Home / / Tampa, FL

Tampa Cybersecurity Conference

Thursday, July 27, 2023

Live in Person @ Hilton Tampa Westshore 

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Cyber Fundamentals: A Necessity"

Dave Summitt

VP Cyber Security, Florida Cancer Specialists & Research Institute | ICIT Fellow | Cyber Podcaster

Dave Summitt is a highly accomplished cybersecurity executive with extensive experience in leading and managing cyber security programs and has received industry recognition for his involvement with initiatives that demonstrate thought leadership and outstanding business value. Dave is currently the Vice President of Cyber Security for the Florida Cancer Specialists & Research Institute (FCS) where he is responsible for continuous development and maintaining the cyber security program.  In his current role, Dave is responsible for the overall security of FCS’ IT infrastructure. He leads a team of security professionals who are responsible for developing and implementing security policies and procedures, conducting security assessments, and responding to security incidents. Dave is also a member of the organization’s executive leadership team, where he provides guidance and recommendations on security-related matters.

Prior to joining FCS, Dave was recruited by and became their first Chief Information Security Officer (CISO) with Moffitt Cancer Center & Research Institute in Tampa, FL where he constructed a comprehensive cyber security program. During his 6-1/2-year time with Moffitt, Dave and his team won numerous awards for his leadership and initiatives. A 21-year federal career with the Department of Defense preceded his entry into healthcare security. Mr. Summitt earned his undergraduate degree in Information Systems Management from the University of South Florida and his master’s in information security with a Digital Forensics concentration from Norwich University.

He is a fellow with the Institute of Critical Infrastructure Technology (ICIT) a national cyber security think tank based in Washington DC, a Florida Infragard member, a former member of the Forbes Technology Council and served as an adviser to the Center for Cyber Safety and Education. For several years, Dave has been identified as one of the “Hospital and Health System CISOs to know” by Becker’s Hospital review.

Dave has also had the honor of providing testimony before the U.S. Congress concerning security implications to healthcare operations due to phone spoofing and robocalls. He was later appointed by the FCC as Chairperson for the 2020 Hospital Robocall Protection Group, a working group directed by Congress to assist in making recommendations for combating robocalls and phone spam.

Dave is a respected leader in the information security community. He is a frequent speaker at security conferences and has written articles for several publications and is getting ready to publish his second season of “3-point Cyber”, a podcast about cyber for the layperson.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Ron Bevans

Vice President, Technology & Data Protection Officer
BenefitHub

Bio

Larry Whiteside Jr.

Chief Information Security Officer
RegScale

Bio

Candace Williams

Associate Director, Cybersecurity Leadership
Raytheon Technologies, Raytheon Intelligence & Space

Bio

Anil Varghese

Chief Information Security Officer
Francisco Partners

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Today’s Threat Landscape Requires a Unique Capability

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Shawn Taylor

Vice President, Threat Defense ForeScout Technologies
Bio
Forescout logo

Presentation

9:15 am

Asset Management: A Strategic Approach to Risk Mitigation

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the impact of asset management on brand reputation. By integrating asset management practices, organizations can optimize risk assessment, incident response, and resource allocation, fortifying their resilience in the face of evolving threats.

James Mignacca

CEO Cavelo
Bio

Networking

9:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:15 am

Anatomy of Digital Fraud

Application modernization is the result of many digital transformation projects, but that journey can create security challenges which are amplifying exposure to digital fraud. The complexity of digital services which require heterogenous systems to interoperate seamlessly through APIs are now creating blind spots for organizations.

To secure this application sprawl, industry experts and analysts now consider securing applications and API through an integrated approach as the gold standard to preemptively protect against sophisticated attacks that leverage not only known and zero-day vulnerabilities, but also abuse what can appear to be legitimate to your valuable data for fraud. Join this presentation to understand the key vulnerabilities that emerge from modernizing your digital services, and what you can do to be proactive and protect your critical data.

