






































Join Us in Minneapolis for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
Tina Meeker
Vice President of Information Security, IT Infrastructure and Enterprise Architecture Sleep Number Corporation
Tina is a highly accomplished Cybersecurity & Compliance Executive/Entrepreneur with almost 20 years of success leading cybersecurity advancements in retail, banking, technology, manufacturing and medical device industries.
Tina is currently the Vice President of Information Security and Enterprise Architecture at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Inc., Shutterfly, Inc., and Target Corporation. She built and led a consulting firm, Beacon Information Security, LLC, a highly-credentialed, multi-industry cybersecurity advisory and consulting service. Tina specializes in cybersecurity and privacy program building and maturation, cybersecurity risk management, enterprise security policies, security awareness, phishing programs, mergers & acquisition security evaluations, and recruiting/building high-performing, diverse teams.
Tina holds a Bachelor of Arts in Organizational Behavior & Management from St. Scholastica and a Master of Business Administration from Augsburg University. In addition to holding an MBA, Tina maintains an active CISSP certification and is a part-time adjunct Cyber Security instructor at Dunwoody College in Minneapolis and serves on their advisory board. Tina was also invited to be a guest instructor for the University of Minnesota’s Masters of Security Technologies (MSST) degree program.
Tina is currently the Vice President of the Minnesota Affiliate of the WiCyS (Women in CyberSecurity) National Organization in addition to a Think Tank member and Program Committee Chair for the Cyber Security Summit, a large conference in the Minneapolis/St. Paul area going on its 12th year and was the keynote speaker at “Cyber Now – Birmingham, AL” in April 2018. She has been featured as a speaker at several highly attended conferences, including; GSX Las Vegas, ISC2 Security Congress, Secure 360 Minneapolis, Cyber Security Summit, and the Minnesota Continuing Legal Education Conference.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Avneet Thapar Hall
Third Party Governance Advisor | Financial Crimes Unit BMO
Aunudrei Oliver
Sr. Director Information Security (Deputy CISO) Allianz
Tina Meeker
Vice President of Information Security, IT Infrastructure and Enterprise Architecture Sleep Number Corporation
Keith Richard
Director of IT GreaterGood, a CharityUSA.com company
Mary Herbst
Vice President Enterprise Risk and Compliance YMCA of the North


Sponsors
Platinum Sponsors



Gold Sponsors





Silver Sponsors
























Partner









“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Sheraton Bloomington Hotel
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Security Blindspots
Communicating Risk
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by

Building a Response Strategy
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Tina Meeker
Vice President of Information Security, IT Infrastructure and Enterprise Architecture Sleep Number Corporation
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Current Risk Management
Presentation
Securing the Next-Gen Workspace: 10 principles for guiding a Zero Trust approach to Browser Security
The modern workspace is evolving. It’s cloud-driven, powered by AI, and defined by SaaS. Join us as we discuss how enterprise workspace demands a robust security framework to address the unique vulnerabilities inherent in browser-based interactions today. This session will explore the critical challenges organizations face in securing modern browser usage and outline ten fundamental principles for establishing a comprehensive Zero Trust approach to browser security.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Moving Towards a Zero Trust Mindset with Email Security
Email is the top communication tool—and the top attack vector. This session explores how a Zero Trust approach strengthens email security against phishing, BEC, and account takeovers. We’ll compare traditional and modern security methods, highlighting strategies like link isolation and post-delivery retraction to reduce risk.
Sponsored by

Identifying Threats in your Workplace
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!