St. Louis Cybersecurity Conference

  • Conference

Come together with fellow cybersecurity professionals at the St. Louis Cybersecurity Conference, your gateway to gathering invaluable insights for skillfully navigating the ever-evolving landscape of cyber threats in 2024. Immerse yourself in the knowledge shared by industry experts and influential leaders, while engaging directly with representatives from top-tier global providers of cybersecurity solutions.

Embrace the St. Louis Cybersecurity Conference as your opportunity to connect with peers and industry specialists, all in a vibrant in-person setting. The dynamic discussions will traverse an array of topics, spanning from emerging cybersecurity challenges to ingenious strategies aimed at fortifying your organization against the prowess of advanced threat actors.

Discover the full spectrum of tailored offerings provided by Data Connectors, curated exclusively for the St. Louis Cybersecurity Conference, right here!

Admission is $150 (without a promo code), which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 09:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:00 AM to 09:30 AM
Tales from the Trenches: Advancing Security Operations with SOAR
General Sessions
Michael McGinnis
Director of Solution Engineering at Devo
Add to Calendar 04/25/2024 09:00 AM 04/25/2024 09:30 AM Tales from the Trenches: Advancing Security Operations with SOAR

The biggest issue facing enterprise security operations is the deficit of available, affordable, and experienced cyber security professionals. SOAR & SIEM are touted as the answer. In this session, Michael McGinnis, Director of Solution Engineering, walks through real-life (but anonymized) experiences from our featured customers, showing how AI-driven SOAR solves the experience and availability issues, maximizing analyst efficiency, reducing the burden of threat investigations and validation, through task and decision automation. 

Leveraging insights from customer deployments, this talk will include: 

  • Advanced Threat Detection: Learn how security teams can facilitate the creation of sophisticated models that identify subtle patterns and anomalies within massive datasets, enabling early detection of potential threats.
  • Real-time Incident Response: Observe how AI-driven analytics expedite incident response by correlating disparate data sources, automating investigations, and delivering actionable real-time insights.
  • Predictive Insights: Learn how analysts are empowered to forecast potential vulnerabilities and security gaps, enabling proactive mitigation strategies to reduce risk.
  • Operational Efficiency: Discover how security teams can leverage AI and ML to streamline workflows to focus on strategic initiatives rather than routine tasks.
  • Adaptation and Evolution: Find out how AI and ML continually learn from new data, ensuring that defenses evolve alongside emerging threats.

The biggest issue facing enterprise security operations is the deficit of available, affordable, and experienced cyber security professionals. SOAR & SIEM are touted as the answer. In this session, Michael McGinnis, Director of Solution Engineering, walks through real-life (but anonymized) experiences from our featured customers, showing how AI-driven SOAR solves the experience and availability issues, maximizing analyst efficiency, reducing the burden of threat investigations and validation, through task and decision automation. 

Leveraging insights from customer deployments, this talk will include: 

  • Advanced Threat Detection: Learn how security teams can facilitate the creation of sophisticated models that identify subtle patterns and anomalies within massive datasets, enabling early detection of potential threats.
  • Real-time Incident Response: Observe how AI-driven analytics expedite incident response by correlating disparate data sources, automating investigations, and delivering actionable real-time insights.
  • Predictive Insights: Learn how analysts are empowered to forecast potential vulnerabilities and security gaps, enabling proactive mitigation strategies to reduce risk.
  • Operational Efficiency: Discover how security teams can leverage AI and ML to streamline workflows to focus on strategic initiatives rather than routine tasks.
  • Adaptation and Evolution: Find out how AI and ML continually learn from new data, ensuring that defenses evolve alongside emerging threats.
09:30 AM to 10:00 AM
Tackling Myths in Cybersecurity
General Sessions
Merlin Namuth
Director of Advisory Services at Lodestone
Add to Calendar 04/25/2024 09:30 AM 04/25/2024 10:00 AM Tackling Myths in Cybersecurity

People in the cybersecurity industry have various skills and experience. One’s experiences and perceptions might be fact in one environment, but may not be across the industry. In this presentation I address some of the common notions and whether they are truth, myth or maybe.

People in the cybersecurity industry have various skills and experience. One’s experiences and perceptions might be fact in one environment, but may not be across the industry. In this presentation I address some of the common notions and whether they are truth, myth or maybe.

10:00 AM to 10:20 AM
Enhancing the defense against cyberattacks with threat intelligence and human expertise
General Sessions
Tony Anscombe
Chief Security Evangelist at ESET
Add to Calendar 04/25/2024 10:00 AM 04/25/2024 10:20 AM Enhancing the defense against cyberattacks with threat intelligence and human expertise

The cybersecurity environment becomes considerably more challenging for cyber defenders when the trade in discovered, but undisclosed, vulnerabilities are added into the picture, driving more zero-day incidents. 