Luke Babarinde

Principal Architect Imperva
Bio

Presentation

10:45 am

Risk to Resilience: Ensuring optimum cyberhygiene with Endpoint Security

In today‘s threat landscape, digital transformation is crucial for organizations looking to stay ahead of threat actors. To achieve this, IT and Security teams must work together to ward off cyberattacks and ensure a positive employee experience. In this session, we’ll highlight the endpoint security strategies for your IT stack against known and unknown vulnerabilities.

Dinesh Babu Jayaraman

Technical Consultant Zoho Corporation
Bio

Networking

11:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

11:30 am

Should your organization be trusted?

Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.

Eric Anderson

Client Cyber Evangelist and Architect Atlantic Data Security
Bio

David Hawkins

Principal Consulting Engineer BitSight
Bio

Justin Baryza

Channel Enablement - Americas Pentera
Bio

Networking

12:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

12:15 pm

"Cyber Fundamentals: A Necessity"

Dave Summitt

VP Cyber Security, Florida Cancer Specialists & Research Institute | ICIT Fellow | Cyber Podcaster
Bio

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Securely Leveraging AI for Business Growth: The Role of Security Service Edge (SSE)

In today’s rapidly evolving digital landscape, businesses are increasingly relying on artificial intelligence (AI) to drive growth and innovation. However, integrating AI into existing systems while maintaining optimal security poses significant challenges. This talk will explore the concept of Security Service Edge (SSE) and its role in safely enabling the use of AI to accelerate business growth without compromising performance or security. We will discuss how SSE acts as a critical security layer at the edge of the network, providing advanced threat protection, data privacy, and secure access controls. Join us to discover practical strategies for leveraging AI while ensuring robust security measures, enabling organizations to harness the power of AI to drive business success.

Michael Ferguson

Director of Security Transformation Netskope
Bio

Presentation

2:15 pm

Best of Both Worlds: Privileged Access Management

As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates. Dave Gunther provides a solution called “The Best of Both Worlds”, which aims to increase security while reducing end-user frustration. Learn more about this solution and how it can help you protect your organization from cyber threats.

Dave Gunther

Enterprise Regional Manager CyberFOX
Bio

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Protecting Data in a Distributed World

Change is the only constant.

Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing proprietary communications protocols and hard-wired devices.

Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.

Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.

No man steps in the same river twice.

Ken Roberts

Senior Sales Engineer Next DLP
Bio

Presentation

3:30 pm

Moving from cybersecurity to cyber resilience to defend against surging threats

While cybersecurity protection systems are critical and necessary, recent high-profile attacks like the Barracuda email attack prove that even with great cybersecurity we are still vulnerable to exploits and attacks – often from undisclosed and undetectable ‘zero-day’ vulnerabilities.  That is why it is critical to build cyber resiliency, not just cybersecurity.

Cybersecurity encompasses conventional preventive measures such as firewalls, antivirus and intrusion detection – which remain essential to defending networks and protecting data.  Going beyond cybersecurity and moving towards cyber resilience is critical to withstanding the surging number of threats and changing attack vectors.

In this session we will discuss how you can incorporate business continuity, risk management and incident response into your strategy to move from security to resilience. You will learn the 6 steps to establish a resilience framework that ensures your ability to respond quickly and decisively to an ongoing attack in order to limit disruptions and sustain operations.

Don Gulling

President Verteks Consulting
Bio

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:30 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Ron Bevans

Vice President, Technology & Data Protection Officer BenefitHub
Bio

Larry Whiteside Jr.

Chief Information Security Officer RegScale
Bio

Candace Williams

Associate Director, Cybersecurity Leadership Raytheon Technologies, Raytheon Intelligence & Space
Bio

Anil Varghese

Chief Information Security Officer Francisco Partners
Bio

Closing Remarks

5:30 pm

Closing Remarks

Register

Share This