Tampa, FL
Thursday, July 27, 2023
Hybrid
Keynote Speaker
“"Cyber Fundamentals: A Necessity"”
Dave Summitt
VP Cyber Security, Florida Cancer Specialists & Research Institute | ICIT Fellow | Cyber Podcaster
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Ron Bevans
Vice President, Technology & Data Protection Officer BenefitHub
Larry Whiteside Jr.
Chief Information Security Officer RegScale
Candace Williams
Associate Director, Cybersecurity Leadership Raytheon Technologies, Raytheon Intelligence & Space
Anil Varghese
Chief Information Security Officer Francisco Partners
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Today’s Threat Landscape Requires a Unique Capability
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
Presentation
Asset Management: A Strategic Approach to Risk Mitigation
This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the impact of asset management on brand reputation. By integrating asset management practices, organizations can optimize risk assessment, incident response, and resource allocation, fortifying their resilience in the face of evolving threats.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Anatomy of Digital Fraud
Application modernization is the result of many digital transformation projects, but that journey can create security challenges which are amplifying exposure to digital fraud. The complexity of digital services which require heterogenous systems to interoperate seamlessly through APIs are now creating blind spots for organizations.
To secure this application sprawl, industry experts and analysts now consider securing applications and API through an integrated approach as the gold standard to preemptively protect against sophisticated attacks that leverage not only known and zero-day vulnerabilities, but also abuse what can appear to be legitimate to your valuable data for fraud. Join this presentation to understand the key vulnerabilities that emerge from modernizing your digital services, and what you can do to be proactive and protect your critical data.
Sponsored by
Presentation
Risk to Resilience: Ensuring optimum cyberhygiene with Endpoint Security
In today‘s threat landscape, digital transformation is crucial for organizations looking to stay ahead of threat actors. To achieve this, IT and Security teams must work together to ward off cyberattacks and ensure a positive employee experience. In this session, we’ll highlight the endpoint security strategies for your IT stack against known and unknown vulnerabilities.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Should your organization be trusted?
Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.
Sponsored by
Networking
Sponsor Networking Time
Keynote
"Cyber Fundamentals: A Necessity"
Dave Summitt
VP Cyber Security, Florida Cancer Specialists & Research Institute | ICIT Fellow | Cyber Podcaster
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Securely Leveraging AI for Business Growth: The Role of Security Service Edge (SSE)
In today’s rapidly evolving digital landscape, businesses are increasingly relying on artificial intelligence (AI) to drive growth and innovation. However, integrating AI into existing systems while maintaining optimal security poses significant challenges. This talk will explore the concept of Security Service Edge (SSE) and its role in safely enabling the use of AI to accelerate business growth without compromising performance or security. We will discuss how SSE acts as a critical security layer at the edge of the network, providing advanced threat protection, data privacy, and secure access controls. Join us to discover practical strategies for leveraging AI while ensuring robust security measures, enabling organizations to harness the power of AI to drive business success.
Sponsored by
Presentation
Best of Both Worlds: Privileged Access Management
As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates. Dave Gunther provides a solution called “The Best of Both Worlds”, which aims to increase security while reducing end-user frustration. Learn more about this solution and how it can help you protect your organization from cyber threats.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Protecting Data in a Distributed World
Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing proprietary communications protocols and hard-wired devices.
Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.
Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.
No man steps in the same river twice.
Sponsored by
Presentation
Moving from cybersecurity to cyber resilience to defend against surging threats
While cybersecurity protection systems are critical and necessary, recent high-profile attacks like the Barracuda email attack prove that even with great cybersecurity we are still vulnerable to exploits and attacks – often from undisclosed and undetectable ‘zero-day’ vulnerabilities. That is why it is critical to build cyber resiliency, not just cybersecurity.
Cybersecurity encompasses conventional preventive measures such as firewalls, antivirus and intrusion detection – which remain essential to defending networks and protecting data. Going beyond cybersecurity and moving towards cyber resilience is critical to withstanding the surging number of threats and changing attack vectors.
In this session we will discuss how you can incorporate business continuity, risk management and incident response into your strategy to move from security to resilience. You will learn the 6 steps to establish a resilience framework that ensures your ability to respond quickly and decisively to an ongoing attack in order to limit disruptions and sustain operations.
Sponsored by
Networking
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!