FutureCon Virtual Western Conference
Wednesday, March 16, 2022 @ 8am PT
(CA, TX, CO, WA, AZ, OR, UT, OK)
Earn up to 10 CPE credits























About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email [email protected]
Keynote Speaker
"Cybersecurity Incident Management workshop"
Klint Walker
Cyber Security Advisor U.S. Department of Homeland Security
Klint Walker is the Cyber Security Advisor for Region IV which covers Alabama, Florida, Georgia, Kentucky, Mississippi, North Carolina, South Carolina, and Tennessee. As the CSA, Klint is the liaison between Federal services and State, Local, territorial and Tribal Governments, Critical Infrastructure and Private Industry. He serves as the focal point for communications to promote Cyber Preparedness, incident response, risk mitigation and situational awareness. He provides direct coordination, outreach, and regional support in order to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s Critical Infrastructure and Key Resources (CIKR) and State, Local, Territorial, and Tribal (SLTT) governments Mr. Walker has previously held positions as an Information Systems Security Officer for the Department of Health and Human Services where he assisted in establishing the Computer Security Incident Response Center (CSIRC). Mr. Walker was also held the position of Chief Information Security Officer for the National Air and Space Intelligence Center (NASIC). In this role he was responsible for the operational resiliency of classified networks and facilities in adherence with DoD Standards and guidelines.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Platinum Sponsors


Gold Sponsors








Silver Sponsors









Partners



Agenda
Times are subject to change
Opening Introductions
Presentation
Passwordless identities for workforces, customers, and developers

Presentation
Zero Trust: Where Do You Think You’re Going?

Keynote
"Cybersecurity Incident Management workshop"
Presentation
Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness

Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network

Presentation
Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Presentation
Compliance as a Catalyst for Reducing Risk
Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
- Challenges in Compliance and Risk Programs
- Five Best Practices in starting a Risk Program
- Compliance Considerations that will Improve Your Risk Posture

Presentation
Building and Maintaining an Effective Cyber Range

Presentation
5 Recommendations for Building a Scalable Red Team

Presentation
The Boulevard of Broken Buckets

Presentation
PKI-as-a-Service: Improve Security While Reducing Cost
In this presentation, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.
In this webinar, you will:
- Learn how PKIaaS can increase security while reducing complexity and costs
- Get a roadmap for automating a certificate-based security strategy
- Gain access to a checklist for choosing the best PKIaaS provider for your business
