Western-September
Tuesday, September 29, 2020
Virtual
CISO Keynote Speaker
“CISO Lessons Learned”
Paul Love
Chief Information Security & Privacy Officer CO-OP Financial Services
Paul Love is the Chief Information Security Officer of CO-OP Financial Services. Mr. Love brings over 25 years in information security, risk management, financial services and technology experience to CO-OP, including his most recent role as Senior Director of Governance, Risk and Compliance at Federal Home Loan Mortgage Corporation (Freddie Mac). He has held other […]
CISO/Industry Leader Panel
Panel Discussion: The Security Impact of The Coronavirus
Laureen Smith
Executive - Cybersecurity Advisory LJ Marketing & Communications
Rex Tolman
Chief Information Security Officer, VP Information Security Kforce
George Viegas
Chief Information Security Officer (CISO) and Privacy Champion Chapman University
Darrell Jones
Chief Information Security Officer Tupperware
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Networking
Sponsor Virtual Booth Networking Time
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Live Presentation
Building Cyber Resilience: Finding Factors not Fault
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Sponsored by
Live Presentation
How to Improve Cyber Resilience with Identity-Centric PAM
Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption.
There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization.
The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure.
Sponsored by
Break
Break
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Live Keynote
CISO Lessons Learned
A CISO with almost 30 years in the field shares how the Information Security field has changed and shares ten lessons learned. These are the lessons that Paul has had to learn the hard way over his career and will share with the audience. When Paul is asked “what do you wish you knew earlier in your career,” these ten lessons are the answer. You will walk away with an understanding of how to integrate these lessons into your career.
Sponsored by
Break
Break
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
On-Demand Presentation
Navigating the 2020 Cyber Threat Landscape
WatchGuard CTO and 20+ year cyber security veteran, Corey Nachreiner, highlights the top cyber security threats of 2020 and how your organization can defend against them.
- Covers the top 5 cyber threats affecting all organizations during 2020
- Shares quantifiable threat analysis from WatchGuard’s Q2 Internet Security Report (ISR)
- Offers defensive strategies throughout that help businesses avoid these dangers
Sponsored by
Live Presentation
Conquering Cyber Risk in 3rd Party Communications
The Enterprise Content Firewall
To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.
Sponsored by
Break
Break
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
Live Panel Discussion
Panel Discussion: The Security Impact of The Coronavirus
Sponsored by
Break
Break
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
On-Demand Presentation
Securing a World Powered By SAAS
Sponsored by
On-Demand Presentation
The Death of NTA
Network Traffic Analysis (NTA) is the process of recording, reviewing, and analyzing network traffic for security, performance, and general network operations and management. Different departments can use NTA for different purposes. Security folks, like Braintrace, use NTA to identify malicious or suspicious packets on the network. Network admins use it to monitor bandwidth both up and down and network performance. Bad actors use it to identify vulnerabilities and get the means to break in or retrieve sensitive data. DPI can only see 5% of the traffic and identify malicious traffic, let alone encrypted traffic. This presentation will discuss strategies to see the other 95% and greatly increasing the chance of capturing a zero-day attack.
Sponsored by
Break
Break
Visit sponsor booths, qualify for prizes, experience demos, chat, and more!
On-Demand Presentation
Real-Time Defender Velocity — Code on Code Warfare
Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can better prevent threats, find and detect what is missed, provide contextual linking for forensic and threat hunting – and even more importantly self heal and fully recover when necessary.
Sponsored by
On-Demand Presentation
A Ransomware Story: What happened, the response and the way forward
Ransomware is an equal opportunity destroyer with almost limitless potential to cause harm. Case in point: the City of Atlanta network breach, March 2018. Atlanta’s phase one recovery required millions of dollars and more than a year to accomplish. Even now, remediation and rebuilding efforts continue. During this session, we will discuss Atlanta’s chronology of events, from time of breach to present day, as well as Forescout’s role in restoring Atlanta’s network and services. We will also cover use cases going forward—for the City of Atlanta and for every organization intent on hardening networks and minimizing the ransomware threat.
Sponsored by
On-Demand Presentation
Threat Intelligence and Layered Security in the Modern Era
The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll use real-world examples to show how it can even improve a network’s defenses at the perimeter while saving your analyst’s time.