Minneapolis Cybersecurity Conference

Thursday, April 10, 2025

Sheraton Bloomington Hotel

Parking/Directions

Hybrid

Join Us in Minneapolis for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Sheraton Bloomington Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Rethinking Cybersecurity for Covert Application Risks

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly read more…

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.

Bio

Scott Taschler

Sr. Product Marketing Manager Contrast Security

Sponsored by

Presentation

9:30 am

Is CTEM the New Zero Trust?

Tired of playing cybersecurity catch-up? Ready to move from reactive firefighting to proactive threat management? The future of cybersecurity is here, and it’s called Continuous Threat Exposure Management (CTEM). This isn’t just another buzzword – it’s a game-changing approach. And it’s being compared to Zero Trust…but it’s not what you read more…

Tired of playing cybersecurity catch-up? Ready to move from reactive firefighting to proactive threat management? The future of cybersecurity is here, and it’s called Continuous Threat Exposure Management (CTEM). This isn’t just another buzzword – it’s a game-changing approach. And it’s being compared to Zero Trust…but it’s not what you think.

Bio

Gary Geihsler

Sales Engineer Axonius

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

Presentation

11:00 am

Securing the Future of Cybersecurity Protection: Essentials in an AI-Driven Digital Landscape​

Bio

Ben Kahlon

Enterprise Account Executive ESET

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Fortifying the Framework: How Integrating Cybersecurity with Enterprise Architecture Drives Strategic Alignment & Business Resilience

Bio

Tina Meeker

Vice President of Information Security, IT Infrastructure and Enterprise Architecture Sleep Number Corporation
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Leading the Charge in Cyber Defense

Join us for an enlightening session with Brian Kane, an MSP owner and authority in the cybersecurity industry. This session will delve into the most pressing challenges and risks facing the IT industry today. Attendees will gain valuable insights into the evolving threats and vulnerabilities that impact businesses and individuals read more…

Join us for an enlightening session with Brian Kane, an MSP owner and authority in the cybersecurity industry. This session will delve into the most pressing challenges and risks facing the IT industry today. Attendees will gain valuable insights into the evolving threats and vulnerabilities that impact businesses and individuals alike. With a focus on strategic defense mechanisms and proactive risk management, Brian will demonstrate how to prioritize and deliver exceptional value within IT organizations. This session is a must-attend for those seeking to enhance their understanding of cybersecurity and learn practical approaches to safeguarding digital assets.

Bio

Brian Kane

ThreatDown Cybersecurity Evangelist Malwarebytes

Sponsored by

Presentation

2:00 pm

Securing the Next-Gen Workspace: 10 principles for guiding a Zero Trust approach to Browser Security

The modern workspace is evolving. It’s cloud-driven, powered by AI, and defined by SaaS. Join us as we discuss how enterprise workspace demands a robust security framework to address the unique vulnerabilities inherent in browser-based interactions today. This session will explore the critical challenges organizations face in securing modern browser read more…

The modern workspace is evolving. It’s cloud-driven, powered by AI, and defined by SaaS. Join us as we discuss how enterprise workspace demands a robust security framework to address the unique vulnerabilities inherent in browser-based interactions today. This session will explore the critical challenges organizations face in securing modern browser usage and outline ten fundamental principles for establishing a comprehensive Zero Trust approach to browser security.

Bio

Eric Wolff

Cybersecurity Strategist Menlo Security

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Needle in the Dataverse: Finding What Matters Before It Finds You

In a world where data sprawls across clouds, apps, and endpoints faster than you can say “unauthorized access,” visibility is everything. Cybersecurity teams are tasked with securing an ever-expanding dataverse…but without knowing where sensitive data lives, who has access, and how it’s being used (or misused), they’re flying blind. This read more…

In a world where data sprawls across clouds, apps, and endpoints faster than you can say “unauthorized access,” visibility is everything. Cybersecurity teams are tasked with securing an ever-expanding dataverse…but without knowing where sensitive data lives, who has access, and how it’s being used (or misused), they’re flying blind. This session dives into the tangled web of identity mismanagement, shadow data stores, and the chaos of cloud scale. We’ll explore why tidying up your data sprawl isn’t just good hygiene, it’s a security imperative. No marketing. No pitches. Just real talk on how understanding your data landscape can be the difference between proactive defense and post-breach cleanup.

Bio

Mark Stanford

Sr. Engineering Director Cyera

Sponsored by

Presentation

3:15 pm

Moving Towards a Zero Trust Mindset with Email Security

Email is the top communication tool—and the top attack vector. This session explores how a Zero Trust approach strengthens email security against phishing, BEC, and account takeovers. We’ll compare traditional and modern security methods, highlighting strategies like link isolation and post-delivery retraction to reduce risk.

Email is the top communication tool—and the top attack vector. This session explores how a Zero Trust approach strengthens email security against phishing, BEC, and account takeovers. We’ll compare traditional and modern security methods, highlighting strategies like link isolation and post-delivery retraction to reduce risk.

Bio

Greg Smalley

Senior Solutions Engineer Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Avneet Thapar Hall

Third Party Governance Advisor | Financial Crimes Unit BMO
Bio

Aunudrei Oliver

Sr. Director Information Security (Deputy CISO) Allianz
Bio

Tina Meeker

Vice President of Information Security, IT Infrastructure and Enterprise Architecture Sleep Number Corporation
Bio

Keith Richard

Director of IT GreaterGood, a CharityUSA.com company
Bio

Mary Herbst

Vice President Enterprise Risk and Compliance YMCA of the North
5:00 pm

Closing Remarks