• Featured Speakers

    Collapse This Item

Event Schedule

Times for the St. Louis Cybersecurity Conference are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, November 3rd.

  • Welcome to the St. Louis Cybersecurity Conference
  • Identity & Access Management: A Growing Need for Mid-Sized Organizations 9:30 am

    Presented by Tenfold

    Mid-market businesses today are faced with increasingly complex IT landscapes, rapidly evolving digital threats and growing pressure through privacy and security regulations. To protect their data and ensure appropriate access across various local and cloud services, medium-sized organizations more than ever depend on automated IAM solutions.

    However, common IAM products designed for an enterprise context have proven too large and complex to be used effectively: Their lengthy setup and massive scope exceed the needs and resources of medium-sized companies. Mid-market access management takes a more efficient approach to help organizations quickly regain control of users and data.

    In this session, you will learn:
    • What makes identity & access management a necessity for the mid-market
    • How IAM boosts security, productivity and compliance
    • What to look out for when choosing an IAM provider

    Click to Expand

    Speaker:

    Helmut Semmelmayer
    Helmut Semmelmayer

    Helmut Semmelmayer

    VP Revenue Operations at tenfold

    Collapse This Item

  • The Battle of the Algorithms 9:50 am

    Presented by Darktrace

    With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Chase in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.   

    Topic for this session– Autonomous Response – 

    • Explore today’s threats and challenges 
    • How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
    Click to Expand

    Speaker:

    Chase Goodwin
    Chase Goodwin

    Chase Goodwin

    Cyber Security Team Lead, Darktrace

    Collapse This Item

  • Level-Up Your Security Posture with a Virtual Security Assistant 10:35 am

    Presented by BitLyft

    New attack vectors arrive daily. If you are not actively monitoring and detecting threats inside your infrastructure (network, SaaS, Cloud), you open yourself up to risk and even liability. Add this to the pain of being overworked, short-staffed, and lacking budget, and you’ve got a recipe for disaster. Learn how to overcome these challenges, strengthen your security posture and breathe a little easier with a virtual security assistant platform.

    Click to Expand

    Speaker:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Collapse This Item

  • Protecting Against Cyber Attacks 11:05 am

    We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE.  And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Loren Barnett
    Loren Barnett

    Loren Barnett

    Cyber Security Strategist, Mimecast

    Volkan Erturk
    Volkan Erturk

    Volkan Erturk

    Co-Founder and CTO, Picus Security

    Neil Jones
    Neil Jones

    Neil Jones

    Director of Cybersecurity Evangelism, Egnyte

    Mike Brimberry
    Mike Brimberry

    Mike Brimberry

    Cybersecurity Director, Model Technology

    Collapse This Item

  • Conference Lunch Break
  • Keynote Presentation: Joye Purser 12:20 pm

    Cyberwars and the New Target: US Critical Infrastructure

    The explosion of ransomware and other cyber attacks have forever changed the strategic and business importance of the CISO. Dr. Joye Purser shares how and why the landscape has shifted, and what companies can do to better prepare for and respond to the inevitable cyber breach.

    Click to Expand

    Speaker:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Collapse This Item

  • Look the Enemy in Their Eyes 1:10 pm

    Presented by Redacted

    It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.

    Click to Expand

    Speaker:

    Craig Cleaves
    Craig Cleaves

    Craig Cleaves

    Cybersecurity Engineer, Redacted

    Collapse This Item

  • Keynote Speaker: George Finney 1:30 pm

    Project Zero Trust

    The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. Many organizations struggle with success when it comes to cybersecurity—not because they are doing nothing but because they don’t have a consistent strategy for protecting their data. Zero Trust is a strategy for protecting your organization’s most important assets. This strategy focuses on preventing breaches by eliminating one of your biggest blind spots when it comes to computers and computer networks—trust. Since Zero Trust focuses on a strategy of prevention, attendees will find opportunities to realize improvements in efficiency and reduced costs, in addition to increased security.

    Attendees will learn:

    • John Kindervag’s’ five-step methodology for implementing Zero Trust
    • How to limit the blast radius of a breach
    • Common myths and pitfalls when implementing Zero Trust
    • Actionable tactics for implementing Zero Trust for multiple protect surfaces
    Click to Expand

    Speaker:

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Collapse This Item

  • Inspecting Signals 2:35 pm

    Presented by Secureworks

    Your devices are talking. Whether it’s to each other or the world at large, IoT devices, computers, even satellites are all making noise….and bad actors could be listening. Trenton Ivey, the Director of Information Security Research with Secureworks Counter Threat Unit, will explain the physics of wireless technology, functional attacks against wireless devices, and even how to eavesdrop on live satellites!

    Click to Expand

    Speaker:

    Trenton Ivey
    Trenton Ivey

    Trenton Ivey

    Counter Threat Unit Researcher, Secureworks

    Collapse This Item

  • Keynote Presentation : Daniel Stiegman 2:55 pm

    Simplifying Insider Threats: An Insider Threat Framework

    Refusing to grant access requests can be difficult when senior employees are pressuring security staff for something they perceive they need — but often, when questioned, it is clear they only want access rather than needing it.

    In today’s climate of rampant credential compromise, this kind of caution can be crucial to limiting a company’s exposure to malware attacks — which increasingly take advantage of vestigial access privileges that employees and security staff may well have forgotten about.

    Sometimes it doesn’t even take that much effort. To solve decentralized efforts to investigate and gather intelligence information on insider threats, can prove difficult. To assist in gathering the information, this presentation will take some of the practices used in the Intelligence Community and realities when investigating malicious insider cyber threats. This framework shows analysts how they can properly and effectively gather that intelligence information.

    This framework shows users the key areas that investigators/ analysts should look at in determining an insider threat.

    Click to Expand

    Panel Participants:

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Manager, Threat Intelligence Group

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 3:25 pm

    This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

    Click to Expand

    Moderator:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Panel Participants:

    Derek Rieger
    Derek Rieger

    Derek Rieger

    Deputy Director of the St. Louis Fusion Center

    Brian Cockrill
    Brian Cockrill

    Brian Cockrill

    ATSAIC at USSS, St. Louis Field Office

    Christopher Cockburn
    Christopher Cockburn

    Christopher Cockburn

    Cybersecurity Advisor at CISA

    Mark Dargis
    Mark Dargis

    Mark Dargis

    ASAC at FBI

    Collapse This Item

  • Cyber Executive Panel 4:15 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Joye Purser
    Joye Purser

    Joye Purser

    CEO and Founder at eastbysouthsolutions.com

    Panel Participants:

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Manager, Threat Intelligence Group

    Zachary Lewis
    Zachary Lewis

    Zachary Lewis

    AVP IT and CISO, University of Health Sciences and Pharmacy

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Marie George
    Marie George

    Marie George

    CIO, MOHELA

    Collapse This Item

  • Conference Closing Session 4:55 pm
  • St. Louis Cybersecurity Conference Networking Reception & Happy Hour 5:00 pm
Partners Register