Salt Lake City, UT

Wednesday, August 23, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Today’s Threat Landscape Requires a Unique Capability

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Shawn Taylor

Vice President, Threat Defense ForeScout Technologies

Sponsored by

Presentation

9:30 am

Zero Trust for Ransomware Protection

Ransomware is easier to prevent than you may think, and Zero Trust can be implemented today, not tomorrow. Learn how Illumio stops Ransomware in its tracks before it spreads, and how Illumio’s Zero Trust solution keeps you safe from both known and unknown threats.

Ransomware is easier to prevent than you may think, and Zero Trust can be implemented today, not tomorrow. Learn how Illumio stops Ransomware in its tracks before it spreads, and how Illumio’s Zero Trust solution keeps you safe from both known and unknown threats.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Take Charge of your Risk

The evolution of the security space has made the Hackers lives easier and everyone else’s jobs harder. As we continuously move towards data sprawl, work from home, and a more complex landscapes, our approach to security must also evolve. Endpoint Detection and Response (EDR) is not enough, neither is sitting read more…

The evolution of the security space has made the Hackers lives easier and everyone else’s jobs harder. As we continuously move towards data sprawl, work from home, and a more complex landscapes, our approach to security must also evolve. Endpoint Detection and Response (EDR) is not enough, neither is sitting on the sidelines waiting for a breach to occur so you’re able to react. This session will address the evolution of the SOC and help with understanding the shift needed to move from being a bystander to a player in protecting your organization (from a reactive to a proactive approach).

Bio

Yama Saadat

Sr Sales Engineer Trend Micro

Sponsored by

11:00 am

How (And Why) to Create Your Cloud Security Early Warning System

Security leaders have had to choose between endpoint, container, and cloud security solutions for far too long. Your developers are a target, and if you can correlate information between their laptops and their cloud activity you can unlock a new level of security visibility and protection. In this presentation, we read more…

Security leaders have had to choose between endpoint, container, and cloud security solutions for far too long. Your developers are a target, and if you can correlate information between their laptops and their cloud activity you can unlock a new level of security visibility and protection. In this presentation, we explain how to use one tool to secure everything, from laptop to cloud.

Bio

Jacob Story

Sr Solution Engineer Uptycs

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

“Hacking the Human”

Bio

Skip Mann

Managing Director, Security Advocacy Lenovo
Bio

Jon Durkos

Senior Manager, Security Advocacy, Chief Security Office Lenovo
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

How Can WE Become Unhackable

Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review current security methods, discuss current flaws, and understand why a Zero Trust solution is read more…
Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review current security methods, discuss current flaws, and understand why a Zero Trust solution is the best solution.
Bio

Robert Kauffman

Senior Systems Engineer Versa Networks

Sponsored by

Presentation

2:00 pm

Don't Trust Your Inbox

As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line. Moreover, these attacks don’t need sophisticated read more…

As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.

Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to email

Bio

Chelsee Purvis

Solutions Engineer Cloudflare

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Smarter. Better. Faster. Stronger: How Generative AI Will be a Force Multiplier for Security Analysts.

The pressure on security analysts has never been higher. They’re being asked to do much more, faster, with less resources than ever. As the adversaries continue to speed up with the help of generative AI, there is only one path forward for defenders: meet them on the field with an read more…

The pressure on security analysts has never been higher. They’re being asked to do much more, faster, with less resources than ever. As the adversaries continue to speed up with the help of generative AI, there is only one path forward for defenders: meet them on the field with an equal and superior response. Join CrowdStrike’s Chief Technology Officer for Proactive Security to understand how generative AI can up-level even the most junior analyst into a seasoned threat hunter; one that is able to respond with the speed and precision needed to defeat modern adversaries.

Bio

Ryan Worlton

Regional Sales Engineer CrowdStrike

Sponsored by

Presentation

3:15 pm

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

3:40 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Skip Mann

Managing Director, Security Advocacy Lenovo
Bio

Steve Gentry

Chief Security Officer Clari
Bio

Vincent Romney

Deputy Chief Information Security Officer Nuskin & Pharmanex
Bio

Jeff Kaden

SVP of Security & CISO Clearsense
Bio

Dan Bowden

Global CISO Marsh
Bio

Jami Hughes

SVP, Deputy Chief Information Security Officer Zions Bancorporation
5:00 pm

Closing Remarks

Share This