
Conference
Minneapolis
Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Minneapolis Cybersecurity Conference with thought leaders and luminaries face-to-face and gather insights on the latest trends and threats in cybersecurity.
These conferences gather IT professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities. Join us at the Minneapolis Cybersecurity Conference to earn CPE credits and enjoy a networking reception with peers!
Take a look at all Data Connectors has to offer here!
Date
Thu. Dec 01
-
Featured Speakers
Jason Newman
Protecting Against Cyber Attacks
Doug PloosterProtecting Against Cyber Attacks
Jeff ReckerProtecting Against Cyber Attacks
Brandon ReidProtecting Against Cyber Attacks
Ryan JamiesonProtecting Against Cyber Attacks
John KindervagWin the Cyber-War with Zero Trust
John FelkerCyber Inter Agency Cooperation Panel
Chris GabbardCyber Inter Agency Cooperation Panel
James BranhamCyber Inter Agency Cooperation Panel
Jacob IversonCyber Inter Agency Cooperation Panel
Event Schedule
Times for the Minneapolis Cybersecurity Conference are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, December 1st.
- Welcome to the Minneapolis Cybersecurity Conference
-
Managing Cloud Risk Without Slowing App Delivery 9:00 am
As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Jason Clark, Senior Cloud Engineer, will share our customers’ best practices for securing containers, Kubernetes and cloud services.
Speaker:
-
Battle of the Algorithms 9:20 am
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Cybersecurity executive Jason in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Speaker:
-
Level-Up Your Security Posture with a Virtual Security Assistant 10:05 am
New attack vectors arrive daily. If you are not actively monitoring and detecting threats inside your infrastructure (network, SaaS, Cloud), you open yourself up to risk and even liability. Add this to the pain of being overworked, short-staffed, and lacking budget, and you’ve got a recipe for disaster. Learn how to overcome these challenges, strengthen your security posture and breathe a little easier with a virtual security assistant platform.
Speaker:
-
Finding the Blind Spots 10:35 am
“How do I start a successful Insider Risk Program in my organization?”
Well, we like to start at the beginning: communication and speaking the same language. Without speaking the same language, there is no way to surface variables that are needed to help solve the most difficult problems: the unknown unknowns, or our blind spots.
Join us to learn how to build a shared vision of insider risk within your organization so you can focus your efforts clearly and prioritize how you want to manage risk.
Speaker:
-
Chutes and Ladders: How is Zero Trust Playing Out? 11:15 am
The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. In 2021, Cisco and Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. Within that study, we analyzed commonalities of organizations implementing and operating Zero Trust. This session will share how Zero Trust is working in the real world, and what the best of the best programs have in common.
Panel Participants:
-
Protecting Against Cyber Attacks 11:45 am
We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE. And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.
Panel Participants:
- Conference Lunch Break
-
Win the Cyber-War with Zero Trust 12:55 pm
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Speaker:
-
Immutable Storage: Level-Up Your Ransomware Readiness 2:00 pm
Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.
Speaker:
-
Data Protection - Addressing the "Perfect Storm" 2:20 pm
Fact: Threat Protection alone cannot provide Data Protection. In this session you will learn how a data-centric security approach can prevent data loss via: 1) data identification & classification, 2) data governance & control, 3) secure 3rd party collaboration, and 4) ransomware protection.
Speaker:
-
IR Insights: What have we learned from IR teams in the first half of 2022? 2:40 pm
Presented by Arctic Wolf Networks
Join Arctic Wolf as we will discuss what we have learned from an Incident Response team in the first half of 2022. We will highlight the key trends of the first half of the year, overall threat trends we are seeing and gaps that exist in our current cyber security industry approach.
Speakers:
-
Keynote Presentation: John Felker 3:20 pm
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
Cyber Inter Agency Cooperation Panel 4:00 pm
This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime. In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.
Moderator:
Panel Participants:
- Conference Closing Session 4:45 pm
- Minneapolis Cybersecurity Conference Networking Reception & Happy Hour 5:00 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners