JoFutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem"
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world's security leaders and gain other pressing topics of interest to the information security community. Download the FutureCon event App to be part of the ongoing FutureCon community giving you the resources to stay one step ahead of Cyber challenges. The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world's security leaders.
Featured Keynote Speaker: Dr. Torsten George - Cyber Security Evangelist, Centrify
"The Anatomy of a Hack: Perception vs. Reality"
The traditional perimeter-based approach to security depends on firewalls, virtual private networks (VPNs), and Web gateways to separate trusted users (the “good guys”) from untrusted users (the “bad guys”). Despite spending an estimated $137 billion on these types of security technologies in 2019, two out of three enterprises experienced breaches — at the rate of an average of five breaches per organization! Clearly, the traditional approaches to security aren’t working.
Implementing an effective enterprise security strategy requires an understanding of hackers’ tactics, techniques, and procedures ― often called TTPs.
Join this keynote to learn about:
The most common misconceptions about cyber-attacks;
The latest trends of TTPs used by hackers;
The latest trends of attack surfaces exploited by hackers;
The three major phases of the cyber-attack lifecycle and best practices of prevention;
The antidote: Zero Trust and Zero Trust Privilege
Case Study: Zero Trust Privilege in Action
Benefits of Zero Trust
Panel Session: Dark Web, Insider Threat, Cyber Resilience