Minneapolis Cybersecurity Conference

Thursday, April 9, 2026

Sheraton Bloomington Hotel

PARKING/DIRECTIONS

Hybrid

5601 West 78th Street, Bloomington, Minnesota, USA, 55439

Join Us in Minneapolis for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

But Our Identity Lives in the Cloud: Understanding Why Cloud Identity Is Easy to Run — and Hard to Recover

Cloud identity platforms make authentication and access seamless, but recovery is far more complex than most organizations realize. This session explores why AD, Entra ID, and cloud IDPs cannot fully restore identity state, relationships, and cloud-native objects after incidents. Attendees will learn what actually breaks—and what must be rebuilt—across tenants, read more…
Cloud identity platforms make authentication and access seamless, but recovery is far more complex than most organizations realize. This session explores why AD, Entra ID, and cloud IDPs cannot fully restore identity state, relationships, and cloud-native objects after incidents. Attendees will learn what actually breaks—and what must be rebuilt—across tenants, SaaS integrations, and MFA during identity recovery.
Bio

James Ravenell

Senior Solutions Architect Semperis

Sponsored by

Presentation

9:15 am

Stopping Cyber Threats, What Actually Works

Cyber threats are evolving at an unprecedented rate.  In this presentation, we’ll use one common attack as a case study to analyze how existing defenses fare.
Cyber threats are evolving at an unprecedented rate.  In this presentation, we’ll use one common attack as a case study to analyze how existing defenses fare.
Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

9:45 am

AI: Cybersecurity’s Double Edge Sword

Bio

Matt Moss

Senior Solution Architect ESET

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

From Prompts to Permissions: The New Data Risk Model For AI

AI assistants and agents change how data is accessed, inferred, and exposed. New attack techniques exploit prompts, retrieved content, and permissions inside trusted systems, bypassing traditional controls. This session will examine emerging AI-driven data risks, why discovery alone isn’t enough, and how security teams can apply controls that scale with read more…
AI assistants and agents change how data is accessed, inferred, and exposed. New attack techniques exploit prompts, retrieved content, and permissions inside trusted systems, bypassing traditional controls. This session will examine emerging AI-driven data risks, why discovery alone isn’t enough, and how security teams can apply controls that scale with AI adoption.
Bio

Brian Vecci

Field CTO Varonis

Sponsored by

Presentation

11:15 am

Prediction Is Not Protection

Application security has become a forecasting exercise. We rely on CVEs, scanners, and severity scores to predict what might go wrong. But in an AI-driven world, where code ships faster and attacks move faster, prediction is no longer enough. Forecasts don’t tell you what’s being exploited. They don’t tell you read more…

Application security has become a forecasting exercise.

We rely on CVEs, scanners, and severity scores to predict what might go wrong. But in an AI-driven world, where code ships faster and attacks move faster, prediction is no longer enough.

Forecasts don’t tell you what’s being exploited. They don’t tell you what’s reachable. And they don’t tell you what’s under attack right now.

This talk shows why forecast-only security breaks down in the machine-speed-era, and what replaces it.

You’ll see how runtime visibility changes application security from a guessing game into an operational discipline – revealing real attack paths, reducing noise, and enabling teams to detect and stop attacks in production.

Bio

Tony Bailey

Marketing Director Contrast Security

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

Making the world a little more secure - lessons learned from designing, building & running a global Product Security Program.

Bio

Matthew Bohne

Vice President, Chief Product Security Officer Honeywell Corporate
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Agentic SOC in Practice: Field Lessons on Powering and Governing AI Investigations

Bio

Paul Giorgi

Vice President of Technical Engineering ExtraHop

Sponsored by

Presentation

2:15 pm

AI Hype vs Reality - Don't Secure the Spectacle

If AI headlines are driving your priorities, it’s time to recalibrate. This session dismantles three AI security myths, then addresses what’s more urgent: how today’s human risk scales into tomorrow’s agentic risk at machine speed. From misplaced trust in automation to behavioral blind spots, we’ll examine how psychology and prioritization read more…

If AI headlines are driving your priorities, it’s time to recalibrate. This session dismantles three AI security myths, then addresses what’s more urgent: how today’s human risk scales into tomorrow’s agentic risk at machine speed. From misplaced trust in automation to behavioral blind spots, we’ll examine how psychology and prioritization shape enterprise exposure. You’ll leave ready to prioritize the risks that will define the next era.

Bio

Molly McLain Sterling

Sr Director of Global Cybersecurity Strategists Proofpoint

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

AI in Cybersecurity: Friend, Foe, or Both?

AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits from automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection. But AI is a double-edged sword. While security teams use it to read more…
AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits from automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection. But AI is a double-edged sword. While security teams use it to predict and stop attacks, cybercriminals exploit it to craft sophisticated phishing campaigns, deepfakes, and adaptive malware.
This session explores AI’s evolution, its rapid rise in business environments, and its expanding role in today’s cybersecurity arms race. You’ll walk away with practical insights and clear steps to help your organization use AI securely, responsibly, and effectively.
Bio

Ross McDougall

Senior Solutions Engineer Sophos

Sponsored by

Presentation

3:30 pm

The End of Legacy Network Security

Bio

Todd Ellison

Director of Solution Architects Nile

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Conan Sandberg

Senior Director, Cyber Security Platform Science
Bio

Vince Aimutis

VP | Director of Information Services | CISO Federated Insurance
Bio

Chris Gabbard

Cyber Security Advisor U.S. Department of Homeland Security
Bio

Matthew Bohne

Vice President, Chief Product Security Officer Honeywell Corporate
Bio

Doug Koch

FBI Cybersecurity Collaborator InfraGard Minnesota
5:15 pm

Closing Remarks