Western-September

Tuesday, September 29, 2020

Virtual

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

Networking

8:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am

Building Cyber Resilience: Finding Factors not Fault

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this read more…

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

Bio

Mark Sangster

VP and Chief of Strategy Adlumin

Sponsored by

Live Presentation

9:30 am

How to Improve Cyber Resilience with Identity-Centric PAM

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption. There are many starting points on the read more…

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption.

There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization.

The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure.

Bio

Tony Goulding

CyberSecurity Evangelist Centrify Corporation

Sponsored by

Break

10:00 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Keynote

10:15 am

CISO Lessons Learned

A CISO with almost 30 years in the field shares how the Information Security field has changed and shares ten lessons learned. These are the lessons that Paul has had to learn the hard way over his career and will share with the audience. When Paul is asked “what do read more…

A CISO with almost 30 years in the field shares how the Information Security field has changed and shares ten lessons learned. These are the lessons that Paul has had to learn the hard way over his career and will share with the audience. When Paul is asked “what do you wish you knew earlier in your career,” these ten lessons are the answer. You will walk away with an understanding of how to integrate these lessons into your career.

Paul Love headshot Bio

Paul Love

Chief Information Security & Privacy Officer CO-OP Financial Services

Sponsored by

Break

11:15 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

11:30 am

Navigating the 2020 Cyber Threat Landscape

WatchGuard CTO and 20+ year cyber security veteran, Corey Nachreiner, highlights the top cyber security threats of 2020 and how your organization can defend against them. Covers the top 5 cyber threats affecting all organizations during 2020 Shares quantifiable threat analysis from WatchGuard’s Q2 Internet Security Report (ISR) Offers defensive read more…

WatchGuard CTO and 20+ year cyber security veteran, Corey Nachreiner, highlights the top cyber security threats of 2020 and how your organization can defend against them.

  • Covers the top 5 cyber threats affecting all organizations during 2020
  • Shares quantifiable threat analysis from WatchGuard’s Q2 Internet Security Report (ISR)
  • Offers defensive strategies throughout that help businesses avoid these dangers
Bio

Corey Nachreiner

CTO WatchGuard Technologies, Inc.

Sponsored by

Live Presentation

12:00 pm

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How read more…

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot Bio

Bob Ertl

Sr. Director, Product Marketing Accellion

Sponsored by

Break

12:20 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Panel Discussion

12:30 pm

Panel Discussion: The Security Impact of The Coronavirus

Laureen Smith headshot Bio

Laureen Smith

Executive - Cybersecurity Advisory LJ Marketing & Communications
Rex Tolman headshot Bio

Rex Tolman

Chief Information Security Officer, VP Information Security Kforce
Bio

George Viegas

Chief Information Security Officer (CISO) and Privacy Champion Chapman University
Bio

Darrell Jones

Chief Information Security Officer Tupperware

Sponsored by

Break

1:30 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:45 pm

Securing a World Powered By SAAS

Looking back at how the world responded to the COVID-19 crisis, it is amazing that our work and lives shifted seamlessly to virtual so quickly. Board meetings, employee onboarding and training, product development, happy hours, even goat yoga classes went virtual. Businesses accelerated SaaS adoption to deal with the unexpected read more…
Looking back at how the world responded to the COVID-19 crisis, it is amazing that our work and lives shifted seamlessly to virtual so quickly. Board meetings, employee onboarding and training, product development, happy hours, even goat yoga classes went virtual. Businesses accelerated SaaS adoption to deal with the unexpected need for “work from anywhere,” taking advantage of SaaS’ agility, ease of use, and scalability. Security teams were at the forefront of enabling remote work during this radical shift.
Now that organizations have moved critical business processes and sensitive data to SaaS, security teams need to focus on protecting the confidentiality and integrity of this expanded footprint. Join us to hear best practices and recommendations to secure your business-critical SaaS environments.
Bio

Sudarshan Srinivasan

VP of Product Marketing Obsidian Security

Sponsored by

On-Demand Presentation

2:15 pm

The Death of NTA

Network Traffic Analysis (NTA) is the process of recording, reviewing, and analyzing network traffic for security, performance, and general network operations and management. Different departments can use NTA for different purposes. Security folks, like Braintrace, use NTA to identify malicious or suspicious packets on the network. Network admins use it read more…

Network Traffic Analysis (NTA) is the process of recording, reviewing, and analyzing network traffic for security, performance, and general network operations and management. Different departments can use NTA for different purposes. Security folks, like Braintrace, use NTA to identify malicious or suspicious packets on the network. Network admins use it to monitor bandwidth both up and down and network performance. Bad actors use it to identify vulnerabilities and get the means to break in or retrieve sensitive data. DPI can only see 5% of the traffic and identify malicious traffic, let alone encrypted traffic. This presentation will discuss strategies to see the other 95% and greatly increasing the chance of capturing a zero-day attack.

Bio

Chris Reid

Technical Administrator Braintrace
Bio

John Limb

CTO Braintrace

Sponsored by

Break

2:45 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

3:00 pm

Real-Time Defender Velocity — Code on Code Warfare

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can read more…

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can better prevent threats, find and detect what is missed, provide contextual linking for forensic and threat hunting – and even more importantly self heal and fully recover when necessary.

David Gold Headshot Bio

David Gold

Sr. Director, Sales Engineering SentinelOne

Sponsored by

On-Demand Presentation

3:30 pm

A Ransomware Story: What happened, the response and the way forward

Ransomware is an equal opportunity destroyer with almost limitless potential to cause harm. Case in point: the City of Atlanta network breach, March 2018. Atlanta’s phase one recovery required millions of dollars and more than a year to accomplish. Even now, remediation and rebuilding efforts continue. During this session, we read more…

Ransomware is an equal opportunity destroyer with almost limitless potential to cause harm. Case in point: the City of Atlanta network breach, March 2018. Atlanta’s phase one recovery required millions of dollars and more than a year to accomplish. Even now, remediation and rebuilding efforts continue. During this session, we will discuss Atlanta’s chronology of events, from time of breach to present day, as well as Forescout’s role in restoring Atlanta’s network and services. We will also cover use cases going forward—for the City of Atlanta and for every organization intent on hardening networks and minimizing the ransomware threat.

Bio

Shawn Taylor

Vice President, Threat Defense ForeScout Technologies

Sponsored by

On-Demand Presentation

4:00 pm

Threat Intelligence and Layered Security in the Modern Era

The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll read more…

The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll use real-world examples to show how it can even improve a network’s defenses at the perimeter while saving your analyst’s time.

Bio

Ted Gruenloh

Chief Operating Officer Sentinel IPS

Sponsored by

On-Demand Presentation

4:30 pm

Operationalizing Threat Intel

Sponsored by

Live Closing Remarks

5:00 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC Bio

Kim Hakim

CEO and Founder FutureCon, LLC