Home / / Omaha, NE

Omaha Cybersecurity Conference

Wednesday, April 19, 2023

Live in Person @ Embassy Suites Downtown

Parking & Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Information security, it's time to ask why"

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh

A nationally recognized expert, David is a Senior Vice President in Marsh’s Emerging Risks Group. Prior to Marsh, David served at ReSource Pro, a global insurance services firm, as their global security executive after a 23-year career with Werner Enterprises.

In his role, David actively advises numerous enterprise CISOs, security teams, technology leaders, business executives, and Boards, with particular emphasis on cyber strategy and risk issues. The Emerging Risks Group sits at the intersection of strategy and risk deploying advanced quantitative methods to understand, measure, and manage complex risks.

In his previous position at ReSource Pro, David established a global security program across the U.S., India, and China and worked with insurance industry clients. David ensured secure delivery of services for over 6,000 offshore employees via an ISO 27001 and SSAE18 certified security program. Key initiatives included establishing global security culture, expanded internal SOC services and rapid increases in program maturity required by Fortune 500 clients.

David served as the enterprise security leader for Werner Enterprises, a nation-wide transportation services and global logistics provider. He established core security processes and underlaying technology/security systems to support complex, business aligned growth strategies. Some of his key initiatives included quantitative risk management, enterprise Identity & Access Management (IAM), vulnerability risk management, third party risk management, and board-level reporting. During this time he was also a part-time member of the SANS Institute, implementing and delivering courses.

Prior to his IT and security career, he served as an operational team member and Flight Operations Director at Goddard Space Flight Center. David also served in the U.S. Air Force as part of the Defense Meteorological Satellite Program (DMSP).

David holds a Bachelor of Science degree from the University of Maryland University College, is a Certified in Risk and Information Systems Control (CRISC) and Open FAIR.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Johnson

CISO / Director / vCISO / vCIO
Impact Advisors

Bio

Manoj Regmi

VP, Technology
Farmers Edge

Bio

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management
Marsh

Bio

Dr. Lisa McKee

Founding Partner, American Security and Privacy |
Creator of ComPriSec and Zero Trust Privacy

Bio

Joshua Fugate

Director, Cybersecurity Architecture & Strategy
Charles Schwab

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Future of Cybersecurity Operations

Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.

Jeffrey Wheat

CTO Lumu
Bio

Presentation

9:30 am

How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster

Wanda Miles

Senior Security and Compliance Program Manager Exabeam
Bio

Networking

10:00 am

Networking

Presentation

10:30 am

Can the phishing problem be solved?

Carlos Munoz

Territory Manager Cloudflare
Bio

Presentation

11:00 am

CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach

Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Jamion Aden

Solutions Architect IP Pathways
Bio

Michael Leggett

Solutions Architect Avertium
Bio

11:30 am

Networking

11:45 am

Lunch

Keynote

12:15 pm

"Information security, it's time to ask why"

The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
Bio

Networking

1:15 pm

Networking

Presentation

1:45 pm

Anatomy of a Disaster: Why We’re Still Losing to Ransomware

In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.

Paul Dant

Senior Director, Cybersecurity Research Illumio
Bio

Presentation

2:15 pm

Great eXpeltations: cyber defense trends for 2023

We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023.

Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security operations center (SOC) saw in 2022, based on our full customer base: from small and midsize companies to enterprise orgs, at every phase of the security journey, across every industry Expel serves.

Join Chris Hencinski, Solutions Architect, Expel, for a deep dive into the numbers and their real-world incident counterparts, including examples of pre-ransomware, business application compromise, credential harvester phishing, SaaS compromise, and an attack against cloud infrastructure.

Christopher Hencinski

Solutions Architect Expel
Bio

Networking

2:45 pm

Networking

Presentation

3:00 pm

Operational Technology Examined: Learning from OT attacks in the past

Stephen Mozia

Senior Practice Manager, IoT and OT Security Optiv
Bio

Networking

3:30 pm

Networking

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

Manoj Regmi

VP, Technology Farmers Edge
Bio

David Elfering

Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
Bio

Dr. Lisa McKee

Founding Partner, American Security and Privacy | Creator of ComPriSec and Zero Trust Privacy
Bio

Joshua Fugate

Director, Cybersecurity Architecture & Strategy Charles Schwab
Bio

5:00 pm

Closing Remarks

Register

Share This