Salt Lake City, UT
Wednesday, August 23, 2023
Hybrid
Keynote Speakers
““Hacking the Human””
Skip Mann
Managing Director, Security Advocacy Lenovo
Jon Durkos
Senior Manager, Security Advocacy, Chief Security Office Lenovo
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Skip Mann
Managing Director, Security Advocacy Lenovo
Steve Gentry
Chief Security Officer Clari
Vincent Romney
Deputy Chief Information Security Officer Nuskin & Pharmanex
Jeff Kaden
SVP of Security & CISO Clearsense
Dan Bowden
Global CISO Marsh
Jami Hughes
SVP, Deputy Chief Information Security Officer Zions Bancorporation
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Today’s Threat Landscape Requires a Unique Capability
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
Presentation
Zero Trust for Ransomware Protection
Ransomware is easier to prevent than you may think, and Zero Trust can be implemented today, not tomorrow. Learn how Illumio stops Ransomware in its tracks before it spreads, and how Illumio’s Zero Trust solution keeps you safe from both known and unknown threats.
Sponsored by
Sponsor Networking Time
Presentation
Take Charge of your Risk
The evolution of the security space has made the Hackers lives easier and everyone else’s jobs harder. As we continuously move towards data sprawl, work from home, and a more complex landscapes, our approach to security must also evolve. Endpoint Detection and Response (EDR) is not enough, neither is sitting on the sidelines waiting for a breach to occur so you’re able to react. This session will address the evolution of the SOC and help with understanding the shift needed to move from being a bystander to a player in protecting your organization (from a reactive to a proactive approach).
Sponsored by
How (And Why) to Create Your Cloud Security Early Warning System
Security leaders have had to choose between endpoint, container, and cloud security solutions for far too long. Your developers are a target, and if you can correlate information between their laptops and their cloud activity you can unlock a new level of security visibility and protection. In this presentation, we explain how to use one tool to secure everything, from laptop to cloud.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
“Hacking the Human”
Sponsor Networking Time
Presentation
How Can WE Become Unhackable
Sponsored by
Presentation
Don't Trust Your Inbox
As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.
Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to email
Sponsored by
Sponsor Networking Time
Presentation
Smarter. Better. Faster. Stronger: How Generative AI Will be a Force Multiplier for Security Analysts.
The pressure on security analysts has never been higher. They’re being asked to do much more, faster, with less resources than ever. As the adversaries continue to speed up with the help of generative AI, there is only one path forward for defenders: meet them on the field with an equal and superior response. Join CrowdStrike’s Chief Technology Officer for Proactive Security to understand how generative AI can up-level even the most junior analyst into a seasoned threat hunter; one that is able to respond with the speed and precision needed to defeat modern adversaries.
Sponsored by
Presentation
Modern Data Protection
Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.