• Featured Speakers

    Collapse This Item

Event Schedule

Times for the Minneapolis Cybersecurity Conference are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, December 1st.

  • Welcome to the Minneapolis Cybersecurity Conference
  • Managing Cloud Risk Without Slowing App Delivery 9:00 am

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Jason Clark, Senior Cloud Engineer, will share our customers’ best practices for securing containers, Kubernetes and cloud services.

    Click to Expand

    Speaker:

    Jason Clark
    Jason Clark

    Jason Clark

    Senior Cloud Engineer, Sysdig

    Collapse This Item

  • Battle of the Algorithms 9:20 am

    Presented by Darktrace

    With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Cybersecurity executive Jason in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.

    Click to Expand

    Speaker:

    Jason Fillingim
    Jason Fillingim

    Jason Fillingim

    Cyber Security Executive, Darktrace

    Collapse This Item

  • Level-Up Your Security Posture with a Virtual Security Assistant 10:05 am

    Presented by BitLyft

    New attack vectors arrive daily. If you are not actively monitoring and detecting threats inside your infrastructure (network, SaaS, Cloud), you open yourself up to risk and even liability. Add this to the pain of being overworked, short-staffed, and lacking budget, and you’ve got a recipe for disaster. Learn how to overcome these challenges, strengthen your security posture and breathe a little easier with a virtual security assistant platform.

    Click to Expand

    Speaker:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Collapse This Item

  • Finding the Blind Spots 10:35 am

    Presented by Code 42

    “How do I start a successful Insider Risk Program in my organization?” 

    Well, we like to start at the beginning: communication and speaking the same language. Without speaking the same language, there is no way to surface variables that are needed to help solve the most difficult problems: the unknown unknowns, or our blind spots.

    Join us to learn how to build a shared vision of insider risk within your organization so you can focus your efforts clearly and prioritize how you want to manage risk.

    Click to Expand

    Speaker:

    Clea Ostendorf

    Clea Ostendorf

    Senior Risk Advisor, Consultant, Code42

    Collapse This Item

  • Chutes and Ladders: How is Zero Trust Playing Out? 11:15 am

    Presented by Cisco

    The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. In 2021, Cisco and Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. Within that study, we analyzed commonalities of organizations implementing and operating Zero Trust. This session will share how Zero Trust is working in the real world, and what the best of the best programs have in common.

    Click to Expand

    Panel Participants:

    J. Wolfgang Goerlich
    J. Wolfgang Goerlich

    J. Wolfgang Goerlich

    Advisory CISO

    Collapse This Item

  • Protecting Against Cyber Attacks 11:45 am

    We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE.  And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.

    Click to Expand

    Panel Participants:

    Jason Newman
    Jason Newman

    Jason Newman

    Manager, Customer Success Engineering, QOMPLX

    Doug Plooster
    Doug Plooster

    Doug Plooster

    President, Enterprise Visions

    Jeff Recker
    Jeff Recker

    Jeff Recker

    Regional Vice President, Strategic

    Brandon Reid
    Brandon Reid

    Brandon Reid

    Field Chief Technology Officer at Mimecast

    Ryan Jamieson
    Ryan Jamieson

    Ryan Jamieson

    Head of Advisory Services, Redacted

    Collapse This Item

  • Conference Lunch Break
  • Win the Cyber-War with Zero Trust 12:55 pm

    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Immutable Storage: Level-Up Your Ransomware Readiness 2:00 pm

    Presented by Arcserve

    Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

    Click to Expand

    Speaker:

    Mark Erickson
    Mark Erickson

    Mark Erickson

    Principle Engineer, Arcserve

    Collapse This Item

  • Data Protection - Addressing the "Perfect Storm" 2:20 pm

    Presented by HelpSystems

    Fact: Threat Protection alone cannot provide Data Protection. In this session you will learn how a data-centric security approach can prevent data loss via: 1) data identification & classification, 2) data governance & control, 3) secure 3rd party collaboration, and 4) ransomware protection.

    Click to Expand

    Speaker:

    Wally Bitaut
    Wally Bitaut

    Wally Bitaut

    VP Data Protection, HelpSystems

    Collapse This Item

  • IR Insights: What have we learned from IR teams in the first half of 2022? 2:40 pm

    Presented by Arctic Wolf Networks

    Join Arctic Wolf as we will discuss what we have learned from an Incident Response team in the first half of 2022. We will highlight the key trends of the first half of the year, overall threat trends we are seeing and gaps that exist in our current cyber security industry approach.

    Click to Expand

    Speakers:

    Christian Maneske
    Christian Maneske

    Christian Maneske

    Concierge Security Engineer 3 (CSE3), Arctic Wolf Networks

    Tim Dewaard
    Tim Dewaard

    Tim Dewaard

    Director of Engineering, Arctic Wolf Networks

    Collapse This Item

  • Keynote Presentation: John Felker 3:20 pm

    Cybersecurity Leadership Lessons, from Hawaii to Afghanistan

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Collapse This Item

  • Cyber Inter Agency Cooperation Panel 4:00 pm

    This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

     

    Click to Expand

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Chris Gabbard
    Chris Gabbard

    Chris Gabbard

    Cybersecurity Advisor, Region 5, CISA - Minneapolis

    James Branham
    James Branham

    James Branham

    Technical Staff Assistant, USSS

    Jacob Iverson
    Jacob Iverson

    Jacob Iverson

    SSA, Cyber Program Coordinator, FBI, Minneapolis

    Collapse This Item

  • Conference Closing Session 4:45 pm
  • Minneapolis Cybersecurity Conference Networking Reception & Happy Hour 5:00 pm
Partners Register