Home / / Western-September

FutureCon Virtual Western Conference

September 29, 2020 @ 8am PST

Earn up to 9 CPE credits

 

Instructions on how to access the event:

Visit virtual.boomset.com 

Enter your email that you registered for the event with

You will get a unique link emailed to you

Click that link

Click the event

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

CISO Keynote Speaker

Paul Love headshot

Paul Love

Chief Information Security & Privacy Officer CO-OP Financial Services

Paul Love is the Chief Information Security Officer of CO-OP Financial Services. Mr. Love brings over 25 years in information security, risk management, financial services and technology experience to CO-OP, including his most recent role as Senior Director of Governance, Risk and Compliance at Federal Home Loan Mortgage Corporation (Freddie Mac). He has held other information security positions with Ernst & Young, Microsoft, Schlumberger, Ally Financial, Fifth Third Bank and the US Marine Corps.

Paul holds a Master’s of Science in Network Security degree, has authored/co-authored nine books on Information Security and Unix/Linux, including the Institute of Internal Auditors (IIA) Global Technology Audit Guide on Information Security Governance. Paul has also been the technical editor of 10 books on Linux and Unix. Mr. Love is a Certified Information Systems Security (CISSP), Certified Information Systems Audit (CISA), Certified Information Security Manager (CISM), Certified Information Privacy Manager (CIPM), multiple privacy certifications such as Certified Information Privacy Professional/United States/Europe/Canada (CIPP/US, CIPP/E & CIPP/C) as well as other security and technical certifications including GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Examiner (GCFE) and others.

Panel Discussion: The Security Impact of The Coronavirus

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances
Accellion

Rex Tolman headshot

Rex Tolman

Chief Information Security Officer
Kforce

George Viegas

Chief Information Security Officer (CISO) and Privacy Champion
Chapman University

Darrell Jones

Chief Information Security Officer
Ares Management Corporation

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Networking

8:00 am – 9:00 am

Sponsor Virtual Booth Networking Time

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Presentation

9:00 am – 9:30 am

Building Cyber Resilience: Finding Factors not Fault

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

Mark Sangster

Industry Security Strategist eSentire
Bio

Live Presentation

9:30 am – 10:00 am

How to Improve Cyber Resilience with Identity-Centric PAM

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption.

There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization.

The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure.

Tony Goulding

CyberSecurity Evangelist Centrify Corporation
Bio
Centrify Logo

Break

10:00 am – 10:15 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Keynote

10:15 am – 11:15 am

CISO Lessons Learned

A CISO with almost 30 years in the field shares how the Information Security field has changed and shares ten lessons learned. These are the lessons that Paul has had to learn the hard way over his career and will share with the audience. When Paul is asked “what do you wish you knew earlier in your career,” these ten lessons are the answer. You will walk away with an understanding of how to integrate these lessons into your career.

Paul Love headshot

Paul Love

Chief Information Security & Privacy Officer CO-OP Financial Services
Bio
Co-op Financial Services logo

Break

11:15 am – 11:30 am

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

11:30 am – 12:00 pm

Navigating the 2020 Cyber Threat Landscape

WatchGuard CTO and 20+ year cyber security veteran, Corey Nachreiner, highlights the top cyber security threats of 2020 and how your organization can defend against them.

  • Covers the top 5 cyber threats affecting all organizations during 2020
  • Shares quantifiable threat analysis from WatchGuard’s Q2 Internet Security Report (ISR)
  • Offers defensive strategies throughout that help businesses avoid these dangers

Corey Nachreiner

CTO WatchGuard Technologies, Inc.
Bio

Live Presentation

12:00 pm – 12:20 pm

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot

Bob Ertl

Sr. Director, Product Marketing Accellion
Bio

Break

12:20 pm – 12:30 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

Live Panel Discussion

12:30 pm – 1:30 pm

Panel Discussion: The Security Impact of The Coronavirus

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances Accellion
Bio
Rex Tolman headshot

