Kansas City Cybersecurity Conference
Thursday, May 22, 2025
Marriott Kansas City Overland Park
Hybrid




























Join Us in Kansas City for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Risky Business”
Bill Kim
SVP/Chief Information Security Officer Security Bank of Kansas City
After being automated out of a two-decade career in radio and television, Bill spent some time acquiring multiple vendor certifications and has enjoyed the last 26 years in several aspects of IT, IT Security, Compliance and Regulatory, Networking, etc. Leading the federal compliance efforts for a municipal electric utility provided a solid foundation for what would become the bridge between functional IT and Security and adhering to standards, guidelines and recommendations. As CISO for Security Bank of Kansas City, Bill appreciates his team as they continually monitor for risks and vulnerabilities, behavioral changes, abnormalities and chasing all the ghosts.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Jonathan Kimmitt
Chief Information Security Officer (CISO) | Data Security/Privacy Alias Cybersecurity | Former CISO The University of Tulsa
Bill Kim
SVP/Chief Information Security Officer Security Bank of Kansas City
Marc Johnson
CISO / Director / vCISO / vCIO Impact Advisors
Nathaniel Cole
Chief Information Security Officer WorkWave


Sponsors
Platinum Sponsors


Gold Sponsors






Silver Sponsors














Partner








“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Marriott Kansas City Overland Park
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
From Spam to Sophistication: How Email Threats Evolved with Phishing-as-a-Service
Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have adapted over time, and take a closer look at the emerging threat of Phishing-as-a-Service (PhaaS)—a new, scalable model that’s lowering the barrier to entry for cybercriminals.
Sponsored by

Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Securing the Future of Cybersecurity Protection: Essentials in an AI-Driven Digital Landscape
Sponsored by

Presentation
Rebuild Your Software Security Program from the Breach Up
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.
This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Risky Business
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
SOC Strategies to Detect Earlier and Respond Faster.
Sponsored by

Presentation
Resiliency is Replacing Prevention
Ransomware attacks continue to grow in frequency and impact—disrupting operations, locking critical data, and putting reputations at risk. And while prevention tools are important, they can’t stop every attack. The question is no longer if an attacker will get through, but what you’ll do when they do.
Join us to learn how to build a ransomware resilience strategy that goes beyond prevention. You’ll learn how containment plays a vital role in limiting damage, maintaining business continuity, and accelerating recovery. We’ll walk through the core elements of a resilient approach—what it looks like in practice, why it matters now, and how you can get started.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Workspace Security: Are you Ready?
The modern workspace is increasingly reliant on cloud-based applications, browser-first access, and AI integration, and faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks, leading to data breaches and operational disruptions. This session will critically examine these gaps – network, identity, endpoint, and cloud security – and demonstrate how a fundamental shift in security focus towards the browser is required.
Sponsored by

Presentation
Putting the "Sec" in DevSecOps
DevOps is representative of the fundamental cultural shift in coding towards performance: high performing teams, and high performing code. Security was never a primary consideration. DevSecOps represents the reality that DevOps must grow to encompass security. Eventually, performant code will mean secure code by default – but we’re not there yet. The question is, how do we get there? And more importantly, how do you and your organization take steps to get there today?
How to align the traditionally opposing cultures of cybersecurity and software development?
What does “good DevSecOps” really look like?
What requirements DevOps teams should consider when adding security tools to their pipeline and making the shift from DevOps to DevSecOps?
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!