Western-December

Wednesday, December 7, 2022

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

XDR – not all treasures are silver and gold

You don’t drown by falling in the uncorrelated-data lake; you drown by staying there.In this presentation, Daniel is going to take us back 10 years in order to understand different nuances and how things changed over time, leading to the challenges security teams are facing today.Whether you travel multiple paths read more…
You don’t drown by falling in the uncorrelated-data lake; you drown by staying there.In this presentation, Daniel is going to take us back 10 years in order to understand different nuances and how things changed over time, leading to the challenges security teams are facing today.Whether you travel multiple paths in search of visibility, detection and immediate response, the present continues to represent the ordeal task of navigating an ocean of data, with multiple ships drifting only on momentum. Building ships with the sole purpose to navigate blindly and alone must stop! We need collective feedback, direct interaction and most importantly to recognize when security teams are facing various struggles.Glancing into the future, we must understand the past and acknowledge that along each navigation path exists one particular intersection where your ship is prone to veer off into sunk costs, lack of visibility and inability to respond. It is a perilous place to travel and a barren place to exist. It is the opposite of resilience. This is the waters of ‘add more data and we will figure out how to use it’.Finding the north star is paramount.
Bio

Daniel Daraban

Director of Product Management Bitdefender

Sponsored by

Presentation

9:25 am

Analyze - Assess - Audit - Prevent

This session will help IT security admins a structured basic approach to have an inventory of the infrastructure. When you keep your inventory up-to date, you are protecting your investment. Awareness of how attacks are happening and the signature with which we can learn, Utilize tools and build an infrastructure read more…

This session will help IT security admins a structured basic approach to have an inventory of the infrastructure. When you keep your inventory up-to date, you are protecting your investment. Awareness of how attacks are happening and the signature with which we can learn, Utilize tools and build an infrastructure that will help secure your interests.

Bio

Sathish Sagayaraj Joseph

Technical Expert & Manager, Strategic Account Management Zoho Corporation

Sponsored by

Keynote

10:15 am

“How to Rob a Bank Over the Phone”

Bio

Joshua Crumbaugh

Ethical Hacker, Published Author, CEO at PhishFirewall

Presentation

11:30 am

See risk differently! Surface unseen risk to get ahead of threats!

Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected.  Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And read more…

Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected.  Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And they’re usually a few steps ahead of you.

How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams?  You need to see risk differently by taking a different approach!

Join this session and learn how to:

  • Gain insight into your risk posture and how risk impacts your business priorities

  • Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities

  • Use intelligence and automation to deliver quick wins while freeing  up your team’s’ time

Bio

Meghan Maneval

Director of Technical Product Management Reciprocity

Sponsored by

Panel Discussion

12:10 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Jonathan Kimmitt

Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Bio

Dr. Joe Perez

Senior Systems Analyst, NC DHHS Chief Technology Officer, SolonTek
Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica

Presentation

1:25 pm

Continuous Monitoring at Scale: The Future of Security Compliance

As technology advances and cybersecurity grows in importance, compliance requirements continue to increase. The old way of asking system admins for point-in-time screenshots, multiple times a year, is inefficient and outdated. In order to evolve the security compliance profession, we need a new way of performing compliance activities through continuous read more…

As technology advances and cybersecurity grows in importance, compliance requirements continue to increase. The old way of asking system admins for point-in-time screenshots, multiple times a year, is inefficient and outdated. In order to evolve the security compliance profession, we need a new way of performing compliance activities through continuous automation. This session will spotlight the way forward for compliance teams in today’s ever-evolving cyber risk landscape.

Learning Objectives:
The importance of why we need to evolve security compliance.
Best practices for implementing compliance at code-level.
Examples of how to apply continuous monitoring in your security compliance program.

Bio

John Volles

Senior Manager, Information Security Compliance AuditBoard

Sponsored by

Presentation

1:55 pm

The Past, Present and Future of Strong Authentication

Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on read more…

Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective.  Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.In this talk, we will discuss:

  • A brief history of authentication
  • Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
  • Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
  • A case for continuous user authentication
  • What is device risk and why is the real-time assessment of endpoint security important
Bio

Jasson Casey

CTO Beyond Identity

Sponsored by

Presentation

2:40 pm

Data Sensitivity Impacts on Zero Trust Implementation

Not all zero trust is created equal.  In this talk, Andy will discuss how organizations are implementing a zero trust framework, and how the importance of data classification applies to implementing the proper level of control in a modern environment.

Not all zero trust is created equal.  In this talk, Andy will discuss how organizations are implementing a zero trust framework, and how the importance of data classification applies to implementing the proper level of control in a modern environment.

Bio

Andrew Olpin

Cyber Solutions Architect Lookout

Sponsored by

Presentation

3:10 pm

Key Considerations for Choosing the Right Cloud Email Security Platform

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Unfortunately, email threats are only growing in number. Business email read more…

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 35% of all losses to cybercrime, and the Verizon Data Breach Investigations Report holds that phishing remains the top entry point for breaches—a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite. But the shift to cloud email requires one major thing: a shift to cloud email security.

Attend the Abnormal Security session for answers to your most pressing questions, including:
– What are modern email threats, and how are they different from legacy attacks?
– Which email threats are most concerning, and how can we defend against them in the cloud environment?
– Which technical capabilities are required when protecting cloud email?
– How can cloud email security platforms detect the most dangerous attacks?

Bio

Scott Deluke

Manager, Enterprise Engineers Abnormal

Sponsored by

Closing Remarks

3:40 pm

Closing Remarks