St. Louis Cybersecurity Conference
Thursday, February 26, 2026
Hybrid
1335 South Lindbergh Blvd., Saint Louis, Missouri, 63131
Join Us in St. Louis for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Fireside Chat
Ransomware Reality Check: What’s Working, What’s Failing, What’s Next
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
How to Say Yes to AI (Without Losing Control)
Every CISO faces the same pressure: the business wants AI everywhere, yesterday. The instinct is to slow it down, lock it down, approve one tool, and block the rest. But that approach is failing – employees find workarounds, shadow tools multiply, and security loses visibility entirely.
Naman Ambavi is the founder of Oximy, the system of record for enterprise AI usage. Oximy analyzes millions of AI requests every day across enterprises in financial services, healthcare, and tech. In this session, Naman shares what separates CISOs who are stuck playing defense from those who’ve become AI enablers for their organizations.
He’ll introduce a visibility-first framework that lets security say “safe yes”; governing AI usage without blocking productivity. Attendees will leave with a practical playbook for enabling AI adoption while maintaining the control and visibility their role demands
Sponsored by
Security Blindspots
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Assume Breach: Rethinking Cyber Defense in an Inevitable Compromise Era
Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but finding them is not.
Sponsored by
Building a Response Strategy
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Fireside Chat
Ransomware Reality Check: What’s Working, What’s Failing, What’s Next
Matthew Maynard
Security Operations Specialist at BJC Health Dark Web Researcher | Award-Winning Cyber Writer
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The 80% Problem: Why Your Security Stack Is Blind to Unstructured Data — And What AI Classification Changes
Let’s get honest for a second. You’ve spent years — and a small fortune — building a security stack that protects your data. Firewalls? Check. DLP? Check. CASB? Check. You’ve got more acronyms than a government agency. And yet, roughly 80% of your organization’s data — the unstructured stuff living in file shares, cloud drives, email attachments, and that one SharePoint site nobody wants to claim ownership of — is essentially invisible to all of it.
That’s not a minor gap. That’s the gap. And it’s exactly where breaches happen, where compliance audits turn into nightmares, and where regulators are increasingly pointing their flashlights.
Here’s the uncomfortable truth: your DLP isn’t broken. It’s just flying blind. You can’t protect what you can’t classify, and you can’t classify what you can’t see. Most DSPM solutions will tell you where your data lives. That’s nice. But knowing you have 4.2 million files on a server doesn’t help you sleep at night. Knowing which of those files contain PII, PHI, PCI, or your CEO’s fantasy football spreadsheet labeled “Q3 Strategy” — that’s what actually matters.
In this session, we’ll cut through the noise and show you how AI-powered data classification is solving the harder half of the DSPM equation — the unstructured half — without ripping and replacing the tools you already have. We’ll walk through real-world scenarios from regulated industries (healthcare, financial services, insurance — yes, the fun ones) and demonstrate how mid-market organizations are classifying over a billion documents, integrating with their existing security stack, and finally giving their compliance teams something to smile about. Or at least stop stress-eating.
You’ll walk away with:
- A clear understanding of why unstructured data is the actual risk — not the structured data your current tools already handle
- A practical framework for evaluating DSPM solutions that goes beyond vendor slide decks and buzzword bingo
- A live look at how AI classification works at scale — no black boxes, no magic, just results
- Proof that you don’t need an enterprise budget to solve an enterprise-sized problem
Bring your skepticism. We like it.
Sponsored by
What is Cloud Security
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Defending Against Data Breaches
Identifying Threats in your Workplace
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!