Des Moines Cybersecurity Conference
Thursday, September 19, 2024
Renaissance Des Moines Savery Hotel
Hybrid
Join Us in Des Moines for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Leveraging your strengths to outpace the adversaries”
Andy Neller
Deputy Chief Information Security Officer Wellmark Blue Cross and Blue Shield
Andy is a strategic leader with over 25 years in cybersecurity. His qualifications include a BS in Cybersecurity and the CISSP, C|CISO, CRISC, and CCE certifications. He has extensive experience in helping organizations securely transition to the cloud in highly regulated environments. He focuses on best-in-class security through the creation of sound security programs; ensuring governance and regulation compliance, and IT security risk management strategies that enable delivery of secure solutions for business stakeholders.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Sponsors
Premier Platinum Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Renaissance Des Moines Savery Hotel
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Moving Towards a Zero Trust Mindset
Sponsored by
Presentation
Understanding and Protecting your SaaS Attack Surface - Threat Briefing Analysis
78% of organizations store their critical data in SaaS applications, relying on SaaS platforms to
conduct business. Consequently, SaaS now represents one of the largest attack surfaces that
businesses must safeguard.
Why has SaaS become the new battleground in cybersecurity and how are attacks happening?
- What the modern SaaS attack surface and kill chain look like
- What Threat Actors are going after SaaS?
- Why are the attackers winning?
- What are the common TTPs in SaaS attacks?
- Effective controls to reduce the likelihood of Threat Actor success
Sponsored by
Presentation
Security Blueprint for Cloud and Beyond
A brief review of essential security controls with additional context and conversation around how they apply to cloud and other emerging technologies.
Sponsored by
Sponsor Networking Time
Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by
State of Security and Compliance 2024
Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will delve into the most common technical security issues and provide insights on how to remediate them.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Leveraging your strengths to outpace the adversaries
Learn how to leverage your unique knowledge about your organization and capabilities to enhance cyber security by joining us for an engaging presentation. In this session, we’ll explore the key lessons learned from recent high-profile data breaches and how you can apply these insights to fortify your security program. Discover how to identify and build on your existing strengths, and implement proven strategies to enhance your organization’s defenses. Don’t miss this opportunity to safeguard your data and empower your team with the knowledge to stay ahead of cyber threats.
Sponsor Networking Time
Presentation
Secure Data Today Means Data Resilience Tomorrow
Confront the threat; contain the breach. According to the 2024 Data Protection Trends Report, 82% of organizations can’t recover quickly enough from a cyber-attack to achieve full productivity. In today’s age, it is critical to be resilient in a world of cyberthreats and be confident in your detection, response, and recovery plan. Ultimately this can help you reduce the impact of cyberattacks on your organization and back up whether data is in the cloud, on prem or both. By extending Zero Trust to data backup and recovery, you will be building an effective strategy for securing your IT infrastructure against ransomware and cybersecurity threats.
Sponsored by
Presentation
Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending
In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.
But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!
Sponsored by
Sponsor Networking Time
Presentation
Embracing the AI Revolution: Navigating the Challenges and Unlocking the Opportunities
As AI technologies rapidly transform the cybersecurity landscape, CISOs are grappling with both the promises and pitfalls of adoption. Our recent survey revealed an impressive 83% of respondents have a positive outlook on their team’s AI progress, yet they face significant hurdles.
Data privacy concerns, talent shortages, and misaligned priorities top the list of challenges. However, CISOs remain optimistic, with 74% believing AI’s benefits of faster decision-making outweigh the risks. Remarkably, over half see AI as a solution to the talent crunch, enabling new hires to focus on strategic work.
This presentation will dive into the key findings from our research, equipping CISOs with the insights needed to successfully navigate the AI revolution. Discover how to address the barriers to adoption, leverage AI’s transformative potential, and empower your security teams to thrive in the age of intelligent cybersecurity. We will also share how leading security teams are leveraging AI in Tines for workflow automation and orchestration. Join us as we explore the future of AI-powered protection and the path to maximizing its impact within your organization.
Sponsored by
Presentation
Keys to the Kill Chain
With the myriad options for addressing the many links in the kill chain, how do you determine which is best suited to protect your business? If you focus heavily on stopping initial infection, a single bypass of your perimeter can be deadly. A strong back up and restore strategy is valid… but should be plan b. If you miss the middle of the kill chain, you can’t stop a ransomware attack from spreading across your network and locking down critical applications and infrastructure. A multi-layer defense strategy that strategically addresses areas of the chain where you are most vulnerable is going to- prevent widespread damage, data loss, and downtime.
Join this session to discuss:
- Methods for addressing your unique attack surface
- The importance of the notoriously under-addressed lateral movement phase that is critical to the success of an attack
- Increasing internal visibility as it relates to threat intel and ransomware attacks
- Understanding modern attack trends – and what this means for your security strategy