Tampa Cybersecurity Conference

Thursday, May 23, 2024

Hilton Tampa Westshore

Parking/Directions

Hybrid

Join Us in Tampa for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Hilton Tampa Westshore

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Breach Containment: Assuming breach and isolating threats.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

9:30 am

Why is Critical data being compromised?

Bio

Asif Amjad

Senior Solutions Architect Thales

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Advancing Cybersecurity in the AI Era: Embracing Vulnerability Management and Attack Surface Management

This presentation dives into the landscape of cybersecurity, examining the fundamental shifts brought about by Asset Management, Vulnerability Management, and the integration of AI technologies. As vulnerabilities evolve in sophistication and scale, the need for a comprehensive Vulnerability Management strategy becomes imperative. The integration of AI technologies introduces new dimensions read more…

This presentation dives into the landscape of cybersecurity, examining the fundamental shifts brought about by Asset Management, Vulnerability Management, and the integration of AI technologies. As vulnerabilities evolve in sophistication and scale, the need for a comprehensive Vulnerability Management strategy becomes imperative. The integration of AI technologies introduces new dimensions of risk. This presentation explores how AI augments cyber risks and necessitates innovative approaches to vulnerability and attack surface management. By embracing Vulnerability Management 2.0 and Attack Surface Management, organizations can adapt to the evolving threat landscape and proactively mitigate emerging risks.

Bio

James Mignacca

CEO Cavelo

Sponsored by

Presentation

11:00 am

Securing Tomorrow: Mitigating Risks Across Data, Identity, and Infrastructure

Organizations today face unprecedented cybersecurity challenges, including sophisticated ransomware attacks, the exploitation of artificial intelligence, evolving compliance mandates, and the complexities of cyber insurance. This talk highlights solutions for protecting three critical security layers: data, identity, and infrastructure. We’ll address strategies and best practices that enable organizations of all sizes read more…

Organizations today face unprecedented cybersecurity challenges, including sophisticated ransomware attacks, the exploitation of artificial intelligence, evolving compliance mandates, and the complexities of cyber insurance. This talk highlights solutions for protecting three critical security layers: data, identity, and infrastructure. We’ll address strategies and best practices that enable organizations of all sizes to identify, protect against, detect, respond to, and recover from cyber-attacks.

Bio

Ryan Oistacher

Director of Product Marketing Netwrix

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Bridging the Gap between IT and the Business

Bio

Ron Bevans

Vice President, Technology & Data Protection Officer BenefitHub
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Chris Dawson

Threat Intelligence Publications Lead Proofpoint

Sponsored by

Presentation

2:00 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
2:45 pm

Securing the Future: Enhancing Government Cybersecurity with Netskope's Unified Approach

In an era where digital infrastructure and data integrity are foundational to national security and democratic processes, the significance of robust cybersecurity measures cannot be overstated. As we navigate through a critical election year, the vulnerability of state and federal agencies to cyber threats poses unprecedented challenges. Misconfigurations, vulnerabilities, third-party read more…

In an era where digital infrastructure and data integrity are foundational to national security and democratic processes, the significance of robust cybersecurity measures cannot be overstated. As we navigate through a critical election year, the vulnerability of state and federal agencies to cyber threats poses unprecedented challenges. Misconfigurations, vulnerabilities, third-party risks, and misuse of applications across SaaS, IaaS, or privately hosted services have opened avenues for both foreign and domestic adversaries to exploit.

This presentation delves into the intricate landscape of cyber threats facing government agencies and outlines strategic measures to fortify defenses. Featuring Netskope’s Unified CASB (including SSPM, CSPM, and CASB), Cloud Confidence Index (CCI), and the implementation of Continuously Adaptive Access through its Security Service Edge (SSE) and Zero Trust Engine, participants will gain insights into pioneering approaches for safeguarding the nation’s digital frontiers.

Bio

Michael Ferguson

Director of Security Transformation Netskope

Sponsored by

Presentation

3:15 pm

AI is shaping our future

Jason Rice, Vice President of Forcepoint, delves into the transformative role of AI in shaping the future. It underscores the importance of data protection when deploying AI within an enterprise. The talk highlights potential data risks associated with AI solutions and emphasizes the need for robust security measures. Implementing efficient read more…
Jason Rice, Vice President of Forcepoint, delves into the transformative role of AI in shaping the future. It underscores the importance of data protection when deploying AI within an enterprise. The talk highlights potential data risks associated with AI solutions and emphasizes the need for robust security measures. Implementing efficient and effective data security controls requires more than just an array of siloed products. Security and risk management leaders are urged to use a strategic roadmap to capitalize on their data security strategy.
Bio

Jason Rice

Vice President, Sales Forcepoint

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Rachel Taylor

Head of Information Security & Compliance Docker
Bio

Stephany Setrajcic

SVP, Chief Audit Executive Pathward
Bio

Michael Landy

Senior Vice President- Risk Governance Information Technology and Cyber Security Citi
Bio

Ron Bevans

Vice President, Technology & Data Protection Officer BenefitHub
5:00 pm

Closing Remarks