Snehal Contractor is responsible for Worldwide Systems Engineering and Technical Service at Stellar Cyber. He is an engineering professional with over 30 years of experience in technical sales, marketing, and management. Snehal has worked for startup companies such as Netscreen, Palo Alto Networks, Riverbed, Fortinet, Aerohive, Cisco, and USRobotics. During his tenure at these companies, he has supported the largest Service Providers and System Integrators globally. Some of the accounts he has supported are Accenture, Dimension Data, Verizon, French Telecom, ATT, Forsythe Security, and Sprint; these accounts eventually became the top partners for his company. Snehal is called upon to be a trusted consultant to on-board these global partners from business development to complete technical enablement. Snehal earned his Bachelor of Science in Electrical Engineering and Computer Science from University of Illinois.
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email email@example.com
James Azar is a CISO that works, leads, and is dedicated to the security and business mission to ensure the continuity and fluidity of cybersecurity within the business. In his experience, James has served as CTO, CIO, and CISO but his passion is the intersection of Security and Business where innovation and out of box thinking are needed to succeed.
James is the host of The CyberHub Podcast, CISO Talk, and a new and noteworthy privacy podcast called Goodbye Privacy.
James is a public speaker and event host that hosts the annual CyberHub Summit in Atlanta and has spoken in events across the globe from CyberTech Israel, RSA, and has been published in Fox, OAN, AJC, ABC, and many more publications
Times are subject to change
Employees are not the Enemy: Insider Risk and Employee Trust in the Enterprise
As the evolution of working from home becomes a permanent part of the employee experience, security teams are rethinking how they address Insider Risk. Too often employees are perceived as the enemy by both the security organization and the tools they use due to a lack of trust. This “guilty until proven innocent” approach creates obstacles, which impede productivity and stifle healthy collaboration. The result is a “bypass culture”, wherein users intentionally circumvent security controls just to be able to do their job. By attending this session, executives and practitioners alike will learn how a “trust but verify” approach to insider risk can reduce data exposure events without disrupting the user experience.
SolarWinds Breach and Ransomware in 2021
We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.
What you’ll learn:
- How hackers used highly evasive malware to compromise SolarWinds defenses.
- Assessing your environment and determining vulnerability.
- Finding and addressing lateral movement in your environment.
The CISO Dilemma – Changing our approach with the Executive suite and boardroom
In the aftermath of SolarWinds and the recent Microsoft Exchange Zero days, CISO’s are under the gun to answer questions that few can answer effectively. The time has come to change our approach with executive leadership; in the era of a SaaS, IaaS and Cloud, we need to start having the right conversations and adjusting the expectations around security in the supply chain and within the leadership in our organizations. This talk will give real practical conversation points to take away and into the business right away.
5 Critical Pillars for the SOC of the Future
This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
- Threat intelligence
- Threat research
- Detection engineering
- Incident handling
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.
Cybersecurity Backup Checklist
How to Detect Common Threats Targeting Your Cloud Infrastructure
This unprecedented era of remote work has forced a rapid move to the cloud for many organizations. But that can leave critical gaps in detecting security threats in the cloud.
Join Patrick Garity, VP of Operations at Blumira for a discussion on common cloud security detections and how to detect threats targeting your cloud infrastructure.
In this talk, you’ll learn about:
-Different types of attacks targeting cloud infrastructure platforms like Microsoft Azure, Office 365, Okta, G Suite and Amazon Web Services
-Common vulnerabilities that may lead to a compromise
-How to properly detect cloud-related misconfigurations and potential threats to reduce your overall attack surface
Achieving Cyber Resilience through Zero Trust
Past, Present, Future: Zero Trust Architecture
In this webinar you will learn:
- How to maximize existing security controls, security capabilities, and investments
- Pragmatic application of zero-trust principles to traditional and SaaS environments
- What’s new in tactics and strategies for protecting hybrid environments
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.
However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.
Securing Apps in SDN & Hybrid-Cloud Environments
Making Zero Trust Real
2021 State of Malware
- Top threats for businesses and consumers
- Emerging cybercrime trends and tactics
- Solutions you can employ to thwart future attacks