San Diego, CA

Wednesday, October 18, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Asset Management: A Strategic Approach to Risk Mitigation

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the read more…

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the impact of asset management on brand reputation. By integrating asset management practices, organizations can optimize risk assessment, incident response, and resource allocation, fortifying their resilience in the face of evolving threats.

Bio

James Mignacca

CEO Cavelo

Sponsored by

Presentation

9:30 am

How (And Why) to Think Like a Threat Actor in The Cloud

Security leaders have had to choose between endpoint, container, and cloud security solutions for far too long. Your developers are a target, and if you can correlate information between their laptops and their cloud activity you can unlock a new level of security visibility and protection. In this presentation, we read more…

Security leaders have had to choose between endpoint, container, and cloud security solutions for far too long. Your developers are a target, and if you can correlate information between their laptops and their cloud activity you can unlock a new level of security visibility and protection. In this presentation, we explain how to use one tool to secure everything, from laptop to cloud.

Bio

Julian Wayte

Sales Engineering Manager Uptycs

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Automation in Security Operations – Matching the speed of the attacker.

Leveraging the speed of artificial intelligence and automation to mitigate risk at machine speeds
Leveraging the speed of artificial intelligence and automation to mitigate risk at machine speeds
Bio

Stephan Tallent

CRO High Wire Networks

Sponsored by

Presentation

11:00 am

Don't Trust Your Inbox

As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.Moreover, these attacks don’t need sophisticated malware read more…
As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to email
Bio

Jeffrey Mueller

Regional Account Manager - Great Lakes Cloudflare

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

11:45 am

Dynamic Threat Intelligence to Determine Operational Risk

Bio

Ivan Topalov

Sr. Sales Engineer Recorded Future

Sponsored by

Keynote

12:00 pm

"Unlocking Your Cybersecurity Potential: Maximizing Value for Your Organization"

Bio

Dr. Vimal Subramanian

Vice President and CISO Cue Health
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Identity-Focused Security for Your Zero Trust Journey

Bio

Alex Spotniz

Senior Solutions Engineer Okta

Sponsored by

Presentation

2:00 pm

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.
Bio

Chris Tyrrell

Director of Sales Engineering Next DLP

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Open Source Developers Are Security’s New Front Line

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well.  In this session, Sonatype read more…

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well.  In this session, Sonatype will explain how both security and developers must work together to stop this trend. Or, risk losing the entire open source ecosystem.

  • Analyze, and detail, the events leading to today’s “all-out” attack on the OSS industry
  • Define what the future of open source looks like in today’s new normal
  • Outline how developers can step into the role of security, to protect themselves, and the millions of people depending on them
Bio

Austin Steffes

Sales Engineer Sonatype

Sponsored by

Presentation

3:15 pm

Zero-Trust: What it means and how to take a holistic approach to securing modern IT ecosystems

From web applications to email and software supply chains – every facet of an organization’s digital ecosystem requires robust protection. A zero-trust architecture can mean a lot of things and be daunting to implement, but it’s critical to prevent the pervasive risk of file-borne threats that could include malware, viruses, read more…

From web applications to email and software supply chains – every facet of an organization’s digital ecosystem requires robust protection. A zero-trust architecture can mean a lot of things and be daunting to implement, but it’s critical to prevent the pervasive risk of file-borne threats that could include malware, viruses, ransomware, and malicious scripts, often camouflaged within innocuous file formats.

The foundational steps to fortify defenses begin with asset and data identification, data flow mapping, access controls, network segmentation, and incident response planning. However, what’s next, and how do you continue to build a zero-trust security architecture? The answer lies in a layered defense strategy, incorporating true zero-trust technologies to not only drive compliance but mature your cybersecurity posture.

This layered approach should include multiscanning to significantly enhance threat detection rates, data sanitization to ensure file safety before use, country of origin detection to prevent potentially malicious code or files from infiltrating the organization, and Data Loss Prevention (DLP) to ensure the integrity of sensitive data by scrutinizing files prior to their transit. Finally, emerging technologies like adaptive threat analysis can provide actionable threat intelligence, enabling organizations to stay one step ahead of potential adversaries.

Experts at OPSWAT know first-hand what it takes to safeguard digital assets and ensure the resilience of organizations’ IT and OT infrastructure. Hear Joe Edwards, VP of Global Sales Engineering share his insights on implementing and maintaining robust zero-trust security in this evolving and complex threat landscape.

Bio

Michael Hobart

SE OPSWAT

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Dr. Vimal Subramanian

Vice President and CISO Cue Health
Bio

Eric Bartlett

Director of IT Operations and Compliance Officer MeBe
Bio

Irvin Velazquez, PhD S.

Compliance Officer Globant
Bio

Lisel Newton

Senior Director, Information Security, Risk and Compliance Gossamer Bio
Bio

Roberta French

Director of IT Operations and Security WD-40 Company
5:00 pm

Closing Remarks

Share This