St. Louis, MO

Wednesday, March 12, 2025

Sheraton Westport Chalet Hotel St. Louis

Parking/Directions

Hybrid

Join Us in St. Louis for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Sheraton Westport Chalet Hotel St. Louis

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Rethinking Cybersecurity for Covert Application Risks

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly read more…

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.

Bio

Pranoy De

Principal Solutions Engineer Contrast Security

Sponsored by

Presentation

9:30 am

How AI is evolving the Threat Landscape

Explore how AI is transforming the cyber threat landscape, highlighting adversarial use cases and 2025 trends. Discover how defenders and security teams leverage AI, the types of AI in security, and their strengths and weaknesses. Learn evaluation methods and gain insights into the evolving role of AI in cybersecurity and read more…

Explore how AI is transforming the cyber threat landscape, highlighting adversarial use cases and 2025 trends. Discover how defenders and security teams leverage AI, the types of AI in security, and their strengths and weaknesses. Learn evaluation methods and gain insights into the evolving role of AI in cybersecurity and its future implications

Bio

Collin Chapleau

Director of AI and Security Darktrace

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

Presentation

11:00 am

Fear, Uncertainty and AI: Why Is Operationalizing So Scary?

AI is all the rage! AI is everywhere! AI is going to change the world! Really? So, in your company, have you fully operationalized AI agents, services, and embedded features among your SaaS providers? Most likely, not. Most companies have adopted a full-block approach to AI deployment among their users. Why the read more…

AI is all the rage! AI is everywhere! AI is going to change the world! Really?

So, in your company, have you fully operationalized AI agents, services, and embedded features among your SaaS providers? Most likely, not. Most companies have adopted a full-block approach to AI deployment among their users.

Why the fear? Richard Bird breaks down the myths, mysteries, and issues with the disconnect between achieving AI glory and barring the door closed for AI adoption.

Bio

Richard Bird

Chief Security Officer Singulr AI

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

The Apps Are Listening: Old School Security vs. New School Risks in the Age of Digital Defiance & Foreign Surveillance

Bio

Renita Rhodes

Vice President, Audit Manager - Cybersecurity Audit, Banking Institution Adjunct MIS & Cybersecurity Instructor
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Runtime Risk: The Enemy You Don't Know

How do you defend against a threat you can’t see? Research confirms that 60-80% of all breaches involve the successful exploitation of code weaknesses – and yet, ironically, this is where teams have the least context. The good news is, observability data can help – and we’ll unpack this opportunity read more…

How do you defend against a threat you can’t see? Research confirms that 60-80% of all breaches involve the successful exploitation of code weaknesses – and yet, ironically, this is where teams have the least context. The good news is, observability data can help – and we’ll unpack this opportunity together in the session.

Bio

Justin Nichols

Lead Security Solutions Engineer Dynatrace

Sponsored by

Presentation

2:00 pm

Securing the Next-Gen Workspace: 10 principles for guiding a Zero Trust approach to Browser Security

The modern workspace is evolving. It’s cloud-driven, powered by AI, and defined by SaaS. Join us as we discuss how enterprise workspace demands a robust security framework to address the unique vulnerabilities inherent in browser-based interactions today. This session will explore the critical challenges organizations face in securing modern browser read more…

The modern workspace is evolving. It’s cloud-driven, powered by AI, and defined by SaaS. Join us as we discuss how enterprise workspace demands a robust security framework to address the unique vulnerabilities inherent in browser-based interactions today. This session will explore the critical challenges organizations face in securing modern browser usage and outline ten fundamental principles for establishing a comprehensive Zero Trust approach to browser security.

Bio

Mark Cerda

Senior Technical Success Manager Menlo Security Inc

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Moving Towards a Zero Trust Mindset with Email Security

With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your security posture. This session offers insights into building a resilient read more…

With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your security posture. This session offers insights into building a resilient framework that meets today’s security demands

Bio

Scott Harris

Principal Solutions Engineer Cloudflare

Sponsored by

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Zachary Lewis

AVP IT & Chief Information Security Officer University of Health Sciences and Pharmacy in St. Louis
Bio

Tina Lampe

Award Winning Strategic Technology Partner/ Director - IT Software Engineering Director DIRECTV
Bio

Roftiel Constantine

Global CISO Barry-Wehmiller
Bio

Daniel Stamer

Chief Information Officer | Senior Vice President Sullivan Bank
Bio

Tami Spellman

Director, IT Security Caleres
5:00 pm

Closing Remarks