Tampa, FL

Wednesday, June 29, 2022

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Seize the Breach: Why Breaches Still Occur and How to Mitigate Them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t read more…

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

Why breaches are usually occurring

How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage

A simple maturity model based on outcomes and use cases that can vastly improve Security Operations

Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.

Bio

AJ Singh

Director of Engineering Exabeam

Sponsored by

Presentation

9:30 am

Security Whimsy and Misinformation: AI and ML?

This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.

This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities.

Bio

Neal Humphrey

AVP, Security Strategy Deepwatch

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Zero Trust for Applications

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Bio

Chad Maskill

Cyber Hero ThreatLocker

Sponsored by

Presentation

11:00 am

Optimizing the Human Element of Cybersecurity

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper read more…

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper look at:

· How approaches to cyber defense are changing to keep pace with the ever-evolving threats of hackers

· What motivates cyber professionals

· How to make humans the strongest link in the cyber defense line

Bio

Jeff Orloff

Tech Evangelist and Vice President of Product RangeForce

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Break

11:45 am

Lunch

Keynote

12:00 pm

"Zero-Trust and How it Can Greatly Reduce Ransomware"

This topic will touch up on: System Inventory and why it is so important and how to do this with little cost Identity and why this should be part of zero-trust Device Trust w/ Posture Checking

This topic will touch up on:

  • System Inventory and why it is so important and how to do this with little cost
  • Identity and why this should be part of zero-trust
  • Device Trust w/ Posture Checking
Bio

Tim Rice

Chief Information Security Officer Herc Rentals

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Monitoring RUSSIAN Cyber Activities

Bio

Craig Reeds

OT Professional Services Engineer Forescout Technologies

Sponsored by

Presentation

2:00 pm

ZeroTrust Microsegmentation, Easier Than You Think

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Future-proof Security: Myth or Reality?

There is no magic bullet in security. Yet there are many best practices adopted by enterprises across the globe that have proven to allow organizations to mitigate risk and mature their security posture. During this session you will learn about common trends and challenges in cybersecurity and what organizations are read more…

There is no magic bullet in security. Yet there are many best practices adopted by enterprises across the globe that have proven to allow organizations to mitigate risk and mature their security posture. During this session you will learn about common trends and challenges in cybersecurity and what organizations are doing to keep up and be ready for the future.

Bio

Matteo Rebeschini

Principal Solutions Architect, Security Elastic

Sponsored by

3:15 pm

Fast and Furious Attacks: Using AI to Surgically Respond

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds. Explore today’s threats and challenges and learn how advances in read more…

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

Bio

Justin Fier

Director for Cyber Intelligence and Analysis Darktrace

Sponsored by

Networking

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Chad Maskill

Cyber Hero ThreatLocker
Bio

Ronnie Munn

Chief Information Security Officer Galway Holdings
Bio

Brett Conlon

Chief Information Security Officer American Century Investments
Bio

Tom Hughes

CGCIO Information Technology Bureau Southwest Florida Water Management District
Bio

Stephany Setrajcic

Governance Risk and Compliance Executive MetaBank

Closing Remarks

5:00 pm

Closing Remarks