Home / / Kansas City, KS

Kansas City Cybersecurity Conference

Thursday, June 8, 2023

The Venue in Leawood

Parking and Directions

 

In Person

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

“Embracing Disruption”

Britney Kennedy

Global BISO & Business Partnership Cardinal Health

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Johnson

CISO / Director / vCISO / vCIO
Impact Advisors

Bio

April Boyd-Noronha

Senior Engineer, Information Security & Risk
Cardinal Health

Bio

Nathaniel Cole

Chief Information Security Officer
Trevipay

Bio

Reanna Schultz

Team Leader of Information Security
Garmin

Bio

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Weaponization of DNS

Focused on the security benefits of enterprise-grade DNS controls, this talk walks through how the trusting nature of DNS has been abused by threat actors for years.

Looking to turn the tables and use DNS to our advantage, we discuss how security practitioners can gain unprecedented visibility into client communications and stop attacks as early as possible in the communication process.

Chad Hurt

Cyber Security Specialist Infoblox
Bio

Presentation

9:30 am

Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Chris Tyrrell

Director of Sales Engineering Next DLP
Bio

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Digital Transformation, AI, & Cybersecurity: Surviving the Perfect Storm

This presentation by Cloudflare’s Field CTO, John Engates, navigates the complex convergence of digital transformation, AI, and cybersecurity. Addressing the emerging cyber threats and regulatory challenges against the backdrop of a rapidly evolving digital landscape, Engates offers effective strategies for resilience, performance, and security. The talk further underscores the need for a holistic approach to cybersecurity, and provides insights through relevant case studies to empower businesses to withstand the ‘perfect storm’ of our digital era.

John Engates

Field CTO Cloudflare
Bio

Presentation

11:00 am

Digital Sovereignty

This talk will examine the growing call for sovereignty over digital assets in an increasingly cloud-focused world.  We’ll look at how organizations need to review the governance model of IT resources, protect against new security risks, and reduce the effort to comply with more stringent regulations.

Finally, we will explore what digital sovereignty is made of, and how to mitigate some of the risks highlighted.

Mike Jordan

Senior Solutions Architect Thales Cloud Security
Bio

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

“Embracing Disruption”

Britney Kennedy

Global BISO & Business Partnership Cardinal Health
Bio

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Leveraging an AI that Knows You, to Stay Ahead of Today’s Attacks

To protect organizations today and tomorrow, we are required to not only shift our thinking, but shift how we approach security within the context of our business operations. In this session, Darktrace will share how thousands of organisations are incorporating AI into their organizational ecosystem to bolster operational resilience by preventing, detecting, and responding to attacks – empowering businesses to deliver business as usual, while staying one step ahead of attackers. 

JonCarlo DeFeudis

Cybersecurity Team Lead Darktrace
Bio

2:00 pm

Shielding Your IT Ecosystem: A Guide to Layered Security, Compliance and Awareness

Tony Parlato, Solutions Architect for IP Pathways will be discussing security as an ever-evolving landscape. In this presentation you will learn how organizations must stay one step ahead of the curve to protect themselves from malicious actors as new technologies and threats emerge. A comprehensive security strategy involves not only understanding the latest security trends and compliance requirements, but also implementing multiple layers of security to protect their systems and data.

Tony Parlato

Solutions Architect IP Pathways
Bio

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Eliminate, Simplify, Automate

Dan McIntyre

SVP of Strategic Cyber Operations and CTO Conquest Cyber
Bio

Donny Hubener

Information Security Department Manager Burns & McDonnell
Bio

Presentation

3:15 pm

Improving Software Supply Chain Security for Java Workloads

Current approaches to protecting the Software Supply Chain tend to rely on scanning or application instrumentation. These solutions suffer from the following drawbacks:

– They are generally point-in-time, which means they cannot see what is actually happening while workloads are continuously running in Production

– They create extra work and friction between stakeholders in the software development lifecycle

– Instrumentation approaches are intrusive and may introduce unacceptable overhead for Production workloads

This talk will introduce a JVM-native approach to securing the Java Software Supply Chain. A JVM-native approach introduces no extra work for anyone, while providing zero-overhead, continuous, code level Software Composition Analysis. It provides organizations with a continuous understanding of their Java workloads’ exposure to known vulnerabilities in all environments including Production.

Robert Statsinger

Senior Solutions Architect Azul
Bio

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

April Boyd-Noronha

Senior Engineer, Information Security & Risk Cardinal Health
Bio

Nathaniel Cole

Chief Information Security Officer Trevipay
Bio

Reanna Schultz

Team Leader of Information Security Garmin
Bio

5:00 pm

Closing Remarks

Register

Share This