San Diego Cybersecurity Conference

Thursday, October 17, 2024

Wyndham San Diego Bayside

Parking/Directions

Hybrid

Join Us in San Diego for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Wyndham San Diego Bayside

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security read more…

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.

 But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!

Bio

Michael Marx

Solutions Engineer MySQL

Sponsored by

Presentation

9:15 am

Data is Everywhere So is User Access

Working from home is no longer the outlier it’s the Normal, bringing along challenges like heartache, sleep loss, and dread of missing security access in places like Starbucks or public WiFi. To tackle these issues, let’s find solutions that keep data secure everywhere.

Working from home is no longer the outlier it’s the Normal, bringing along challenges like heartache, sleep loss, and dread of missing security access in places like Starbucks or public WiFi. To tackle these issues, let’s find solutions that keep data secure everywhere.

Bio

Justin Bortnick

Sales Engineering Manager Forcepoint

Sponsored by

Presentation

9:45 am

Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into read more…

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

Bio

David Hagen

Cybersecurity Evangelist TPx

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI read more…

In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI in cybersecurity. By integrating these insights, businesses can better navigate modern cybersecurity complexities. Leveraging cyber insurance and AI innovations, organizations can safeguard their digital assets in an interconnected world.

Bio

Daniel Navarro

ESET Field Sales Engineer ESET

Sponsored by

Presentation

11:15 am

Overcoming the Noise - Create and Implement Unified Threat Protection

Bio

Désirée Wilson

Field CISO & Chief Client Success Officer DigitalXForce

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm

Importance of Data Security in Cyber Security

Bio

Rajesh “Raj” Arora

Vice President- Data Platform Engineering MUFG - Union Bank
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Optimizing Event Logging, Monitoring, and Response: Best Practices to Mitigate Cyber Threats

In today’s cyber threat landscape, it is critical for organizations to enhance their resilience against “living off the land” techniques. These tactics, which leverage legitimate tools and processes to conduct malicious activities, are becoming more prevalent. To counter these threats, implementing and maintaining a robust event logging solution is vital. read more…

In today’s cyber threat landscape, it is critical for organizations to enhance their resilience against “living off the land” techniques. These tactics, which leverage legitimate tools and processes to conduct malicious activities, are becoming more prevalent. To counter these threats, implementing and maintaining a robust event logging solution is vital. Such a solution strengthens system security by increasing network visibility and enabling faster, more effective incident response.

Bio

Paul Whittier

Principal Cybersecurity Advisor Adlumin

Sponsored by

Presentation

2:00 pm

Fortify Your Organization’s Security and Stay Ahead of Evolving Threats

In this presentation, Ted Dillon, Senior Sales Engineer at Fastly, will discuss some key findings from Fastly’s 2024 Threat Insights Report. This report exposes the latest attack trends and techniques across the web application and API security landscape. Key findings presented in this session include: – The most critical application read more…

In this presentation, Ted Dillon, Senior Sales Engineer at Fastly, will discuss some key findings from Fastly’s 2024 Threat Insights Report. This report exposes the latest attack trends and techniques across the web application and API security landscape.

Key findings presented in this session include:

– The most critical application security threats affecting your industry.

– The latest methods used by threat actors.
– How collective intelligence enhances your defense strategies.
– Strategies to improve your AppSec posture.
– Insights into the profile of bot traffic.

With 5.5 trillion requests per month, the findings in this report provide a comprehensive analysis of the latest attack trends and techniques, designed to help security software managers enhance their defenses.

Bio

Ted Dillon

Senior Sales Engineer Fastly

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Fool Me Once: The New Face of Deception and How We Can Help

In today’s fast-evolving tech world, distinguishing truth from deception is tough, leaving users as the most vulnerable link. Deception has moved beyond mere trickery to become a sophisticated tactic used to exploit everything from political controversies to urgent charity appeals. Attackers are capitalizing on high-stress situations and leveraging events like read more…

In today’s fast-evolving tech world, distinguishing truth from deception is tough, leaving users as the most vulnerable link. Deception has moved beyond mere trickery to become a sophisticated tactic used to exploit everything from political controversies to urgent charity appeals. Attackers are capitalizing on high-stress situations and leveraging events like the Crowdstrike outages to create convincing traps.This talk will scrutinize how these deceptive tactics play out in real-world scenarios and why they’re more dangerous than ever.

Bio

Brian Gilstrap

Associate Sales Engineer DNSFilter

Sponsored by

Presentation

3:15 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

3:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Carmen Parada Rodriguez, Ph.D

Advisor-Cybersecurity Program Metropolitan Water District of Southern California
Bio

Jessica Sica

Head of Information Security at Weave Advisory Board Member at Dark Reading
Bio

Irvin Velazquez, PhD S.

Compliance Officer Globant
Bio

Rajesh “Raj” Arora

Vice President- Data Platform Engineering MUFG - Union Bank
5:00 pm

Closing Remarks