Raleigh, NC
Thursday, May 26, 2022
Hybrid
Keynote Speaker
“"Security Foundations: Building a program with minimum viable security"”
Benjamin Corll
VP, Cyber Security Coats
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Daniel Clayton
VP Global Security Operations and Services Bitdefender
Anthony Foust
Global Chief Information Security Officer Belron International
Gina Yacone
CISO (Advisory) Mountain States Region (Trace3)
Nicole Raimundo Coughlin
Chief Information Officer Town of Cary
Benjamin Corll
VP, Cyber Security Coats
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Opening Introductions | Check In | Networking
Presentation
Modern Security Programs – IT Evolution to Security Revolution
The IT Revolution we have experienced over the last few years has forced organizations to rethink their security program. The degradation of the perimeter, the growth of micro-services, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.
What must an organization do to remain secure? It must build a Modern Security Program that combines visibility, data analytics and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.
Sponsored by
Presentation
Why SOCs Fail - The Maturity Model Required for Cyber Resilience
Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Security Whimsy and Misinformation: AI and ML?
This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.
Sponsored by
Presentation
Zero Trust for Applications
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
"Security Foundations: Building a program with minimum viable security"
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Sponsored by
Presentation
Achieving Effective Security with Managed Detection and Response
Managed Detection and Response (MDR) continues to have significant growth and expected to be over $2 billion in the next 5 years. Many consider this a conservative estimate and there are differing views around MDR so this session is going to focus on answering three questions:
- Is MDR is right for the organization you represent?
- What should you consider for effective detection and response?
- How does a managed approach enable security outcomes?
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Continuous Security Validation and You: a tale as old as epoch time
With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise
Sponsored by
Presentation
Fast and Furious Attacks: Using AI to Surgically Respond
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!