VIRTUAL Eastern | Raleigh CyberSecurity Conference
Wednesday, May 26, 2021 @ 8am EDT
(NJ, DC, TN, MA, FL, GA, NC, NY, VA, MD, PA)
Earn up to 10 CPE credits


























About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
Rick Doten
VP, Information Security at Centene Corporation, CISO Carolina Complete Health
Rick is VP, Information Security at Centene Corporation, and CISO of Carolina Complete Health based in Charlotte, NC. Rick supports both the NC health plan and corporate Centene in a cybersecurity leadership role.
In his prior role, Rick worked as Virtual CISO supporting international companies. Rick also developed the curriculum for a Cybersecurity Master’s degree program for an International University.
Rick is an avid speaker at cybersecurity conferences, and is a member of The CyberWire Hashtable. He is part of the editorial panel of the Council on Cybersecurity Critical Security Controls, and is the lead author on the newest version 8 of the Controls. Rick is also on the Board of his local ISC2 chapter.
Rick ran ethical hacking, incident response and forensics, and risk management teams throughout his 25+ year cybersecurity career.
CISO Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Premium Platinum Sponsors

Platinum Sponsors

Gold Sponsors









Silver Sponsors











Partners




Agenda
Secure Your Everything

Identify Unwanted Exposure Online: Data Loss Detection, Online Brand Security, Attack Surface Reduction

Presentation
The Security Intelligence Company

Live Presentation
Conquering Cyber Risk in 3rd Party Communications
The Enterprise Content Firewall
To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Live Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Hear from cybersecurity leaders and experts on:
- Current cybersecurity threats and practices
- Post-pandemic security

Kareem Briggs
Chief Information Security Officer South Carolina Department of Disabilities and Special Needs

Presentation
Protect your workforce with simple, powerful access security.

The cybersecurity asset management platform to see and secure all assets.

One Platform. All Identities. Any Cloud.

Presentation
Your Single Backup and Data Management Platform for Cloud, Virtual and Physical

Presentation
Manage InfoSec Risk and Compliance with ZenGRC

Presentation
Securing the collaboration culture without compromising the speed of innovation or the safety of data.
