Western-March
Wednesday, March 16, 2022
Virtual
Keynote Speaker
“"Cybersecurity Incident Management workshop"”
Klint Walker
Cyber Security Advisor U.S. Department of Homeland Security
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions
Presentation
Passwordless identities for workforces, customers, and developers
Sponsored by
Presentation
Zero Trust: Where Do You Think You’re Going?
Sponsored by
Keynote
"Cybersecurity Incident Management workshop"
Presentation
Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness
Sponsored by
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network
Sponsored by
Presentation
Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Sponsored by
Presentation
Compliance as a Catalyst for Reducing Risk
Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
- Challenges in Compliance and Risk Programs
- Five Best Practices in starting a Risk Program
- Compliance Considerations that will Improve Your Risk Posture
Sponsored by
Presentation
Building and Maintaining an Effective Cyber Range
Sponsored by
Presentation
5 Recommendations for Building a Scalable Red Team
Sponsored by
Presentation
The Boulevard of Broken Buckets
Sponsored by
Presentation
PKI-as-a-Service: Improve Security While Reducing Cost
In this presentation, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.
In this webinar, you will:
- Learn how PKIaaS can increase security while reducing complexity and costs
- Get a roadmap for automating a certificate-based security strategy
- Gain access to a checklist for choosing the best PKIaaS provider for your business