Tampa, FL

Thursday, July 27, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Today’s Threat Landscape Requires a Unique Capability

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Shawn Taylor

Vice President, Threat Defense ForeScout Technologies

Sponsored by

Presentation

9:15 am

Asset Management: A Strategic Approach to Risk Mitigation

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the read more…

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the impact of asset management on brand reputation. By integrating asset management practices, organizations can optimize risk assessment, incident response, and resource allocation, fortifying their resilience in the face of evolving threats.

Bio

James Mignacca

CEO Cavelo

Sponsored by

Networking

9:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:15 am

Anatomy of Digital Fraud

Application modernization is the result of many digital transformation projects, but that journey can create security challenges which are amplifying exposure to digital fraud. The complexity of digital services which require heterogenous systems to interoperate seamlessly through APIs are now creating blind spots for organizations. To secure this application sprawl, read more…

Application modernization is the result of many digital transformation projects, but that journey can create security challenges which are amplifying exposure to digital fraud. The complexity of digital services which require heterogenous systems to interoperate seamlessly through APIs are now creating blind spots for organizations.

To secure this application sprawl, industry experts and analysts now consider securing applications and API through an integrated approach as the gold standard to preemptively protect against sophisticated attacks that leverage not only known and zero-day vulnerabilities, but also abuse what can appear to be legitimate to your valuable data for fraud. Join this presentation to understand the key vulnerabilities that emerge from modernizing your digital services, and what you can do to be proactive and protect your critical data.

Bio

Luke Babarinde

Global Solution Architect Imperva

Sponsored by

Presentation

10:45 am

Risk to Resilience: Ensuring optimum cyberhygiene with Endpoint Security

In today‘s threat landscape, digital transformation is crucial for organizations looking to stay ahead of threat actors. To achieve this, IT and Security teams must work together to ward off cyberattacks and ensure a positive employee experience. In this session, we’ll highlight the endpoint security strategies for your IT stack read more…

In today‘s threat landscape, digital transformation is crucial for organizations looking to stay ahead of threat actors. To achieve this, IT and Security teams must work together to ward off cyberattacks and ensure a positive employee experience. In this session, we’ll highlight the endpoint security strategies for your IT stack against known and unknown vulnerabilities.

Bio

Dinesh Babu Jayaraman

Technical Consultant Zoho Corporation

Sponsored by

Networking

11:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

11:30 am

Should your organization be trusted?

Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.

Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.

Bio

Eric Anderson

Client Cyber Evangelist and Architect Atlantic Data Security
Bio

David Hawkins

Principal Consulting Engineer BitSight
Bio

Justin Baryza

Channel Enablement - Americas Pentera

Sponsored by

Networking

12:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

12:15 pm

"Cyber Fundamentals: A Necessity"

Bio

Dave Summitt

VP Cyber Security, Florida Cancer Specialists & Research Institute | ICIT Fellow | Cyber Podcaster

Networking

1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Securely Leveraging AI for Business Growth: The Role of Security Service Edge (SSE)

In today’s rapidly evolving digital landscape, businesses are increasingly relying on artificial intelligence (AI) to drive growth and innovation. However, integrating AI into existing systems while maintaining optimal security poses significant challenges. This talk will explore the concept of Security Service Edge (SSE) and its role in safely enabling the read more…

In today’s rapidly evolving digital landscape, businesses are increasingly relying on artificial intelligence (AI) to drive growth and innovation. However, integrating AI into existing systems while maintaining optimal security poses significant challenges. This talk will explore the concept of Security Service Edge (SSE) and its role in safely enabling the use of AI to accelerate business growth without compromising performance or security. We will discuss how SSE acts as a critical security layer at the edge of the network, providing advanced threat protection, data privacy, and secure access controls. Join us to discover practical strategies for leveraging AI while ensuring robust security measures, enabling organizations to harness the power of AI to drive business success.

Bio

Michael Ferguson

Director of Security Transformation Netskope

Sponsored by

Presentation

2:15 pm

Best of Both Worlds: Privileged Access Management

As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take read more…

As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates. Dave Gunther provides a solution called “The Best of Both Worlds”, which aims to increase security while reducing end-user frustration. Learn more about this solution and how it can help you protect your organization from cyber threats.

Bio

Dave Gunther

Enterprise Regional Manager CyberFOX

Sponsored by

Networking

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Protecting Data in a Distributed World

Change is the only constant. Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing proprietary communications protocols and hard-wired devices. Today that model has changed dramatically; both company confidential and customer read more…
Change is the only constant.

Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing proprietary communications protocols and hard-wired devices.

Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.

Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.

No man steps in the same river twice.

Bio

Ken Roberts

Senior Sales Engineer Next DLP

Sponsored by

Presentation

3:30 pm

Moving from cybersecurity to cyber resilience to defend against surging threats

While cybersecurity protection systems are critical and necessary, recent high-profile attacks like the Barracuda email attack prove that even with great cybersecurity we are still vulnerable to exploits and attacks – often from undisclosed and undetectable ‘zero-day’ vulnerabilities.  That is why it is critical to build cyber resiliency, not just read more…

While cybersecurity protection systems are critical and necessary, recent high-profile attacks like the Barracuda email attack prove that even with great cybersecurity we are still vulnerable to exploits and attacks – often from undisclosed and undetectable ‘zero-day’ vulnerabilities.  That is why it is critical to build cyber resiliency, not just cybersecurity.

Cybersecurity encompasses conventional preventive measures such as firewalls, antivirus and intrusion detection – which remain essential to defending networks and protecting data.  Going beyond cybersecurity and moving towards cyber resilience is critical to withstanding the surging number of threats and changing attack vectors.

In this session we will discuss how you can incorporate business continuity, risk management and incident response into your strategy to move from security to resilience. You will learn the 6 steps to establish a resilience framework that ensures your ability to respond quickly and decisively to an ongoing attack in order to limit disruptions and sustain operations.

Bio

Don Gulling

President Verteks Consulting

Sponsored by

Networking

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:30 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Ron Bevans

Vice President, Technology & Data Protection Officer BenefitHub
Bio

Larry Whiteside Jr.

Chief Information Security Officer RegScale
Bio

Candace Williams

Associate Director, Cybersecurity Leadership Raytheon Technologies, Raytheon Intelligence & Space
Bio

Anil Varghese

Chief Information Security Officer Francisco Partners

Closing Remarks

5:30 pm

Closing Remarks