San Diego, CA (Western Region)
Thursday, December 2, 2021
Hybrid
Keynote Speaker
“Smart & Safe Spaces: Connecting and Securing Our World”
Darin Andersen
CEO & Co-Founder NXT Robotics
Darin Andersen is a distinguished Cybersecurity, Smart City, Internet of Things (IoT) and professional with over 15 years of experience in industry. Darin is the CEO & Founder of NXT Robotics which builds a cognitive security robotics platform. In 2013, Mr. Andersen founded CyberTECH (CyberHive and iHive Incubators), a global cybersecurity and IoT network ecosystem providing cybersecurity and IoT resources, strategic programs and quality thought leader IoT Forums across the nation.
Before NXT Robotics, Darin was the CEO of CyberUnited a enterprise cybersecurity firm. Darin also served as President, North America for Norman Shark, a forensics malware analytics company, acquired by Symantec. Prior to Norman Shark, Darin was the Chief Operating Officer (COO) at ESET, an award winning and antivirus solutions company.
While COO at ESET, Darin created the “Securing Our eCity” initiative. The initiative, now an independent Foundation, was recognized by The White House as the “Best Local/Community Plan” DHS National Cybersecurity Awareness Challenge. Mr.
Andersen is a distinguished Ponemon Institute Fellow and received an MBA in Finance and Operations Management and 2nd Masters in Information Systems and Operations Systems both from University of Southern California and a BA from Claremont McKenna College
Darren Bennett
CyberSecurity Leader
Global Information and Cyber Security leader with 25+ years of security experience, focusing on all aspects of Cyber, Information and Physical Security. Highly skilled communicator with the ability to work at all levels of business, from “C level” to “Security Professional/Practitioner”. Strong business acumen, communication skills, problem solving abilities, and solid critical thinking skills.
Proven track record building successful teams within many business verticals, including Government, Law Enforcement, Defense, Healthcare, Supercomputing and Academia. Reputation as a Cyber and Information Security leader has been recognized by the US Government for building a team and program that was nominated for the Federal Bureau of Investigation “Director’s Award”. Has built and led teams developing security programs, system security plans (SSPs) and system accreditation programs, including third party systems testing and evaluation (ST&E).
Able to integrate all aspects of security, work with executives at all levels, interact with business customers and government organizations including law enforcement. Drives operational efficiencies and effectiveness in his programs to fund investments in Security. Excels at team building, building strong relationships within the business, process improvement, and problem solving. Also has expertise with effective Executive Protection/Physical Security programs and a full understanding of the legal aspects of Information Security incidents.
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Check In | Networking
Presentation
How to stop Ransomware BEFORE it starts.
Sponsored by
Presentation
Information Security Practitioners: Stop Enabling, Start Facilitating!,
As we think about the evolution of the information security practice, we transitioned from preventing the business from doing things to enabling them. It is time for us to evolve to facilitate the business.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Am I ready? The Importance of Security Controls Validation
Sponsored by
Presentation
Crawl, Walk, Run Your Segmentation Approach
Sponsored by
Lunch
Presentation
The Past, Present and Future of Strong Authentication
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
Sponsored by
Presentation
The Boulevard of Broken Buckets
Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Keynote
Smart & Safe Spaces: Connecting and Securing Our World
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Continuous Security Validation: Exercise your Environment more than the Adversary
With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise.
Sponsored by
Presentation
Why Software Still Stinks
What do AI, IA&M, Ransomware, Blockchain, Encryption, and the Cloud all have in common? They are all software – both fueling and exposing the modern enterprise. Software no longer operates in isolation, but rather a complex, hostile ecosystem that makes it ripe for attack . Compounding the problem is the reliance on 3rd-party, open source, and commercial off-the-shelf software that introduces risk outside our control, as evidenced by the SolarWinds attack last year.
Securing modern software applications means adopting risk-based techniques to build security in and protect in production.
Attend this session to learn:
- Top software risks we’ll face in 2022
- Critical mistakes organizations continue to make
- Why traditional assessments are missing the mark
- How to get smarter about the cloud
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!