Raleigh, NC

Thursday, May 26, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Modern Security Programs – IT Evolution to Security Revolution

The IT Revolution we have experienced over the last few years has forced organizations to rethink their security program. The degradation of the perimeter, the growth of micro-services, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees. What must an organization do read more…

The IT Revolution we have experienced over the last few years has forced organizations to rethink their security program. The degradation of the perimeter, the growth of micro-services, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to remain secure? It must build a Modern Security Program that combines visibility, data analytics and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender

Sponsored by

Presentation

9:30 am

Why SOCs Fail - The Maturity Model Required for Cyber Resilience

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a read more…

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Bio

Scott Gillis

Regional Director Enterprise East/Caribbean Exabeam

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

10:30 am

Security Whimsy and Misinformation: AI and ML?

This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.

This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.

Bio

Neal Humphrey

AVP, Security Strategy Deepwatch

Sponsored by

Presentation

11:00 am

Zero Trust for Applications

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Bio

Chad Maskill

Cyber Hero ThreatLocker

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

"Security Foundations: Building a program with minimum viable security"

Bio

Benjamin Corll

VP, Cyber Security Coats

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next read more…

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Bio

Jeff Stauffer

Technical Engineer Illumio

Sponsored by

Presentation

2:00 pm

Achieving Effective Security with Managed Detection and Response

Managed Detection and Response (MDR) continues to have significant growth and expected to be over $2 billion in the next 5 years. Many consider this a conservative estimate and there are differing views around MDR so this session is going to focus on answering three questions: Is MDR is right read more…

Managed Detection and Response (MDR) continues to have significant growth and expected to be over $2 billion in the next 5 years. Many consider this a conservative estimate and there are differing views around MDR so this session is going to focus on answering three questions:

  • Is MDR is right for the organization you represent?
  • What should you consider for effective detection and response?
  • How does a managed approach enable security outcomes?
Bio

Antonio Sanchez

Technical Marketing Alert Logic

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Continuous Security Validation and You: a tale as old as epoch time

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack read more…

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise

Bio

Cris Carreon

Engineer AttackIQ

Sponsored by

Presentation

3:15 pm

Fast and Furious Attacks: Using AI to Surgically Respond​

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join [speaker] to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join [speaker] to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
Bio

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace

Sponsored by

Networking

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Daniel Clayton

VP Global Security Operations and Services Bitdefender
Bio

Anthony Foust

Global Chief Information Security Officer Belron International
Bio

Gina Yacone

CISO (Advisory) Mountain States Region (Trace3)
Bio

Nicole Raimundo Coughlin

Chief Information Officer Town of Cary
Bio

Benjamin Corll

VP, Cyber Security Coats

Closing Remarks

5:00 pm

Closing Remarks

Share This