Indianapolis Cybersecurity Conference
Thursday, October 12, 2023
Live in Person @ Ivy Tech Culinary and Conference Center
In Person | Virtual | Hybrid
Earn up to 10 CPE credits






















About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
"Using the Right Metrics to Communicate the Business Value of Your Information Security Program"
Adam Stone
Vice President Services Delivery and Chief Privacy Officer TrustMAPP
Adam Stone, Vice President Services Delivery and Chief Privacy Officer with Minneapolis-based TrustMAPP, has over 35 years’ business leadership experience with 23+ years leading data privacy and security functions for healthcare, insurance, financial services, distribution, software, and marketing organizations. In his current role, Adam is a key member of the executive team, helping ensure the success of customers who leverage TrustMAPP to improve the effectiveness of controls and processes in support of information security. Among his other duties, Adam serves as a fractional chief information security officer (CISO) and chief privacy officer (CPO) for a portfolio of financial services, manufacturing, and insurance companies.
Adam actively participates in several industry initiatives and serves as a Distinguished Fellow with the Ponemon Institute and as an advisory board member and instructor for the Shared Assessments program.
Adam is a sought-after mentor and community leader who rarely turns down an opportunity to help others. He is also an adjunct professor, currently teaching a course on information security risk management for connected medical devices at Metro State University in St. Paul, Minnesota.
Stone earned his MBA from the University of St. Thomas and BA from the University of Minnesota-Twin Cities. Stone holds several professional certifications, including Fellow in Information Privacy (FIP), CIPP, CIPM, CISSP, ISSMP, HCISPP and CTPRP.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Ron Zochalski
Chief Technology Officer & Chief Information Security Officer
Lake County Government - Superior Court Juvenile Division

Adam Stone
Vice President Services Delivery and Chief Privacy Officer
TrustMAPP

Darryl Togashi
Vice-President InfraGard Indiana, Collegiate Cyber Defense Competition Indiana State Director- Cybersecurity Professor
Purdue University Global

David Sims
Staff Vice President, Security Technology Services
Elevance Health

Bernie Hirsch
CIO/CISO/CQO
MicroVote General Corporation
Premier Platinum Sponsors

Platinum Sponsors


Gold Sponsors




Silver Sponsors











Partners




Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Breaches - how to prepare and manage vulnerabilities in the cloud

Presentation
Kubernetes Security Is Impossible And You Should Probably Just Give Up
Security and compliance are complex and challenging. Kubernetes is definitely complex and challenging. And then you add a bunch of people into the mix. If this sounds like an impossible cocktail to overcome, you’re right! Join us for a session about how to enable zero-trust controls in Kubernetes, and how it will never work if we just throw more tools at the problem.


Sponsor Networking Time
What is Cloud Security
Don't Trust Your Inbox
As organizations look to adopt new security principles and network architectures like Zero Trust, they leave a critical gap – email. Around 91% of all cyber attacks begin with a phishing email, and newer attacks like Business Email Compromise directly impact the bottom line.
Moreover, these attacks don’t need sophisticated malware or network intrusion to succeed; they exploit the implicit trust we place in our email communications. Join this session to: Learn how phishing attacks use trust and business logic as attack techniques Get common success criteria used for evaluating Zero Trust and anti-phishing solutions See how Zero Trust principles can be extended to email
Sponsor Networking Time
Lunch
Keynote
"Using the Right Metrics to Communicate the Business Value of Your Information Security Program"
Sponsor Networking Time
Building a Response Strategy
Presentation
Git Em’: Threat Actors and the usage of Git as a Delivery Mechanism
Git is a popular tool for version control and source code management among developers and software engineers in small and large enterprises alike. However, threat actors have taken a liking to using Git as well. This talk will dive into how threat actors are using Git and popular services that leverage Git. We’ll dive into commodity attacks, APT usage, and more techniques that leverage Git or Git powered services.

Sponsor Networking Time
Communicating Risk
Security Blindspots
Sponsor Networking Time
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Ron Zochalski
Chief Technology Officer & Chief Information Security Officer Lake County Government - Superior Court Juvenile Division