Rex Tolman

Chief Information Security Officer Kforce
Bio

George Viegas

Chief Information Security Officer (CISO) and Privacy Champion Chapman University
Bio

Darrell Jones

Chief Information Security Officer Ares Management Corporation
Bio

Break

1:30 pm – 1:45 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

1:45 pm – 2:15 pm

Securing a World Powered By SAAS

Looking back at how the world responded to the COVID-19 crisis, it is amazing that our work and lives shifted seamlessly to virtual so quickly. Board meetings, employee onboarding and training, product development, happy hours, even goat yoga classes went virtual. Businesses accelerated SaaS adoption to deal with the unexpected need for “work from anywhere,” taking advantage of SaaS’ agility, ease of use, and scalability. Security teams were at the forefront of enabling remote work during this radical shift.
Now that organizations have moved critical business processes and sensitive data to SaaS, security teams need to focus on protecting the confidentiality and integrity of this expanded footprint. Join us to hear best practices and recommendations to secure your business-critical SaaS environments.

Sudarshan Srinivasan

VP of Product Marketing Obsidian Security
Bio
Obsidian logo

On-Demand Presentation

2:15 pm – 2:45 pm

The Death of NTA

Network Traffic Analysis (NTA) is the process of recording, reviewing, and analyzing network traffic for security, performance, and general network operations and management. Different departments can use NTA for different purposes. Security folks, like Braintrace, use NTA to identify malicious or suspicious packets on the network. Network admins use it to monitor bandwidth both up and down and network performance. Bad actors use it to identify vulnerabilities and get the means to break in or retrieve sensitive data. DPI can only see 5% of the traffic and identify malicious traffic, let alone encrypted traffic. This presentation will discuss strategies to see the other 95% and greatly increasing the chance of capturing a zero-day attack.

Chris Reid

Technical Administrator Braintrace
Bio

John Limb

CTO Braintrace
Bio

Break

2:45 pm – 3:00 pm

Break

Visit sponsor booths, qualify for prizes, experience demos, chat, and more!

On-Demand Presentation

3:00 pm – 3:30 pm

Real-Time Defender Velocity — Code on Code Warfare

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can better prevent threats, find and detect what is missed, provide contextual linking for forensic and threat hunting – and even more importantly self heal and fully recover when necessary.

David Gold Headshot

David Gold

Sr. Director, Sales Engineering SentinelOne
Bio

On-Demand Presentation

3:30 pm – 4:00 pm

A Ransomware Story: What happened, the response and the way forward

Ransomware is an equal opportunity destroyer with almost limitless potential to cause harm. Case in point: the City of Atlanta network breach, March 2018. Atlanta’s phase one recovery required millions of dollars and more than a year to accomplish. Even now, remediation and rebuilding efforts continue. During this session, we will discuss Atlanta’s chronology of events, from time of breach to present day, as well as Forescout’s role in restoring Atlanta’s network and services. We will also cover use cases going forward—for the City of Atlanta and for every organization intent on hardening networks and minimizing the ransomware threat.

Shawn Taylor

Senior Systems Engineer Forescout
Bio
Forescout logo

On-Demand Presentation

4:00 pm – 4:30 pm

Threat Intelligence and Layered Security in the Modern Era

The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll use real-world examples to show how it can even improve a network’s defenses at the perimeter while saving your analyst’s time.

Ted Gruenloh

Chief Operating Officer Sentinel IPS
Bio
Sentinel IPS Logo

On-Demand Presentation

4:30 pm – 5:00 pm

Operationalizing Threat Intel

Jose Barajas

Technical Director AttackIQ
Bio

Live Closing Remarks

5:00 pm

Closing Remarks by Kim Hakim

Kim Hakim, Founder/CEO FutureCon, LLC

Kim Hakim

CEO and Founder FutureCon, LLC
Bio

Register