St. Louis Cybersecurity Conference
Thursday, February 26, 2026
Hybrid
1335 South Lindbergh Blvd., Saint Louis, Missouri, 63131
Join Us in St. Louis for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Fireside Chat
Ransomware Reality Check: What’s Working, What’s Failing, What’s Next
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Michelle Sickbert
Sr. Director, BISO at Equifax WiCyS St. Louis Affiliate Board Member
Scott Keck
Director of Technology Christian Brothers College High School
Katie Boudreau
Director, Cloud Security Architecture Mastercard
Zachary Lewis
CIO and CISO University of Health Sciences and Pharmacy in St. Louis
Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
How to Say Yes to AI (Without Losing Control)
Every CISO faces the same pressure: the business wants AI everywhere, yesterday. The instinct is to slow it down, lock it down, approve one tool, and block the rest. But that approach is failing – employees find workarounds, shadow tools multiply, and security loses visibility entirely.
Naman Ambavi is the founder of Oximy, the system of record for enterprise AI usage. Oximy analyzes millions of AI requests every day across enterprises in financial services, healthcare, and tech. In this session, Naman shares what separates CISOs who are stuck playing defense from those who’ve become AI enablers for their organizations.
He’ll introduce a visibility-first framework that lets security say “safe yes”; governing AI usage without blocking productivity. Attendees will leave with a practical playbook for enabling AI adoption while maintaining the control and visibility their role demands
Sponsored by
Presentation
The Identity-Based Network Eliminating Lateral Movement by Design
The Identity-Based Network Eliminating Lateral Movement by Design by Marty Lager, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Assume Breach: Rethinking Cyber Defense in an Inevitable Compromise Era
Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but finding them is not.
Sponsored by
Presentation
Beyond the Silos: Operationalizing Exposure Management in a Fragmented Landscape
Today’s security landscape is defined by fragmentation—siloed tools, disconnected teams, and an overwhelming volume of data lacking business context. This complexity is compounded by a rapidly evolving attack surface that now includes AI-driven workloads, ephemeral cloud instances, and decentralized identities. In this environment, security teams are often left reacting to technical alerts instead of reducing actual business risk.
This session explores how operationalizing Exposure Management brings much-needed clarity and cohesion to modern cybersecurity programs. Rather than chasing every isolated vulnerability or drowning in the noise of AI-integrated systems, organizations must shift to an adversarial perspective. We will discuss how to move from “list-based” security to “path-based” defense—understanding how a single misconfiguration or identity flaw can be the first step in a catastrophic attack chain.
By unifying visibility and prioritization across the entire attack surface—including the emerging risks within the AI tech stack—Exposure Management helps organizations shift from fragmented firefighting to proactive, measurable risk reduction. Attendees will learn how to mobilize the right teams to act efficiently, ensuring that security efforts are a direct contributor to resilient, secure business growth.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Fireside Chat
Ransomware Reality Check: What’s Working, What’s Failing, What’s Next
Matthew Maynard
Security Operations Specialist at BJC Health Dark Web Researcher | Award-Winning Cyber Writer
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The 80% Problem: Why Your Security Stack Is Blind to Unstructured Data — And What AI Classification Changes
Let’s get honest for a second. You’ve spent years — and a small fortune — building a security stack that protects your data. Firewalls? Check. DLP? Check. CASB? Check. You’ve got more acronyms than a government agency. And yet, roughly 80% of your organization’s data — the unstructured stuff living in file shares, cloud drives, email attachments, and that one SharePoint site nobody wants to claim ownership of — is essentially invisible to all of it.
That’s not a minor gap. That’s the gap. And it’s exactly where breaches happen, where compliance audits turn into nightmares, and where regulators are increasingly pointing their flashlights.
Here’s the uncomfortable truth: your DLP isn’t broken. It’s just flying blind. You can’t protect what you can’t classify, and you can’t classify what you can’t see. Most DSPM solutions will tell you where your data lives. That’s nice. But knowing you have 4.2 million files on a server doesn’t help you sleep at night. Knowing which of those files contain PII, PHI, PCI, or your CEO’s fantasy football spreadsheet labeled “Q3 Strategy” — that’s what actually matters.
In this session, we’ll cut through the noise and show you how AI-powered data classification is solving the harder half of the DSPM equation — the unstructured half — without ripping and replacing the tools you already have. We’ll walk through real-world scenarios from regulated industries (healthcare, financial services, insurance — yes, the fun ones) and demonstrate how mid-market organizations are classifying over a billion documents, integrating with their existing security stack, and finally giving their compliance teams something to smile about. Or at least stop stress-eating.
You’ll walk away with:
- A clear understanding of why unstructured data is the actual risk — not the structured data your current tools already handle
- A practical framework for evaluating DSPM solutions that goes beyond vendor slide decks and buzzword bingo
- A live look at how AI classification works at scale — no black boxes, no magic, just results
- Proof that you don’t need an enterprise budget to solve an enterprise-sized problem
Bring your skepticism. We like it.
Sponsored by
Presentation
The Fake Rolex Problem: Why 36% of Email Attacks Are Invisible to Your Security Stack
New threat research analyzing 1,400+ evasion technique combinations reveals that more than a third of email-borne attacks now exploit architectural blind spots that secure email gateways cannot detect — by design. The largest attack family in the dataset isn’t ransomware, isn’t BEC, and doesn’t contain a single malicious URL. It’s a phone number. This session presents original data from December 2025 through February 2026 showing how attackers have industrialized a “counterfeit Rolex” model — assembling phishing campaigns from legitimate infrastructure components (SendGrid, Cloudflare, Google redirects) so that everything in the supply chain is authentic except the intent. You’ll see the specific attack families targeting your SEG tier, learn why TOAD attacks grew 487% in one month, and leave with a practical framework for mapping your defenses against the threats your current tools were never built to see.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Browser Threat Prevention in the World of AI
Artificial Intelligence has revolutionized how we work, but it has also armed cybercriminals with unprecedented capabilities. From automated reconnaissance to “Clickfix” social engineering tactics that bypass reputation-based security tools—including AV, EDR/EPP, firewalls, and SWGs/CASBs—attackers are moving faster and smarter.
Are your defenses ready for 2026?
Sponsored by
Presentation
How to Get Away with Cybercrime
We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!