Western-March

Wednesday, March 16, 2022

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions

Presentation

9:00 am

Passwordless identities for workforces, customers, and developers

In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have read more…
In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal.  But not all MFA is created equal.  Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong Zero Trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access.
Bio

Patrick McBride

Chief Marketing Officer Beyond Identity

Sponsored by

Presentation

9:30 am

Zero Trust: Where Do You Think You’re Going?

Nothing in security ever stays still, and Zero Trust is no different.  While many organizations have begun their journey to zero trust, the elements and opportunities are changing.  In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero read more…
Nothing in security ever stays still, and Zero Trust is no different.  While many organizations have begun their journey to zero trust, the elements and opportunities are changing.  In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.
Bio

Helen Patton

Advisory CISO Cisco at Duo Security

Sponsored by

Keynote

10:15 am

"Cybersecurity Incident Management workshop"

Presentation

11:25 am

Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness

Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is read more…
Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is protected and your assets stay secure with Cyber Situational Awareness.
Bio

Christopher Morales

CISO and Head of Security Strategy Netenrich

Sponsored by

Panel Discussion

12:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Christophe Foulon

CISO/vCISO Cybersecurity, Resiliency & Risk Strategy
Bio

Karen Rouleau

Director, Industry Strategy, Federal and Global Central Governments Oracle
Bio

Derek Morris

Virtual Chief Information Security Officer Wolf & Company, P.C.
Bio

Avishai Avivi

CISO Safebreach
1:15 pm

Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network

Roger Grimes headshot Bio

Roger Grimes

Data-Driven Defense Evangelist KnowBe4

Sponsored by

Presentation

1:45 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next read more…

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

2:25 pm

Compliance as a Catalyst for Reducing Risk

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s read more…

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.

  • Challenges in Compliance and Risk Programs
  • Five Best Practices in starting a Risk Program
  • Compliance Considerations that will Improve Your Risk Posture
Bio

Rob Ellis

Chief Strategy Officer Reciprocity

Sponsored by

Presentation

2:55 pm

Building and Maintaining an Effective Cyber Range

Cyber ranges are invaluable tools for training security operations teams and establishing cyber resilience. In this session, learn about the key components of an effective cyber range, common challenges in building a range, and how to optimize functionality, maintenance, and attack scenarios that keep a cyber range efficient and relevant.
Cyber ranges are invaluable tools for training security operations teams and establishing cyber resilience. In this session, learn about the key components of an effective cyber range, common challenges in building a range, and how to optimize functionality, maintenance, and attack scenarios that keep a cyber range efficient and relevant.
Bio

Ben Langrill

Director of Solutions Engineering RangeForce

Sponsored by

Presentation

3:30 pm

5 Recommendations for Building a Scalable Red Team

Bio

Yotam Ben Ezra

VP of Product SafeBreach

Sponsored by

Presentation

4:05 pm

The Boulevard of Broken Buckets

Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our read more…
Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
Bio

Tod Beardsley

Director of Research Rapid7
Bio

Bob Rudis

Chief Data Scientist Rapid7

Sponsored by

Presentation

4:30 pm

PKI-as-a-Service: Improve Security While Reducing Cost

In this presentation, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how read more…

In this presentation, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.

In this webinar, you will:

  • Learn how PKIaaS can increase security while reducing complexity and costs
  • Get a roadmap for automating a certificate-based security strategy
  • Gain access to a checklist for choosing the best PKIaaS provider for your business
Bio

Mrugesh Chandarana

Director, Product Management HID Global

Sponsored by

5:00 pm

Closing Remarks

Share This