St. Louis, MO (Central Region)

Wednesday, November 17, 2021

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Check In | Networking

9:05 am

Rise of Secure Access Service Edge (SASE)

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While read more…

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases.
  • Architectural considerations you should keep in mind when comparing SASE vendors. 
Bio

Kevin Sheu

Senior VP of Marketing Bitglass

Sponsored by

Presentation

9:30 am

Winning Against Ransomware

Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software read more…

Guardicore will share real (and daily) experience with helping customers hit by ransomware. Join us to hear what attacks look like in real life, how incident response teams deal with them, and what can be learned from helping multiple customers to recover from ransomware. We will also discuss how software based segmentation can help your organization to quickly put controls in place that help you avoid becoming a victim of these increasingly prevalent campaigns.

Bio

Mac Grant

Area Vice President, Central US Guardicore

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Navigating Your XDR Strategy with AI Prevention First Approach

With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations.  Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can read more…

With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations.  Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can improve your security posture focusing on an XDR directional position.

Bio

Todd Berger

Head of Solution Engineering AMERs BlackBerry

Sponsored by

Presentation

11:00 am

Build vs. Buy: Advantages of a Pre-Built Solution

In this session John Wilke will guide you through the advantages of a pre-built identity solution. He will review how identity used to be a cost center and now it is viewed as a business enabler and strategic initiative. He will also help you compare the options when looking to build out a read more…

In this session John Wilke will guide you through the advantages of a pre-built identity solution. He will review how identity used to be a cost center and now it is viewed as a business enabler and strategic initiative. He will also help you compare the options when looking to build out a modern identity solution. We look forward to seeing you!

Bio

John Wilke

Senior Product Marketing Manager Okta

Sponsored by

11:30 am

Lunch

Presentation

11:45 am

Leveraging IAM for Effective and Efficient Threat Mitigation

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.Faced with the challenge of managing identities and securing access to data and applications from a growing read more…

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business

Bio

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin

Sponsored by

12:15 pm

Is your defensive stack ready for a targeted attack?

With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources read more…

With all the recent headlines, it seems the risk of ransomware has become an added certainty to the daily lives of Cybersecurity personnel. Adversaries are automating the initial stages of the cyber attack lifecycle in order to identify the best bang for their buck. How do organizations with limited resources even keep up? Adding another tool to the defensive stack just isn’t enough. How do you know it will reliably stand up against an actual threat? In this session, I will speak to specific techniques in identifying ransomware threats at different layers of the defensive stack that will help reduce risk & impact. Finally, we leverage the Pentera platform to automate a holistic view, emulating actual attacks to measure the resilience of all our efforts.

Bio

Stephen Tutterow

Sales Engineer Pentera

Sponsored by

Networking

12:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Live Keynote

1:00 pm

“Securing the enterprise of the future"

Today’s cyber-security environment is dynamic and evolving every day.  What will security teams need to do now in order to combat future threats and reduce the risks to organizations?  Hear the insights of Marc Ashworth the Chief Information Security Officer of First Bank, one of the largest family owned banks read more…

Today’s cyber-security environment is dynamic and evolving every day.  What will security teams need to do now in order to combat future threats and reduce the risks to organizations?  Hear the insights of Marc Ashworth the Chief Information Security Officer of First Bank, one of the largest family owned banks in the US, and the challenges of security practitioners today and in the near future.

2:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:15 pm

Conquering Cloud Complexity

Cloud security is hard, not least because cloud platforms change so quickly.  This talk presents several lessons learned from security teams struggling to get their arms around the sprawl of modern infrastructure, using practical analogies from pandemics and earthquakes.

Cloud security is hard, not least because cloud platforms change so quickly.  This talk presents several lessons learned from security teams struggling to get their arms around the sprawl of modern infrastructure, using practical analogies from pandemics and earthquakes.

Bio

Mike Lloyd

CTO RedSeal Networks

Sponsored by

Presentation

2:45 pm

Hidden in Plain Sight: How Malware Delivers C2 Communications, Data Infiltration & Data Exfiltration using Normal DNS Queries

DNS is a more than just a “phone book”.  It is a communications protocol.  It is nearly 40 years old, and is foundational to the Internet.  Were you aware that there are many ways to attack, take down, and exploit this protocol for nefarious purposes?  Further, it has been overlooked as a security risk read more…

DNS is a more than just a “phone book”.  It is a communications protocol.  It is nearly 40 years old, and is foundational to the Internet.  Were you aware that there are many ways to attack, take down, and exploit this protocol for nefarious purposes?  Further, it has been overlooked as a security risk until recent years.  Also, while there are several ways to secure it, not all solutions are equal, and often are misunderstood.  We will be presenting one way that DNS is used throughout the lifespan of an attack and how you can secure your networks, today.

Bio

Tony Velada

Senior Solutions Architect Infoblox

Sponsored by

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:30 pm

How to stop Ransomware BEFORE it starts.

Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense.  Please join me as I share how read more…

Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense.  Please join me as I share how ransomware has changed, how to see it before it starts, and what I predict ransomware will exploit next.

Bio

Kevin Kennedy

VP of Product Management Vectra

Sponsored by

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Mike Lloyd

CTO RedSeal Networks
Bio

Peter Hogan

Chief Technology Officer & Chief Privacy Officer Post Holdings
Bio

Josh Jaffe

Board President: Global Center for Cybersecurity @Cortex
Bio

Phil Melcher

Director of Security St. Louis Cardinals
Bio

Andrew Wilder

Adjunct Professor - Cybersecurity Washington University
5:00 pm

Prize Drawing | Closing Remarks | Happy Hour