Rajesh has played the critical Role in Envisioning, Design, Development and Delivery of the Master Data Management, Data Integration, Conversion, Business Intelligence & Data Warehouse solutions over multiple projects for the variety of clients in Banking, Financial Services, HealthCare, Media and Utility Industry in his 15 + Years Career.
San Diego Cybersecurity Conference
Thursday, October 17, 2024
Hybrid
Join Us in San Diego for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Importance of Data Security in Cyber Security”
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Carmen Parada Rodriguez, Ph.D
Advisor-Cybersecurity Program Metropolitan Water District of Southern California
Jessica Sica
Head of Information Security at Weave Advisory Board Member at Dark Reading
Irvin Velazquez, PhD S.
Compliance Officer Globant
Rajesh “Raj” Arora
Vice President- Data Platform Engineering MUFG - Union Bank
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Wyndham San Diego Bayside
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending
In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.
But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!
Sponsored by
Presentation
Data is Everywhere So is User Access
Working from home is no longer the outlier it’s the Normal, bringing along challenges like heartache, sleep loss, and dread of missing security access in places like Starbucks or public WiFi. To tackle these issues, let’s find solutions that keep data secure everywhere.
Sponsored by
Presentation
Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense
The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.
Sponsored by
Sponsor Networking Time
Presentation
Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape
In today’s digital age, cybersecurity risk insurance and AI advancements are reshaping business security strategies. Cybersecurity insurance is crucial for mitigating the financial impacts of cyber threats, while AI offers both enhanced protection and new challenges. This presentation explores the evolving cyber insurance landscape and the transformative role of AI in cybersecurity. By integrating these insights, businesses can better navigate modern cybersecurity complexities. Leveraging cyber insurance and AI innovations, organizations can safeguard their digital assets in an interconnected world.
Sponsored by
Presentation
Overcoming the Noise - Create and Implement Unified Threat Protection
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Importance of Data Security in Cyber Security
Sponsor Networking Time
Presentation
Optimizing Event Logging, Monitoring, and Response: Best Practices to Mitigate Cyber Threats
In today’s cyber threat landscape, it is critical for organizations to enhance their resilience against “living off the land” techniques. These tactics, which leverage legitimate tools and processes to conduct malicious activities, are becoming more prevalent. To counter these threats, implementing and maintaining a robust event logging solution is vital. Such a solution strengthens system security by increasing network visibility and enabling faster, more effective incident response.
Sponsored by
Presentation
Fortify Your Organization’s Security and Stay Ahead of Evolving Threats
In this presentation, Ted Dillon, Senior Sales Engineer at Fastly, will discuss some key findings from Fastly’s 2024 Threat Insights Report. This report exposes the latest attack trends and techniques across the web application and API security landscape.
Key findings presented in this session include:
– The most critical application security threats affecting your industry.
– The latest methods used by threat actors.
– How collective intelligence enhances your defense strategies.
– Strategies to improve your AppSec posture.
– Insights into the profile of bot traffic.
With 5.5 trillion requests per month, the findings in this report provide a comprehensive analysis of the latest attack trends and techniques, designed to help security software managers enhance their defenses.
Sponsored by
Sponsor Networking Time
Presentation
Fool Me Once: The New Face of Deception and How We Can Help
In today’s fast-evolving tech world, distinguishing truth from deception is tough, leaving users as the most vulnerable link. Deception has moved beyond mere trickery to become a sophisticated tactic used to exploit everything from political controversies to urgent charity appeals. Attackers are capitalizing on high-stress situations and leveraging events like the Crowdstrike outages to create convincing traps.This talk will scrutinize how these deceptive tactics play out in real-world scenarios and why they’re more dangerous than ever.
Sponsored by
Presentation
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.