St. Louis, MO
Thursday, March 21, 2024
Hybrid
Join FutureCon CyberSecurity Events in St. Louis!
This event is the perfect opportunity to discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.
Keynote Speaker
“"Things a CISO doesn’t want to say, but needs to…."”
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
As a leader in Information Security across the academic sectors, I have developed an accomplished career driving the strategy and management of business transformation, technical migrations, IT data security, disaster recovery and technology planning. I’ve found my success has been achieved by combining hands-on expertise in information security management and cybersecurity to ensure the optimal performance of critical, enterprise-scale environments.
I specialize in developing and implementing enterprise technology models, security architecture and best practices to maintain internal control; introducing security framework, tools and solutions to stimulate performance improvements; and aligning business requirements with information security processes. Recognized as a versatile leader, I excel at guiding cross-functional technology resources through critical projects, as well as influencing key stakeholders and decision makers on the adoption of new security framework and technical best practices to meet operational goals.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Michelle Sickbert
Sr. Director - Business Information Security Officer Equifax
Andre Van Klaveren
VP, Security Leader, Security Advisory Services Equifax
Renita Rhodes
Vice President, Audit Manager - Cybersecurity Audit Wells Fargo
Marc Ashworth
Chief Information Security Officer - Senior VP First Bank
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The Current Threat Landscape Requires a Unique Approach
: Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
Presentation
The What, Who For, and Why of MXDR
Sponsored by
Networking
Sponsor Networking Time
Presentation
Financialization of Cybersecurity Risk
Commonly employed cybersecurity risk assessment and reporting is akin to driving by looking strictly at simple gauges, listening to basic GPS guidance, and panicking when the check engine light comes on. Dashboard information is important, but we also need to look up, see the risks the drivers around us are facing, and make more informed decisions to minimize our exposure to those risks. Join us to learn how you can rapidly use historical industry-specific cybersecurity incident data to help keep your eyes on the road and minimize your organization’s financial loss exposure from cybersecurity risk.
Sponsored by
Presentation
The Balancing Act of Data Usage and Data Security
In today’s digital landscape, where cyber security is synonymous with data security, safeguarding sensitive information is paramount across all sectors due to the prevalence of cyber threats and the increasing volume of data. To effectively address these challenges, a programmatic approach to data security is essential, encompassing a range of technical, procedural, and human-centric measures. This approach involves implementing a layered defense strategy that includes asking fundamental questions such as “What data do you really have?”, “Who should or shouldn’t have access?”, and “What should they be allowed to do?” Collaboration and information-sharing among organizations are also crucial for enhancing collective resilience against cyber threats. Presented by Jason Rice, Vice President with Forcepoint, this discussion underscores how adopting a programmatic approach to data security enables organizations to mitigate risks, bolster resilience, and maintain trust in an interconnected digital ecosystem where cyber security is fundamentally synonymous with data security.
Sponsored by
Networking
Sponsor Networking Time
Lunch
Keynote
"Things a CISO doesn’t want to say, but needs to…."
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Networking
Sponsor Networking Time
Presentation
Identity Crisis
An agnostic discussion around all the wrong ways you could be doing Identity and how to take steps to remediate them and get back on the right track.
Sponsored by
Presentation
Why is Critical data being compromised?
Discussing what is crtical data, why is it targeted and how to protect it.
Sponsored by
Networking
Sponsor Networking TIme
Presentation
Threat Radar
Join us to learn about the recent attack trends Cloudflare sees across DDoS, API Attacks, Application Attacks and more. In the session you will not only learn about recent trends, but also patterns and tactics that can be used to protect your business from them
Sponsored by
Presentation
Accelerate AI innovation securely with AI-SPM
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.