St. Louis, MO (Central Region)
Wednesday, November 18, 2020
Virtual
Keynote Speaker
“Keynote Speaker: Peter Hogan |CTO & CPO | Post Holdings | "Secure RPA (Robotic Process Automation)"”
Peter Hogan
Chief Technology Officer & Chief Privacy Officer Post Holdings
Pete Hogan is Chief Technology Officer and the Chief Privacy Officer at Post Holdings, Inc. He has led the transformation of Post Application and Data models into the cloud for over 6 years along with the program management for the acquisition integration efforts across the IT ecosystems where Operating Divisions combined for synergies. Pete has […]
CISO/Industry Leader Panel
Panel Discussion: Preparing for 2021 – a post-pandemic plan. Will we return to normalcy?
Laureen Smith
Executive - Cybersecurity Advisory LJ Marketing & Communications
Mia Boom-Ibes
Vice President Information Security Strategy, Innovation and Analytics Allstate Insurance Company
Devin Shirley
Chief Information Security Officer Arkansas Blue Cross Blue Shield
Marc Ashworth
Chief Information Security Officer - Senior VP First Bank
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions
Networking
Sponsor Virtual Booth Networking Time
Presentation
Securing the Future of Work: How Cyber AI Learns on the Job
Though parts of the world are slowly transitioning back to ‘normal’, cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.
Join Justin Fier, Darktrace’s Director of Cyber Intelligence and Analysis, as he discusses how traditional cyber security tools are ill-equipped to protect today’s dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings.
In this presentation, discover how Cyber AI:
· Autonomously detects and responds to cyber-attacks in the first instance and before damage is done
· Thwarted a Covid-19 email impersonating the CEO of an electricity distributor
· Neutralized a SaaS takeover at a Panamanian bank
Sponsored by
Presentation
Best Practices – PAM Security and Data Privacy
Sponsored by
Vendor and Peer Networking
Live Keynote
Keynote Speaker: Peter Hogan |CTO & CPO | Post Holdings | "Secure RPA (Robotic Process Automation)"
This session will address the risks along with some of the mitigation options involved in securely embedding RPA in your environment.
Break
Break
Live Presentation
Conquering Cyber Risk in 3rd Party Communications
Sponsored by
Live Panel Discussion
Panel Discussion: Preparing for 2021 – a post-pandemic plan. Will we return to normalcy?
Everyone is anticipating to return to work at some point next year, as a CISO what does that mean for you?
What will work look like? Will your job be changing? What risks will we face? Is it possible to return to the old normal?
Mia Boom-Ibes
Vice President Information Security Strategy, Innovation and Analytics Allstate Insurance Company
Break
Break
Presentation
When Firewalls and Traditional Segmentation Fail: The Era of Software-Based Segmentation
Legacy security and segmentation techniques are woefully inadequate in today’s fast moving enterprises where innovation and speed are musts. Dave Klein takes us through why these techniques have failed, discusses the business and technical drivers demanded by industry, the threats we face including ransomware and provides us with a recipe for success in Software-Based Segmentation.
Sponsored by
Presentation
The Growing Need for Identity & Access Management to Support Digital Business Initiatives
Sponsored by
Break
Vendor and Peer Networking
Presentation
Making the SOC more effective by enabling automation with better data
SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.
Sponsored by
Presentation
Network Visibility for the Modern Data Center
Sponsored by
Break
Vendor and Peer Networking
Presentation
Making the Case for Authentication as a Platform
As organizations adopt advanced authentication practices, it’s critical to consider the varied modalities your organization requires. The “solution” should not be one that’s built from a collection of point solutions. For this reason, many businesses are turning to authentication solutions that are built as a platform. This holistic solution is accommodating to different modalities, applications and form factors. It can also control the authentication and credential management lifecycle. In this session, the experts from HID® Global will:
- Address the most common challenges and concerns for enterprise organizations attempting to streamline authentication
- Detail the intricacies of the authentication lifecycle
- Help you identify what to look for in an authentication platform that meets your organization’s needs