Omaha Cybersecurity Conference
Wednesday, April 19, 2023
Live in Person @ Embassy Suites Downtown
In Person | Virtual | Hybrid
Earn up to 10 CPE credits

























About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
"Information security, it's time to ask why"
David Elfering
Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
A nationally recognized expert, David is a Senior Vice President in Marsh’s Emerging Risks Group. Prior to Marsh, David served at ReSource Pro, a global insurance services firm, as their global security executive after a 23-year career with Werner Enterprises.
In his role, David actively advises numerous enterprise CISOs, security teams, technology leaders, business executives, and Boards, with particular emphasis on cyber strategy and risk issues. The Emerging Risks Group sits at the intersection of strategy and risk deploying advanced quantitative methods to understand, measure, and manage complex risks.
In his previous position at ReSource Pro, David established a global security program across the U.S., India, and China and worked with insurance industry clients. David ensured secure delivery of services for over 6,000 offshore employees via an ISO 27001 and SSAE18 certified security program. Key initiatives included establishing global security culture, expanded internal SOC services and rapid increases in program maturity required by Fortune 500 clients.
David served as the enterprise security leader for Werner Enterprises, a nation-wide transportation services and global logistics provider. He established core security processes and underlaying technology/security systems to support complex, business aligned growth strategies. Some of his key initiatives included quantitative risk management, enterprise Identity & Access Management (IAM), vulnerability risk management, third party risk management, and board-level reporting. During this time he was also a part-time member of the SANS Institute, implementing and delivering courses.
Prior to his IT and security career, he served as an operational team member and Flight Operations Director at Goddard Space Flight Center. David also served in the U.S. Air Force as part of the Defense Meteorological Satellite Program (DMSP).
David holds a Bachelor of Science degree from the University of Maryland University College, is a Certified in Risk and Information Systems Control (CRISC) and Open FAIR.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Marc Johnson
Sr. Advisor / vCISO / vCIO
Impact Advisors

Manoj Regmi
VP, Technology
Farmers Edge

David Elfering
Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management
Marsh

Dr. Lisa McKee
Founding Partner, American Security and Privacy |
Creator of ComPriSec and Zero Trust Privacy

Joshua Fugate
Director, Cybersecurity Architecture & Strategy
Charles Schwab
Platinum Sponsors

Gold Sponsors







Silver Sponsors












Partners





Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The Future of Cybersecurity Operations
Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.

Presentation
How to Build an Insider Threat Program
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster

Networking
Networking
Presentation
CYA WITH CIA: Covering Your Assets with a Holistic Data Security Approach
Is your organization doing what it should to protect the confidentiality, integrity, and availability of your data? Join us for a comprehensive look at the latest strategies and technologies for safeguarding your environment. From SASE to Zero Trust, we’ll help make sense of the latest buzzwords, as well as discuss established best practices on topics ranging from firewalls to frameworks. Throughout the presentation, we will address the importance of a programmatic approach to security and provide guidance on how to avoid common pitfalls. Attendees will leave with a better understanding of what is involved in a holistic approach to data security and how they can CYA with CIA.

Networking
Lunch
Keynote
"Information security, it's time to ask why"
The core theme is that our focus on all the “hows” have led us to solve the wrong problems for our businesses. While security budgets have grown, so have insurance claims due to breaches, business interruptions, and regulatory impacts.

David Elfering
Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
Networking
Networking
Presentation
Anatomy of a Disaster: Why We’re Still Losing to Ransomware
In this talk, you’ll hear stories from a 30+ year career hacker that highlight key commonalities in today’s successful attacks, why our past efforts have failed, and the shift in thinking we need to embrace before the inevitable cyber disaster impacts our lives and society as a whole.

Presentation
Great eXpeltations: cyber defense trends for 2023
We know that 2022 was fraught with security threats. But wrapping your head around what they were, what’s trending, and what to do about it is essential for your security strategy going into 2023.
Expel’s annual threat report, Great eXpeltations, compiles data, trends, and recommendations from the incidents our security operations center (SOC) saw in 2022, based on our full customer base: from small and midsize companies to enterprise orgs, at every phase of the security journey, across every industry Expel serves.
Join Chris Hencinski, Solutions Architect, Expel, for a deep dive into the numbers and their real-world incident counterparts, including examples of pre-ransomware, business application compromise, credential harvester phishing, SaaS compromise, and an attack against cloud infrastructure.

Networking
Networking
Presentation
Operational Technology Examined: Learning from OT attacks in the past

Networking
Networking
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

David Elfering
Information Security Strategy | CISO | Identity Management | Security Governance | Enterprise Risk Management Marsh
