St. Louis Cybersecurity Conference

Thursday, February 26, 2026

Hilton St. Louis Frontenac

PARKING/DIRECTIONS

Hybrid

1335 South Lindbergh Blvd., Saint Louis, Missouri, 63131

Join Us in St. Louis for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

How to Say Yes to AI (Without Losing Control)

Every CISO faces the same pressure: the business wants AI everywhere, yesterday. The instinct is to slow it down, lock it down, approve one tool, and block the rest. But that approach is failing – employees find workarounds, shadow tools multiply, and security loses visibility entirely. Naman Ambavi is the read more…

Every CISO faces the same pressure: the business wants AI everywhere, yesterday. The instinct is to slow it down, lock it down, approve one tool, and block the rest. But that approach is failing – employees find workarounds, shadow tools multiply, and security loses visibility entirely.

Naman Ambavi is the founder of Oximy, the system of record for enterprise AI usage. Oximy analyzes millions of AI requests every day across enterprises in financial services, healthcare, and tech. In this session, Naman shares what separates CISOs who are stuck playing defense from those who’ve become AI enablers for their organizations.

He’ll introduce a visibility-first framework that lets security say “safe yes”; governing AI usage without blocking productivity. Attendees will leave with a practical playbook for enabling AI adoption while maintaining the control and visibility their role demands

Bio

Naman Ambavi

Founder & CEO Oximy

Sponsored by

Presentation

9:30 am

The Identity-Based Network Eliminating Lateral Movement by Design

The Identity-Based Network Eliminating Lateral Movement by Design by Marty Lager, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture read more…

The Identity-Based Network Eliminating Lateral Movement by Design by Marty Lager, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.

Bio

Marty Lager

Enterprise Technology Advisor Nile

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Assume Breach: Rethinking Cyber Defense in an Inevitable Compromise Era

Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but read more…

Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but finding them is not.

Bio

Rishi Joshee

Enterprise Cybersecurity Analyst LMNTRIX

Sponsored by

Presentation

11:00 am

Beyond the Silos: Operationalizing Exposure Management in a Fragmented Landscape

Today’s security landscape is defined by fragmentation—siloed tools, disconnected teams, and an overwhelming volume of data lacking business context. This complexity is compounded by a rapidly evolving attack surface that now includes AI-driven workloads, ephemeral cloud instances, and decentralized identities. In this environment, security teams are often left reacting to read more…

Today’s security landscape is defined by fragmentation—siloed tools, disconnected teams, and an overwhelming volume of data lacking business context. This complexity is compounded by a rapidly evolving attack surface that now includes AI-driven workloads, ephemeral cloud instances, and decentralized identities. In this environment, security teams are often left reacting to technical alerts instead of reducing actual business risk.

This session explores how operationalizing Exposure Management brings much-needed clarity and cohesion to modern cybersecurity programs. Rather than chasing every isolated vulnerability or drowning in the noise of AI-integrated systems, organizations must shift to an adversarial perspective. We will discuss how to move from “list-based” security to “path-based” defense—understanding how a single misconfiguration or identity flaw can be the first step in a catastrophic attack chain.

By unifying visibility and prioritization across the entire attack surface—including the emerging risks within the AI tech stack—Exposure Management helps organizations shift from fragmented firefighting to proactive, measurable risk reduction. Attendees will learn how to mobilize the right teams to act efficiently, ensuring that security efforts are a direct contributor to resilient, secure business growth.

Bio

Tara Jaques

Technical Director Tenable

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Fireside Chat

12:00 pm

Ransomware Reality Check: What’s Working, What’s Failing, What’s Next

Bio

Zachary Lewis

CIO and CISO University of Health Sciences and Pharmacy in St. Louis
Bio

Matthew Maynard

Security Operations Specialist at BJC Health Dark Web Researcher | Award-Winning Cyber Writer
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The 80% Problem: Why Your Security Stack Is Blind to Unstructured Data — And What AI Classification Changes

Let’s get honest for a second. You’ve spent years — and a small fortune — building a security stack that protects your data. Firewalls? Check. DLP? Check. CASB? Check. You’ve got more acronyms than a government agency. And yet, roughly 80% of your organization’s data — the unstructured stuff living read more…
  • A clear understanding of why unstructured data is the actual risk — not the structured data your current tools already handle
  • A practical framework for evaluating DSPM solutions that goes beyond vendor slide decks and buzzword bingo
  • A live look at how AI classification works at scale — no black boxes, no magic, just results
  • Proof that you don’t need an enterprise budget to solve an enterprise-sized problem

Bring your skepticism. We like it.

Bio

Daniel Molina

Executive Vice President of Global Sales Kriptos

Sponsored by

Presentation

2:00 pm

The Fake Rolex Problem: Why 36% of Email Attacks Are Invisible to Your Security Stack

New threat research analyzing 1,400+ evasion technique combinations reveals that more than a third of email-borne attacks now exploit architectural blind spots that secure email gateways cannot detect — by design. The largest attack family in the dataset isn’t ransomware, isn’t BEC, and doesn’t contain a single malicious URL. It’s read more…

New threat research analyzing 1,400+ evasion technique combinations reveals that more than a third of email-borne attacks now exploit architectural blind spots that secure email gateways cannot detect — by design. The largest attack family in the dataset isn’t ransomware, isn’t BEC, and doesn’t contain a single malicious URL. It’s a phone number. This session presents original data from December 2025 through February 2026 showing how attackers have industrialized a “counterfeit Rolex” model — assembling phishing campaigns from legitimate infrastructure components (SendGrid, Cloudflare, Google redirects) so that everything in the supply chain is authentic except the intent. You’ll see the specific attack families targeting your SEG tier, learn why TOAD attacks grew 487% in one month, and leave with a practical framework for mapping your defenses against the threats your current tools were never built to see.

Bio

Alan Lefort

CEO StrongestLayer

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Browser Threat Prevention in the World of AI

Artificial Intelligence has revolutionized how we work, but it has also armed cybercriminals with unprecedented capabilities. From automated reconnaissance to “Clickfix” social engineering tactics that bypass reputation-based security tools—including AV, EDR/EPP, firewalls, and SWGs/CASBs—attackers are moving faster and smarter. Are your defenses ready for 2026?

Artificial Intelligence has revolutionized how we work, but it has also armed cybercriminals with unprecedented capabilities. From automated reconnaissance to “Clickfix” social engineering tactics that bypass reputation-based security tools—including AV, EDR/EPP, firewalls, and SWGs/CASBs—attackers are moving faster and smarter.

Are your defenses ready for 2026?

Bio

Danny Le

Senior Solutions Engineer Menlo Security

Sponsored by

Presentation

3:15 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Eli Johnson

Senior Solutions Engineer Sophos

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Michelle Sickbert

Sr. Director, BISO at Equifax WiCyS St. Louis Affiliate Board Member
Bio

Scott Keck

Director of Technology Christian Brothers College High School
Bio

Katie Boudreau

Director, Cloud Security Architecture Mastercard
Bio

Zachary Lewis

CIO and CISO University of Health Sciences and Pharmacy in St. Louis
5:00 pm

Closing Remarks