Minneapolis Cybersecurity Conference

Thursday, May 2, 2024

Sheraton Bloomington Hotel

Hybrid

Join Us in Minneapolis for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Attend live to enjoy a light breakfast, plated lunch and cocktail reception!

 

 

Sponsors

Premier Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Sheraton Bloomington Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Breach Containment: Assuming breach and isolating threats.

Bio

Christer Swartz

Industry Solutions Director Illumio

Sponsored by

Presentation

9:30 am

Attack Surface Management – The Missing Middle of Cybersecurity

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices. In this presentation, we will discuss: The role of CAASM and attack surface management (ASM) in the future of risk management technologies Key steps including, asset discovery, read more…

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.

In this presentation, we will discuss:

  • The role of CAASM and attack surface management (ASM) in the future of risk management technologies
  • Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack
  • Different methods of ASM and benefits of automation for continuous management
Bio

Phil Guerin

Senior Technical Account Manager Cavelo

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Executive Guide to Red Team Testing

Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively. read more…

Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively.

We will begin by clarifying the meaning of red teaming and outlining what it involves and doesn’t. We will delve into the various components that make up red teaming, encompassing activities such as penetration testing, physical security testing, and adversarial simulations, and analyze the circumstances in which each is most suitable. Also, we will underscore the importance of setting up defined goals, properly scoping the project, and choosing the best team members.

Last but not least, we will tackle the cultural and organizational factors that can influence the outcome of red teaming. We will focus on fostering a culture of ongoing enhancement and employing red teaming to stimulate innovation and strategic planning. Furthermore, we will emphasize the significance of creating an environment of confidence and openness with relevant parties while ensuring seamless integration of red teaming into broader risk management applications.

Bio

Dr. Mark Arnold

VP Advisory Services, vCISO Practice Lares

Sponsored by

Presentation

11:00 am

Moving Towards a Zero Trust Mindset

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Bio

Rémi Crosetti

Solutions Engineer Cloudflare

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Instant Replay and Cyber Incidents

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

2024 Threat Report

To build an effective cyber defense, you must understand the offense you will likely face. Who is the adversary? What are their methods? How are they having success? What techniques are they leveraging? In this session, Arctic Wolf will review a summary of their 2024 Threat Report. This recently released read more…

To build an effective cyber defense, you must understand the offense you will likely face. Who is the adversary? What are their methods? How are they having success? What techniques are they leveraging? In this session, Arctic Wolf will review a summary of their 2024 Threat Report. This recently released report is based on research conducted by the Arctic Wolf Labs Threat Intelligence team and provides a summary of the thousands of IR cases they have performed. After this session, please visit our booth to learn how Arctic Wolf can help you defend against these adversaries and their methods

Bio

Tim DeWaard

Regional Vice President - Sales Engineering Arctic Wolf

Sponsored by

2:00 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Optimizing DevSecOps: A Blueprint for Communications and Automation

Bio

Chris Rodgers

Solutions Architect Seemplicity

Sponsored by

3:15 pm

The Ever Changing Threat Landscape

Today’s cyber threat landscape is constantly evolving. Traditional castle-and-moat architectures are no longer adequate to secure data and users in our hybrid work world. Currently, half of the malware delivered each month comes from SaaS apps. John will explain why it’s important to have visibility for all your traffic – read more…

Today’s cyber threat landscape is constantly evolving. Traditional castle-and-moat architectures are no longer adequate to secure data and users in our hybrid work world. Currently, half of the malware delivered each month comes from SaaS apps. John will explain why it’s important to have visibility for all your traffic – especially well-known (trusted) applications.

Bio

John LaBrie

Senior Manager, Solutions Engineering Netskope

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Diaa Abu-Shaqra

Chief Information Security Officer Sunrise Banks
Bio

Judy Hatchett

VP, CISO SureScripts President - Minnesota Chapter WiCys
Bio

Jeff Holschuh

Chief Information Security Officer Sun Country Airlines
Bio

Scott Ostrander

Vice President & Chief Information Security Officer SPS Commerce
Bio

Sam Maeder

Information Security Officer Lift Brands
5:00 pm

Closing Remarks

Share This