About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email firstname.lastname@example.org
Eva is a Senior Security PM Manager at Microsoft, currently leading the Offensive Security PM team that secures Microsoft’s largest and most important products and services across Edge devices, Windows OS and Devices, Xbox, Microsoft Game Studios, and more.
Eva brings background in various cybersecurity domains and Big 4 consulting. Over the years she has earned multiple well-recognized industry certifications including CISSP, CEH, CCSP, Security+, GSEC and GSTRT.. Aside from her lifelong obsession with cybersecurity, Eva is passionate about storytelling and distilling complex, ambiguous security problems into easy-to-understand concepts. As a proven thought leader, Eva has been an invited speaker at multiple security industry conferences and events.
Eva gives back to the security community by serving on the ISACA Puget Sound Chapter Board of Directors, The EC Council Certified Ethical Hacker (CEH) Advisory Board and the GIAC Advisory Board. She is also a co-founder of Women in Tech Global, a global, inclusive community that helps driving gender equality and Diversity & Inclusion in tech.
In addition to being a devoted lifetime cybersecurity professional, Eva is also a passionate mountaineer. She loves climbing peaks in the Swiss Alps in the summer and you’ll frequently find her summitting some of Washington State’s highest mountain peaks and volcanoes, including Mount Rainier, Mount Adams, Mount Baker and more.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Premier Platinum Sponsors
Times are subject to change
Opening Introductions | Check In | Networking
It’s a Snap Securing Your Multi-Cloud, Cloud-Native Deployments with CNAPP
More Context – Actionable Security – Smarter Prevention
It’s a Snap Securing Your Multi-Cloud, Cloud-Native Deployments with CNAPP
Few environments are as fast-changing and rapidly evolving as cloud computing. In a matter of just a few years, growth has exploded, and the cloud’s capabilities continue multiplying. Along with the growth in the cloud is a near equivalent growth in attacks on cloud networks. According to Check Point researchers, attacks on cloud-based networks increased by 48 percent in 2022 compared to 2021. In fact, Gartner says 95% of cybersecurity professionals are concerned about public cloud security. Making matters worse, also according to Gartner, there is a 52% cloud computing skills gap with today’s cybersecurity professional needs and overall, there is a 2.72M shortage of cybersecurity professionals. All of these facts lead to a significant need for a smart, powerful, comprehensive, and complete security platform to manage and secure today’s multi-cloud, cloud-native deployments. Enter CNAPP – Cloud Native Application Protection Platform. In this session, we’ll discuss what CNAPP is, why it’s needed, and several available resources where you can learn more.
Stories from the Front Lines: SOC Edition
There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include:
- The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat
- From the UK to Aliens to Pink Floyd: The British Hacker Story
- The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach
xIoT Hacking Demonstrations & Strategies to Disappoint Bad Actors
This talk will demonstrate several hacks against xIoT, or Extended Internet of Things, devices and share stories from the trenches involving cybercriminals, nation-state actors, and defenders. The presentation will detail findings from over six years of xIoT threat research spanning millions of production devices in enterprises and government agencies around the world.
Building a Human-Based Defense Readiness Program
Humans, not technology, are the cornerstone of a robust cybersecurity strategy. But how do you ensure your team is capable of detecting and defending against an ever-changing threat landscape? In this session, learn what a human-based defense readiness program looks like, how to deploy it, and how it can reduce your organization’s cyber risk.
"The Future of Security is Here and is Powered by AI. Now What?"
How to Build an Effective Cyber Resilient Strategy
In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats.
In this presentation, join Alan Leavell, Senior Solutions Architect at eSentire, as he shares insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption.
Key takeaways include:
- How to assess, understand, and quantify your cyber risks
- Why you should shift your focus to building cyber resilience in addition to managing your cyber risks
- How proactive threat hunting, combined with 24/7 threat detection and response, are critical in developing a strong cyber defense strategy
Communicating Risk With Your Leadership Team
In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks.
Luckily, some frameworks and processes already exist to help guide you through that process. Kayne McGladrey, Field CISO, will walk you through the current state of risk and how to effectively and accurately communicate risk to your leadership team.
In this webinar, you’ll learn:
- What the 2023 risk landscape looks like
- How risk managers are planning on updating their risk workflows to adapt
- How to communicate risk to leadership
API’s: The Users Best Friend but Your Data’s Worst Nightmare
API’s have exploded over the last couple of years as the pandemic changed the way organizations do business and how they relate to their users. This has served to drastically increase the number of doors open to the Data. But what hasn’t changed is the target. With Data still in the crosshairs, the challenge of protecting that data has increased accordingly.
Learn what organizations are doing today to mitigate the threat to Data from the exponential increase in access to that data via the explosion of API’s and API access points.
See risk differently! Surface unseen risk to get ahead of threats!
Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments. And they’re usually a few steps ahead of you.
How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams? You need to see risk differently by taking a different approach!
Join this session and learn how to:
Gain insight into your risk posture and how risk impacts your business priorities
Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities
Use intelligence and automation to deliver quick wins while freeing up your team’s’ time