Join Us in Minneapolis for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Attend live to enjoy a light breakfast, plated lunch and cocktail reception!
Keynote Speaker
“Instant Replay and Cyber Incidents”
Michael Rogers
CISO / Director Information Security and Compliance at Hormel Foods
Michael Rogers is Chief Information Security Officer at Hormel Foods Corporation. In this role, Rogers is responsible for leading information security and identity and access management organizations. Previously, Rogers worked at UnitedHealth Group and served as Business Information Security Officer (BISO), where he was responsible for developing, managing, and transforming the information security team. Earlier in his IT career, Rogers served as an Information Security Director, Global Identity and Access Management at Carlson Wagonlit Travel.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Diaa Abu-Shaqra
Chief Information Security Officer Sunrise Banks
Judy Hatchett
VP, CISO SureScripts President - Minnesota Chapter WiCys
Jeff Holschuh
Chief Information Security Officer Sun Country Airlines
Scott Ostrander
Vice President & Chief Information Security Officer SPS Commerce
Sam Maeder
Information Security Officer Lift Brands
Sponsors
Premier Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Sheraton Bloomington Hotel
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Breach Containment: Assuming breach and isolating threats.
Sponsored by
Presentation
Attack Surface Management – The Missing Middle of Cybersecurity
Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.
In this presentation, we will discuss:
- The role of CAASM and attack surface management (ASM) in the future of risk management technologies
- Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack
- Different methods of ASM and benefits of automation for continuous management
Sponsored by
Sponsor Networking Time
Presentation
The Executive Guide to Red Team Testing
Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively.
We will begin by clarifying the meaning of red teaming and outlining what it involves and doesn’t. We will delve into the various components that make up red teaming, encompassing activities such as penetration testing, physical security testing, and adversarial simulations, and analyze the circumstances in which each is most suitable. Also, we will underscore the importance of setting up defined goals, properly scoping the project, and choosing the best team members.
Last but not least, we will tackle the cultural and organizational factors that can influence the outcome of red teaming. We will focus on fostering a culture of ongoing enhancement and employing red teaming to stimulate innovation and strategic planning. Furthermore, we will emphasize the significance of creating an environment of confidence and openness with relevant parties while ensuring seamless integration of red teaming into broader risk management applications.
Sponsored by
Presentation
Moving Towards a Zero Trust Mindset
Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.
Sponsored by
Sponsor Networking Time
Lunch
Keynote
Instant Replay and Cyber Incidents
Sponsor Networking Time
Presentation
2024 Threat Report
To build an effective cyber defense, you must understand the offense you will likely face. Who is the adversary? What are their methods? How are they having success? What techniques are they leveraging? In this session, Arctic Wolf will review a summary of their 2024 Threat Report. This recently released report is based on research conducted by the Arctic Wolf Labs Threat Intelligence team and provides a summary of the thousands of IR cases they have performed. After this session, please visit our booth to learn how Arctic Wolf can help you defend against these adversaries and their methods
Sponsored by
Accelerate AI innovation Securely
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.
Sponsored by
Sponsor Networking Time
Presentation
Optimizing DevSecOps: A Blueprint for Communications and Automation
Sponsored by
The Ever Changing Threat Landscape
Today’s cyber threat landscape is constantly evolving. Traditional castle-and-moat architectures are no longer adequate to secure data and users in our hybrid work world. Currently, half of the malware delivered each month comes from SaaS apps. John will explain why it’s important to have visibility for all your traffic – especially well-known (trusted) applications.