Omaha Cybersecurity Conference
Wednesday, April 17, 2024
Embassy Suites by Hilton Omaha La Vista Hotel & Conference Center
Hybrid
Join FutureCon CyberSecurity Events in Omaha!
At this event discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.
Keynote Speaker
“Securing B2B SaaS: Brake for Success”
Ross Coudeyras
Head of Security and Compliance, Data Protection Officer, Remesh | Adjunct Instructor of Cybersecurity and Privacy, Doane University
We will explore how aligning a company’s people, processes, and technologies can enable product and revenue growth by meeting customer requirements in the B2B SaaS sector. In addition, we will delve into the balance between robust cybersecurity measures and the need for business agility, demonstrating how strategic alignment across the organization can address both security concerns and customer needs. This will highlight the significance of the pivotal role of compliance in securing customer trust, and the direct impact of these elements on revenue generation.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Steven Carlson
Platform Security Vulnerability Management Lead Fivetran
Marc Johnson
CISO / Director / vCISO / vCIO Impact Advisors
Melissa Moreno
Chief Information Officer Lindsay Corporation
Ross Coudeyras
Head of Security and Compliance, Data Protection Officer, Remesh | Adjunct Instructor of Cybersecurity and Privacy, Doane University
Ron Woerner
CISO/vCISO/ISSO Anon.
Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Moving Towards a Zero Trust Mindset
Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.
Sponsored by
Presentation
State of Security and Compliance 2024
Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will delve into the most common technical security issues and provide insights on how to remediate them.
Sponsored by
Sponsor Networking Time
Presentation
Skate to Where the Puck is Going: Making DevSecOps Easy by Making Security Mistakes Hard
In this presentation we will dive into the challenges of current AppSec methodologies within DevSecOps frameworks, emphasizing the necessity of prioritizing runtime security measures to align with the rapid pace of development. Proactive strategies are highlighted as crucial in making security mistakes arduous, paving the way for seamless integration of security into the development pipeline. Join the journey as we navigate towards anticipating and mitigating vulnerabilities at critical junctures.
Sponsored by
Presentation
Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool
Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Securing B2B SaaS: Brake for Success
We will explore how aligning a company’s people, processes, and technologies can enable product and revenue growth by meeting customer requirements in the B2B SaaS sector. In addition, we will delve into the balance between robust cybersecurity measures and the need for business agility, demonstrating how strategic alignment across the organization can address both security concerns and customer needs. This will highlight the significance of the pivotal role of compliance in securing customer trust, and the direct impact of these elements on revenue generation.
Ross Coudeyras
Head of Security and Compliance, Data Protection Officer, Remesh | Adjunct Instructor of Cybersecurity and Privacy, Doane University
Sponsor Networking Time
Presentation
AI For Security
Sponsored by
Presentation
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.
Sponsored by
Sponsor Networking TIme
Presentation
How Cyber Secures AI
How to embrace the transformative opportunities of AI with confidence and control. Adopting AI quickly and safely is top of mind for businesses as AI becomes a larger part of all organizations’ technology environments. From Consumer AI tools like ChatGPT to products embedding “Copilots” into feature releases to the software firms develop and maintain – Security is foundational to success with AI. Gain insights on how to build the right foundation to enable AI adoption securely, craft a Secure AI roadmap, identify use cases that provide value and minimize risk, and execute pilot projects. Boldly go into the future with a solid foundation of secure innovation.
Sponsored by
Presentation
Protecting the Castle & Being Prepared for Recovery
Explore the critical balance between defending against cyber threats and ensuring effective recovery at this session, which draws on recent data indicating that 85% of organizations experienced a cyber attack last year. We’ll discuss strategic responses to ransomware, the essential role of clean backups, and the construction of robust Incident Response Plans. Learn actionable strategies to enhance your organization’s resilience, reduce recovery times, and align cybersecurity with backup operations for optimal protection and recovery.