Omaha Cybersecurity Conference

Wednesday, April 17, 2024

Embassy Suites by Hilton Omaha La Vista Hotel & Conference Center

Hybrid

Join FutureCon CyberSecurity Events in Omaha!

At this event discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.

 

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Moving Towards a Zero Trust Mindset

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Bio

Alexander Gillie

Solutions Engineer Cloudflare

Sponsored by

Presentation

9:30 am

State of Security and Compliance 2024

Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will read more…

Tenax Solutions will be discussing the key security drivers that are expected to be prevalent in 2024, highlighting their commonalities as well as the significant challenges that prevent organizations from being compliant and secure. The session will also cover how to improve your compliance and security programs. Additionally, we will delve into the most common technical security issues and provide insights on how to remediate them.

Bio

Sheldon Speers

President Tenax Solutions
Bio

Mike Hinkey

Vice President of Technical Operations Tenax Solutions

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Skate to Where the Puck is Going: Making DevSecOps Easy by Making Security Mistakes Hard

In this presentation we will dive into the challenges of current AppSec methodologies within DevSecOps frameworks, emphasizing the necessity of prioritizing runtime security measures to align with the rapid pace of development. Proactive strategies are highlighted as crucial in making security mistakes arduous, paving the way for seamless integration of read more…

In this presentation we will dive into the challenges of current AppSec methodologies within DevSecOps frameworks, emphasizing the necessity of prioritizing runtime security measures to align with the rapid pace of development. Proactive strategies are highlighted as crucial in making security mistakes arduous, paving the way for seamless integration of security into the development pipeline. Join the journey as we navigate towards anticipating and mitigating vulnerabilities at critical junctures.

Bio

David Lindner

Chief Information Security Officer Contrast Security

Sponsored by

Presentation

11:00 am

Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. read more…

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Bio

Robert Biestman

Sr. Manager, Threat Intelligence Proofpoint

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Securing B2B SaaS: Brake for Success

We will explore how aligning a company’s people, processes, and technologies can enable product and revenue growth by meeting customer requirements in the B2B SaaS sector. In addition, we will delve into the balance between robust cybersecurity measures and the need for business agility, demonstrating how strategic alignment across the read more…

We will explore how aligning a company’s people, processes, and technologies can enable product and revenue growth by meeting customer requirements in the B2B SaaS sector. In addition, we will delve into the balance between robust cybersecurity measures and the need for business agility, demonstrating how strategic alignment across the organization can address both security concerns and customer needs. This will highlight the significance of the pivotal role of compliance in securing customer trust, and the direct impact of these elements on revenue generation.

Bio

Ross Coudeyras

Head of Security and Compliance, Data Protection Officer, Remesh | Adjunct Instructor of Cybersecurity and Privacy, Doane University
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

AI For Security

Bio

Gregg Earnhart

Sr. Cyber Security Sales Engineer Next DLP

Sponsored by

Presentation

2:00 pm

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

2:30 pm

Sponsor Networking TIme

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

How Cyber Secures AI

How to embrace the transformative opportunities of AI with confidence and control. Adopting AI quickly and safely is top of mind for businesses as AI becomes a larger part of all organizations’ technology environments. From Consumer AI tools like ChatGPT to products embedding “Copilots” into feature releases to the software read more…

How to embrace the transformative opportunities of AI with confidence and control. Adopting AI quickly and safely is top of mind for businesses as AI becomes a larger part of all organizations’ technology environments. From Consumer AI tools like ChatGPT to products embedding “Copilots” into feature releases to the software firms develop and maintain – Security is foundational to success with AI. Gain insights on how to build the right foundation to enable AI adoption securely, craft a Secure AI roadmap, identify use cases that provide value and minimize risk, and execute pilot projects. Boldly go into the future with a solid foundation of secure innovation.

Bio

Shawn Asmus

Practice Director Optiv

Sponsored by

Presentation

3:15 pm

Protecting the Castle & Being Prepared for Recovery

Explore the critical balance between defending against cyber threats and ensuring effective recovery at this session, which draws on recent data indicating that 85% of organizations experienced a cyber attack last year. We’ll discuss strategic responses to ransomware, the essential role of clean backups, and the construction of robust Incident read more…

Explore the critical balance between defending against cyber threats and ensuring effective recovery at this session, which draws on recent data indicating that 85% of organizations experienced a cyber attack last year. We’ll discuss strategic responses to ransomware, the essential role of clean backups, and the construction of robust Incident Response Plans. Learn actionable strategies to enhance your organization’s resilience, reduce recovery times, and align cybersecurity with backup operations for optimal protection and recovery.

Bio

Bobby Barber

Enterprise Systems Engineer Veeam

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Steven Carlson

Platform Security Vulnerability Management Lead Fivetran
Bio

Marc Johnson

CISO / Director / vCISO / vCIO Impact Advisors
Bio

Melissa Moreno

Chief Information Officer Lindsay Corporation
Bio

Ross Coudeyras

Head of Security and Compliance, Data Protection Officer, Remesh | Adjunct Instructor of Cybersecurity and Privacy, Doane University
Bio

Ron Woerner

CISO/vCISO/ISSO Anon.
5:00 pm

Closing Remarks

Share This