Seattle, WA

Thursday, February 29, 2024

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Future of Identity

Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? read more…
Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? What do we need to have in place to be ready? It’s not all doom and gloom SkyNet, but it’s also not the same Identity we’ve been doing for 20 years.
Bio

Jim Gerken

Director of Identity Services Novacoast

Sponsored by

Presentation

9:30 am

The What, Who For, and Why of MXDR

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the read more…

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments

Bio

Neal Hartsell

Chief Marketing Officer Gradient Cyber

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Unlock Shift Left: Right Teams, Right Tools, Fixed Problems

To match the pace of API-driven development, it’s essential to implement a proactive approach to security testing. However, organizations struggle despite a strong desire to integrate security into software delivery cycles effectively. This talk will dive into the “how” of shifting left, focusing on three key principles: people, process, and read more…

To match the pace of API-driven development, it’s essential to implement a proactive approach to security testing. However, organizations struggle despite a strong desire to integrate security into software delivery cycles effectively. This talk will dive into the “how” of shifting left, focusing on three key principles: people, process, and technology. 

Bio

Scott Gerlach

StackHawk CSO, Co-Founder

Sponsored by

11:00 am

Cloudflare Threat Radar - Current Trends and Recommendations

What are the current cybersecurity trends and recommendations to prevent and mitigate

What are the current cybersecurity trends and recommendations to prevent and mitigate

Bio

Arish Balasubramaniam

Field Solutions Engineer Cloudflare

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

"Elevating Your Cybersecurity Program: Key Priorities for CISOs"

As we truly put the pandemic behind us, we should look forward and ensure we have a new vigor to our information security program.  We should be looking at how we can assure stakeholders that we have a strong and resilient program. This requires a shift in how we position read more…

As we truly put the pandemic behind us, we should look forward and ensure we have a new vigor to our information security program.  We should be looking at how we can assure stakeholders that we have a strong and resilient program. This requires a shift in how we position ourselves in the organization and how we communicate our risk management performance.

This discussion covers five topics that cyber risk managers should consider moving forward to improve the organization’s risk posture.

Bio

William Lidster, Ph.D.

CISO, Senior Manager of Information Security and Compliance AAA Washington
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Bringing DevSecOps to Cloud Security

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure. Topics covered: ·      Understanding there is no one-size-fits-all read more…

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

Topics covered:
·      Understanding there is no one-size-fits-all model for DevSecOps
·      Best practices for integrating DevSecOps into your cloud security strategy
·      Exploring the intersection between development, security and DevSecOps

Bio

Brooks Cunningham

Senior Security Strategist Fastly

Sponsored by

Presentation

2:00 pm

DRIVING INTELLIGENCE WITH MITRE ATT&CK: LEVERAGING LIMITED RESOURCES TO BUILD AN EVOLVING THREAT REPOSITORY

Building threat intelligence is challenging, even under the most ideal circumstances. But what if you are even more limited in your resources? You are part of a small (but skilled) team, with high expectations, and people are relying on you to make business-critical decisions…all the time! What do you do read more…

Building threat intelligence is challenging, even under the most ideal circumstances. But what if you are even more limited in your resources? You are part of a small (but skilled) team, with high expectations, and people are relying on you to make business-critical decisions…all the time! What do you do in that situation? Turn a Toyota Tercel into a tank, of course. The Interpres Security threat intelligence team found itself in that exact situation. Wanting to leverage the MITRE ATT&CK catalog in creating a comprehensive and timely threat intelligence repository, the Interpres team built a series of tools, processes, and paradigms that we call Intelligence Engineering. In this talk, we’ll examine how we combined ATT&CK, STIX2, the Vertex Project’s open-source intelligence platform, Synapse, and custom code to deliver meaningful, rapid, verifiable intelligence to our customers. We’ll share lessons learned on automation, how to run multiple ATT&CK libraries side-by-side, and making programmatic intelligence delivery scalable and effective – just like building a tank out of an imported sedan.

Bio

Scott Roberts

Head of Threat Research Interpres Security

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Protective DNS Unleashed: A Ransomware Defense Strategy

In today’s ever-evolving threat landscape, securing your assets and infrastructure has become a formidable challenge. Traditional defense walls have fallen with rise on-the-go workforces and the relentless onslaught of cyber adversaries. But fear not, there’s a beacon of hope—protective DNS. In this session, we’ll break down the power of protective read more…

In today’s ever-evolving threat landscape, securing your assets and infrastructure has become a formidable challenge. Traditional defense walls have fallen with rise on-the-go workforces and the relentless onslaught of cyber adversaries. But fear not, there’s a beacon of hope—protective DNS.

In this session, we’ll break down the power of protective DNS as a pivotal element in safeguarding your business against ransomware and other insidious threats:

  • Unmasking the Phishing Threat: How deceptive phishing tactics open the door to digital mayhem and how to spot them to keep your organization safe.
  • Multi-Layered Defense with DNS Filtering: Discover why the DNS layer is your first line of defense and how it can safeguard your assets and infrastructure from ransomware attacks.
  • DNS-Based Threat Intelligence: The importance of purpose-built intelligence can be used to better detect and prevent zero-day threats at the DNS layer before they strike.
  • Compliance and Security Frameworks: Protective DNS isn’t just a nice-to-have; it’s increasingly essential for staying compliant with the big cybersecurity standards like ISO 27001, CMMC, and NIST.
Bio

Carl Levine

Head of Sales Engineering DNS Filter

Sponsored by

3:15 pm

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Eva Benn

Offensive Security Senior PM Manager @ Microsoft | Co-Founder @ Women in Tech Global | Board Director @ ISACA | EC-Council Advisory Board Member @ CEH (Certified Ethical Hacker) | GIAC Advisory Board
Bio

Marivell Alicea-Gamlin

Cyber Security BISO Analyst | ISC2 | Cyber Security Leader CBRE
Bio

Bryce Matsuoka

vCISO Above Cloud
Bio

Andy Stewart

ISSA Board Secretary | Region Cybersecurity Officer CommonSpirit Health
Bio

Timothy Youngblood

Former CISO T-Mobile | Angel Investor | PNW Cyversity
5:00 pm

Closing Remarks

Share This