San Diego, CA (Western Region)
Thursday, December 2, 2021
Hybrid
Keynote Speakers
“Smart & Safe Spaces: Connecting and Securing Our World”
Darin Andersen
CEO & Co-Founder NXT Robotics
Darin Andersen is a distinguished Cybersecurity, Smart City, Internet of Things (IoT) and professional with over 15 years of experience in industry. Darin is the CEO & Founder of NXT Robotics which builds a cognitive security robotics platform. In 2013, Mr. Andersen founded CyberTECH (CyberHive and iHive Incubators), a global cybersecurity and IoT network ecosystem […]
Darren Bennett
CyberSecurity Leader
Global Information and Cyber Security leader with 25+ years of security experience, focusing on all aspects of Cyber, Information and Physical Security. Highly skilled communicator with the ability to work at all levels of business, from “C level” to “Security Professional/Practitioner”. Strong business acumen, communication skills, problem solving abilities, and solid critical thinking skills. Proven […]
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Check In | Networking
Presentation
How to stop Ransomware BEFORE it starts.
Sponsored by
Presentation
Information Security Practitioners: Stop Enabling, Start Facilitating!,
As we think about the evolution of the information security practice, we transitioned from preventing the business from doing things to enabling them. It is time for us to evolve to facilitate the business.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Am I ready? The Importance of Security Controls Validation
Sponsored by
Presentation
Crawl, Walk, Run Your Segmentation Approach
Sponsored by
Lunch
Presentation
The Past, Present and Future of Strong Authentication
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
Sponsored by
Presentation
The Boulevard of Broken Buckets
Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Keynote
Smart & Safe Spaces: Connecting and Securing Our World
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Continuous Security Validation: Exercise your Environment more than the Adversary
With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise.
Sponsored by
Presentation
Why Software Still Stinks
What do AI, IA&M, Ransomware, Blockchain, Encryption, and the Cloud all have in common? They are all software – both fueling and exposing the modern enterprise. Software no longer operates in isolation, but rather a complex, hostile ecosystem that makes it ripe for attack . Compounding the problem is the reliance on 3rd-party, open source, and commercial off-the-shelf software that introduces risk outside our control, as evidenced by the SolarWinds attack last year.
Securing modern software applications means adopting risk-based techniques to build security in and protect in production.
Attend this session to learn:
- Top software risks we’ll face in 2022
- Critical mistakes organizations continue to make
- Why traditional assessments are missing the mark
- How to get smarter about the cloud
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!