Des Moines Cybersecurity Conference

Thursday, September 19, 2024

Renaissance Des Moines Savery Hotel

Parking/Directions

Hybrid

Join Us in Des Moines for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Renaissance Des Moines Savery Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Moving Towards a Zero Trust Mindset

Bio

Alexander Gillie

Solutions Engineer Cloudflare

Sponsored by

Presentation

9:15 am

Understanding and Protecting your SaaS Attack Surface - Threat Briefing Analysis

78% of organizations store their critical data in SaaS applications, relying on SaaS platforms to conduct business. Consequently, SaaS now represents one of the largest attack surfaces that businesses must safeguard. Why has SaaS become the new battleground in cybersecurity and how are attacks happening? What the modern SaaS attack surface read more…

78% of organizations store their critical data in SaaS applications, relying on SaaS platforms to
conduct business. Consequently, SaaS now represents one of the largest attack surfaces that
businesses must safeguard.

Why has SaaS become the new battleground in cybersecurity and how are attacks happening?

  • What the modern SaaS attack surface and kill chain look like
  • What Threat Actors are going after SaaS?
  • Why are the attackers winning?
  • What are the common TTPs in SaaS attacks?
  • Effective controls to reduce the likelihood of Threat Actor success
Bio

Jay Klauser

Director of Sales Engineering AppOmni

Sponsored by

Presentation

9:45 am

Security Blueprint for Cloud and Beyond

A brief review of essential security controls with additional context and conversation around how they apply to cloud and other emerging technologies.

A brief review of essential security controls with additional context and conversation around how they apply to cloud and other emerging technologies.

Bio

Megan Larkins

Director of Consulting Services FRSecure

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

11:15 am

State of Security and Compliance 2024

Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will delve read more…

Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will delve into the most common technical security issues and provide insights on how to remediate them.

Bio

Sheldon Speers

President Tenax Solutions an IP Pathways Company
Bio

Mike Hinkey

Vice President of Technical Operations Tenax Solutions an IP Pathways Company

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
12:00 pm

Lunch

Keynote

12:15 pm

Leveraging your strengths to outpace the adversaries

Learn how to leverage your unique knowledge about your organization and capabilities to enhance cyber security by joining us for an engaging presentation. In this session, we’ll explore the key lessons learned from recent high-profile data breaches and how you can apply these insights to fortify your security program. Discover read more…

Learn how to leverage your unique knowledge about your organization and capabilities to enhance cyber security by joining us for an engaging presentation. In this session, we’ll explore the key lessons learned from recent high-profile data breaches and how you can apply these insights to fortify your security program. Discover how to identify and build on your existing strengths, and implement proven strategies to enhance your organization’s defenses. Don’t miss this opportunity to safeguard your data and empower your team with the knowledge to stay ahead of cyber threats.

Bio

Andy Neller

Deputy Chief Information Security Officer Wellmark Blue Cross and Blue Shield
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Secure Data Today Means Data Resilience Tomorrow

Confront the threat; contain the breach. According to the 2024 Data Protection Trends Report, 82% of organizations can’t recover quickly enough from a cyber-attack to achieve full productivity. In today’s age, it is critical to be resilient in a world of cyberthreats and be confident in your detection, response, and read more…

Confront the threat; contain the breach. According to the 2024 Data Protection Trends Report, 82% of organizations can’t recover quickly enough from a cyber-attack to achieve full productivity. In today’s age, it is critical to be resilient in a world of cyberthreats and be confident in your detection, response, and recovery plan. Ultimately this can help you reduce the impact of cyberattacks on your organization and back up whether data is in the cloud, on prem or both. By extending Zero Trust to data backup and recovery, you will be building an effective strategy for securing your IT infrastructure against ransomware and cybersecurity threats.

Bio

Dan Christensen

Systems Engineer Veeam

Sponsored by

Presentation

2:15 pm

Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security read more…

In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed.

But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future!

Bio

Benjamin Wood

MySQL Master Solution Engineer Oracle

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Embracing the AI Revolution: Navigating the Challenges and Unlocking the Opportunities

As AI technologies rapidly transform the cybersecurity landscape, CISOs are grappling with both the promises and pitfalls of adoption. Our recent survey revealed an impressive 83% of respondents have a positive outlook on their team’s AI progress, yet they face significant hurdles.   Data privacy concerns, talent shortages, and misaligned read more…

As AI technologies rapidly transform the cybersecurity landscape, CISOs are grappling with both the promises and pitfalls of adoption. Our recent survey revealed an impressive 83% of respondents have a positive outlook on their team’s AI progress, yet they face significant hurdles.

 

Data privacy concerns, talent shortages, and misaligned priorities top the list of challenges. However, CISOs remain optimistic, with 74% believing AI’s benefits of faster decision-making outweigh the risks. Remarkably, over half see AI as a solution to the talent crunch, enabling new hires to focus on strategic work.

 

This presentation will dive into the key findings from our research, equipping CISOs with the insights needed to successfully navigate the AI revolution. Discover how to address the barriers to adoption, leverage AI’s transformative potential, and empower your security teams to thrive in the age of intelligent cybersecurity. We will also share how leading security teams are leveraging AI in Tines for workflow automation and orchestration. Join us as we explore the future of AI-powered protection and the path to maximizing its impact within your organization.

Bio

Aaron Sandow

Senior Solutions Engineer Tines

Sponsored by

Presentation

3:30 pm

Keys to the Kill Chain

With the myriad options for addressing the many links in the kill chain, how do you determine which is best suited to protect your business? If you focus heavily on stopping initial infection, a single bypass of your perimeter can be deadly. A strong back up and restore strategy is read more…

With the myriad options for addressing the many links in the kill chain, how do you determine which is best suited to protect your business? If you focus heavily on stopping initial infection, a single bypass of your perimeter can be deadly. A strong back up and restore strategy is valid… but should be plan b. If you miss the middle of the kill chain, you can’t stop a ransomware attack from spreading across your network and locking down critical applications and infrastructure. A multi-layer defense strategy that strategically addresses areas of the chain where you are most vulnerable is going to- prevent widespread damage, data loss, and downtime.

Join this session to discuss:

  • Methods for addressing your unique attack surface
  • The importance of the notoriously under-addressed lateral movement phase that is critical to the success of an attack
  • Increasing internal visibility as it relates to threat intel and ransomware attacks
  • Understanding modern attack trends – and what this means for your security strategy
Bio

Tommy Cormier, Sr.

Manager of Enterprise Solution Engineering Services Akamai

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Shannon Jones

Chief Security Officer Kingland
Bio

Andy Neller

Deputy Chief Information Security Officer Wellmark Blue Cross and Blue Shield
Bio

Robert M. Duplessis

Chief Information Security Officer Old Second National Bank
Bio

Benjamin Hall

IR Case Manager FRSecure
5:15 pm

Closing Remarks