Kansas City Cybersecurity Conference

Thursday, May 22, 2025

Marriott Kansas City Overland Park

Parking/Directions

Hybrid

Join Us in Kansas City for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Marriott Kansas City Overland Park

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

From Spam to Sophistication: How Email Threats Evolved with Phishing-as-a-Service

Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have read more…

Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have adapted over time, and take a closer look at the emerging threat of Phishing-as-a-Service (PhaaS)—a new, scalable model that’s lowering the barrier to entry for cybercriminals.

Bio

Sean Balzer

Senior Security Consultant Tenax Solutions an IP Pathways Company

Sponsored by

Presentation

9:30 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Hunter Cobbs

Senior Solutions Architect Forescout Technologies Inc

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Securing the Future of Cybersecurity Protection: Essentials in an AI-Driven Digital Landscape

Bio

Matt Moss

Senior Solution Architect ESET

Sponsored by

Presentation

11:00 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an read more…
Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.

In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.

This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Will Derksen

Sr. Solutions Engineer Contrast Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Risky Business

Bio

Bill Kim

SVP/Chief Information Security Officer Security Bank of Kansas City
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

SOC Strategies to Detect Earlier and Respond Faster.

Bio

Hamlet Khodaverdian

Co-Founder & Vice President, Americas LMNTRIX

Sponsored by

Presentation

2:00 pm

Resiliency is Replacing Prevention

Ransomware attacks continue to grow in frequency and impact—disrupting operations, locking critical data, and putting reputations at risk. And while prevention tools are important, they can’t stop every attack. The question is no longer if an attacker will get through, but what you’ll do when they do. Join us to read more…

Ransomware attacks continue to grow in frequency and impact—disrupting operations, locking critical data, and putting reputations at risk. And while prevention tools are important, they can’t stop every attack. The question is no longer if an attacker will get through, but what you’ll do when they do.

Join us to learn how to build a ransomware resilience strategy that goes beyond prevention. You’ll learn how containment plays a vital role in limiting damage, maintaining business continuity, and accelerating recovery. We’ll walk through the core elements of a resilient approach—what it looks like in practice, why it matters now, and how you can get started.

Bio

Alfredo Federico

Sr Cybersecurity Consultant BullWall

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Workspace Security: Are you Ready?

The modern workspace is increasingly reliant on cloud-based applications, browser-first access, and AI integration, and faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks, leading to data breaches and operational disruptions. This session read more…

The modern workspace is increasingly reliant on cloud-based applications, browser-first access, and AI integration, and faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks, leading to data breaches and operational disruptions. This session will critically examine these gaps – network, identity, endpoint, and cloud security – and demonstrate how a fundamental shift in security focus towards the browser is required.

Bio

Danny Le

Senior Solutions Engineer Menlo Security

Sponsored by

Presentation

3:15 pm

Putting the "Sec" in DevSecOps

DevOps is representative of the fundamental cultural shift in coding towards performance: high performing teams, and high performing code. Security was never a primary consideration. DevSecOps represents the reality that DevOps must grow to encompass security. Eventually, performant code will mean secure code by default – but we’re not there read more…

DevOps is representative of the fundamental cultural shift in coding towards performance: high performing teams, and high performing code. Security was never a primary consideration. DevSecOps represents the reality that DevOps must grow to encompass security. Eventually, performant code will mean secure code by default – but we’re not there yet. The question is, how do we get there? And more importantly, how do you and your organization take steps to get there today?

How to align the traditionally opposing cultures of cybersecurity and software development?

What does “good DevSecOps” really look like?

What requirements DevOps teams should consider when adding security tools to their pipeline and making the shift from DevOps to DevSecOps?

Bio

Hunter Lindley

Solutions Engineer Checkmarx

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Jonathan Kimmitt

Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Bio

Bill Kim

SVP/Chief Information Security Officer Security Bank of Kansas City
Bio

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

Nathaniel Cole

Chief Information Security Officer WorkWave
5:00 pm

Closing Remarks