web defense isn’t just a nice-to-have; it’s increasingly essential for staying compliant with the big cybersecurity standards like ISO 27001, CMMC, and NIST.
Sponsored by
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.