Home / / Raleigh, NC

Raleigh CyberSecurity Conference

Thursday, May 26, 2022 ET

Live in Person @ Raleigh Marriott City Center

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Security Foundations: Building a program with minimum viable security"

Benjamin Corll

VP, Cyber Security Coats

A seasoned cybersecurity professional with over 20 years of founding programs that make the lives of people across the globe better. Accomplished advisor to all levels of management and a calm organizational spokesperson.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Daniel Clayton

VP Global Security Operations and Services
Bitdefender

Bio

Anthony Foust

Global Chief Information Security Officer
Belron International

Bio

Gina Yacone

Advisory CISO-Senior Cybersecurity & Threat Intelligence Consultant
TRACE3

Bio

Nicole Raimundo Coughlin

Chief Information Officer
Town of Cary

Bio

Benjamin Corll

VP, Cyber Security
Coats

Bio

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Modern Security Programs – IT Evolution to Security Revolution

The IT Revolution we have experienced over the last few years has forced organizations to rethink their security program. The degradation of the perimeter, the growth of micro-services, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to remain secure? It must build a Modern Security Program that combines visibility, data analytics and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Daniel Clayton

VP Global Security Operations and Services Bitdefender
Bio

Presentation

9:30 am

Why SOCs Fail - The Maturity Model Required for Cyber Resilience

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Scott Gillis

Regional Director Enterprise East/Caribbean Exabeam
Bio

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

10:30 am

Security Whimsy and Misinformation: AI and ML?

This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.

Neal Humphrey

AVP, Security Strategy Deepwatch
Bio

Presentation

11:00 am

Zero Trust for Applications

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Chad Maskill

Cyber Hero ThreatLocker
Bio

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

"Security Foundations: Building a program with minimum viable security"

Benjamin Corll

VP, Cyber Security Coats
Bio

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Jeff Stauffer

Technical Engineer Illumio
Bio

Presentation

2:00 pm

Achieving Effective Security with Managed Detection and Response

Managed Detection and Response (MDR) continues to have significant growth and expected to be over $2 billion in the next 5 years. Many consider this a conservative estimate and there are differing views around MDR so this session is going to focus on answering three questions:

  • Is MDR is right for the organization you represent?
  • What should you consider for effective detection and response?
  • How does a managed approach enable security outcomes?

Antonio Sanchez

Technical Marketing Alert Logic
Bio

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Continuous Security Validation and You: a tale as old as epoch time

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise

Cris Carreon

Engineer AttackIQ
Bio

Presentation

3:15 pm

Fast and Furious Attacks: Using AI to Surgically Respond​

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join [speaker] to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace
Bio

Networking

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Daniel Clayton

VP Global Security Operations and Services Bitdefender
Bio

Anthony Foust

Global Chief Information Security Officer Belron International
Bio

Gina Yacone

Advisory CISO-Senior Cybersecurity & Threat Intelligence Consultant TRACE3
Bio

Nicole Raimundo Coughlin

Chief Information Officer Town of Cary
Bio

Benjamin Corll

VP, Cyber Security Coats
Bio

Closing Remarks

5:00 pm

Closing Remarks

Register

Share This