Tampa, FL (Eastern Region)

Wednesday, October 28, 2020

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Live

8:00 pm

Opening Introductions

Networking

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am

What Archeology Teaches us about Protecting Our Critical Infrastructure.

Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them. By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming read more…

Albert Einstein said, we can’t solve problems by using the same kind of thinking we used when we created them.

By the time you’ve heard this engaging talk by Eddie Doyle, you’ll think different. And when you see problems with new eyes, a whole new world will open up opportunities & unknown solutions will appear before you, transforming your challenges into an array of options.

Unafraid to fire moonshots, nor to avoid addressing sensitive subject matter, Eddie will be sure to provoke an authentic, respectful dialogue, with a goal to upgrade our thinking & protect our colleagues & friends from cyber attack.Come learn what a new 15,000 year history of human civilization teaches us about the evolution of cyber space & how we can invest less to create a full security prevention architecture in this brave new world.

Bio

Eddie Doyle

Cyber Security Evangelist Check Point Software Technologies, Inc.

Sponsored by

Live Presentation

9:40 am

Is Ransomware Winning?

Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are getting nastier too. This has led to incredible increases in the average ransoms paid over the read more…

Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are getting nastier too. This has led to incredible increases in the average ransoms paid over the past eighteen months. In this session, we will look at recent ransomware trends, the critical changes to threat actor behaviors, and discuss the strategies and technologies organizations need to defend themselves against this evolving threat.

Bio

Chris Goettl

Director of Product Management for Security Products Ivanti

Sponsored by

Break

10:10 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Keynote

10:25 am

Unicorns, Leprechauns and Firefighters: Why all three are vital to being a successful Cyber Security Leader

Bio

Keith O'Sullivan

SVP, Chief Information Security Officer Standard Industries

Break

11:25 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

11:45 am

Stopping Cyber Threats Against Remote Worker

Enterprises have adopted cloud and mobile technologies, like Microsoft Teams and even WhatsApp, to help remote workers remain productive and agile. Otavio Freire will provide insights on how to stop cyber threats and mitigate risk against the latest attacks. IN THIS PRESENTATION HE WILL COVER: • Current threat trends facing read more…
Enterprises have adopted cloud and mobile technologies, like Microsoft Teams and even WhatsApp, to help remote workers remain productive and agile. Otavio Freire will provide insights on how to stop cyber threats and mitigate risk against the latest attacks.
IN THIS PRESENTATION HE WILL COVER:
• Current threat trends facing remote workers.
• Cloud-first defense strategies to protect your remote workforce from ransomware and other attacks.
• How to gain visibility and mitigate threats in collaboration and mobile chat channels.
Bio

Otavio Freire

CTO and Co-Founder SafeGuard Cyber

Sponsored by

Live Panel Discussion

12:15 pm

SafeGuard Cybers Fireside Chat : Securing Human Connections in Remote Work Environments

Bio

Otavio Freire

CTO and Co-Founder SafeGuard Cyber
Bio

Anthony Johnson

Managing Partner Delve Risk

Sponsored by

Break

12:45 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:05 pm

How to Improve Cyber Resilience with Identity-Centric PAM

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption. There are many starting points on the read more…

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption.

There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization.

The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure.

Bio

Tony Goulding

CyberSecurity Evangelist Centrify Corporation

Sponsored by

On-Demand Presentation

1:35 pm

Best Practices – PAM Security and Data Privacy

The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your organizations read more…

The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your organizations unique risk appetite and tolerance can help guide decisions made to secure privileged accounts.

Bio

Christopher Hills

Deputy Chief Technology Officer BeyondTrust

Sponsored by

Break

2:05 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

2:25 pm

Seeing the forest through the trees - A risked based approach to maturing your VMP

We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
Bio

Rob Walk

Sr. Security Engineer Tenable

Sponsored by

On-Demand Presentation

2:55 pm

Cyber AI & Geopolitics: Managing Tomorrow's Cyber Risk

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how read more…

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher.

Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and CISO, Americas, JR Tietsort to discuss this new era of cyber-threat – and how Cyber AI can help defenders regain the upper hand.

This session will explore:

• How nation-state attacks are changing

• How organizations can respond to the classic balance of security and productivity

• How organizational maturity in risk management is maintained whilst ensuring cyber defense

Bio

JR Tietsort

Chief Information Security Officer, Americas Darktrace
Bio

Marcus Fowler

Director of Strategic Threat Darktrace

Sponsored by

Break

3:25 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

3:45 pm

The Microsoft Teams Explosion: Protecting Data at Scale in Office 365

Bio

Brian Vecci

Field CTO Varonis

Sponsored by

On-Demand Presentation

4:15 pm

Are you ready for Intelligent SOC?

The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and read more…

The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC.  Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

Bio

Brandon Hoffman

Chief Information Security Officer Netenrich

Sponsored by

Networking

4:35 pm

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Closing Remarks

5:00 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC Bio

Kim Hakim

CEO and Founder FutureCon, LLC
Share This