This presentation will explore some of the evolving trends in the threat landscape, and the trade of vulnerabilities, that make cyberthreat intelligence an essential layer of a prevention first defense in an organization’s cybersecurity posture. While technology, and the use of AI, has helped to automate cyber defense it is imperative that this is coupled with human expertise. 

It is critical that organizations understand the risk and dangers of advanced and zero-day threats and adapt accordingly to enhance cybersecurity defenses.

The cybersecurity environment becomes considerably more challenging for cyber defenders when the trade in discovered, but undisclosed, vulnerabilities are added into the picture, driving more zero-day incidents. 

This presentation will explore some of the evolving trends in the threat landscape, and the trade of vulnerabilities, that make cyberthreat intelligence an essential layer of a prevention first defense in an organization’s cybersecurity posture. While technology, and the use of AI, has helped to automate cyber defense it is imperative that this is coupled with human expertise. 

It is critical that organizations understand the risk and dangers of advanced and zero-day threats and adapt accordingly to enhance cybersecurity defenses.

10:45 AM to 11:15 AM
Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power
General Sessions
event-simple-logo
Ed Adams
President & CEO of Security Innovation
Add to Calendar 04/25/2024 10:45 AM 04/25/2024 11:15 AM Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams

 

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams

 

11:15 AM to 11:35 AM
AI-Driven Application Security Enforcement
General Sessions
Michael Stewart
Director - Advanced CyberSecurity Technology Team at Array Networks
Add to Calendar 04/25/2024 11:15 AM 04/25/2024 11:35 AM AI-Driven Application Security Enforcement

Information Security Enforcement (ISE) is a 4th generation Data Leak Prevention (DLP) solution that enables automated, comprehensive protection against malicious theft and inadvertent disclosure of confidential information. Whether deployed on-prem or in the cloud, ISE addresses critical gaps affecting typical DLP solutions and greatly simplifies implementation and management of data protection.

Information Security Enforcement (ISE) is a 4th generation Data Leak Prevention (DLP) solution that enables automated, comprehensive protection against malicious theft and inadvertent disclosure of confidential information. Whether deployed on-prem or in the cloud, ISE addresses critical gaps affecting typical DLP solutions and greatly simplifies implementation and management of data protection.

11:35 AM to 12:05 PM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Jason Walker
Global Practice Leader - MDP & Security at Pure Storage
Merlin Namuth
Director of Advisory at Lodestone
Anthony Leniuk
Solutions Architect at eSentire
Craig Terell
CIO/CTO at ProStratus
12:10 PM to 12:40 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:40 PM to 01:10 PM
Keynote Presentation: Remote Double Agents: Identifying North Korean IT Workers
General Sessions
event-simple-logo
Brian Jackson
Acting Supervisory Special Agent at FBI St. Louis
Add to Calendar 04/25/2024 12:40 PM 04/25/2024 01:10 PM America/Los_Angeles Keynote Presentation: Remote Double Agents: Identifying North Korean IT Workers

Threat briefing on North Korean remote IT workers.

 

Location of the event

Threat briefing on North Korean remote IT workers.

 

01:35 PM to 02:05 PM
Keynote Presentation: Securing the Nation's Critical Infrastructure
General Sessions
event-simple-logo
Chris Cockburn
Cybersecurity Advisor, Region 7 (IA, KS, MO & NE) at CISA
Add to Calendar 04/25/2024 01:35 PM 04/25/2024 02:05 PM America/Los_Angeles Keynote Presentation: Securing the Nation's Critical Infrastructure

This session will provide an overview of the Cybersecurity and Infrastructure Security Agency (CISA), the free, non-regulatory services provided to all 16 Critical Infrastructure Sectors, and an overview of CISA’s Secure by Design initiative.  As America’s Cyber Defense Agency, CISA is charged with defending our nation against ever-evolving cyber threats and to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day.  It’s time to build cybersecurity into the design and manufacture of technology products. 

Location of the event

This session will provide an overview of the Cybersecurity and Infrastructure Security Agency (CISA), the free, non-regulatory services provided to all 16 Critical Infrastructure Sectors, and an overview of CISA’s Secure by Design initiative.  As America’s Cyber Defense Agency, CISA is charged with defending our nation against ever-evolving cyber threats and to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day.  It’s time to build cybersecurity into the design and manufacture of technology products. 

02:05 PM to 02:35 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
MODERATOR - Chris Cockburn
Cybersecurity Advisor, Region 7 (IA, KS, MO & NE) at CISA
Brian Cockrill
Assistant to the Special Agent in Charge at Department of Homeland Security
Madison Miller
Cybersecurity Specialist at Missouri Department of Public Safety
Jeffrey M. Othic
Supervisory Special Agent at Dept. of Homeland Security, HSI
Brian Jackson
Acting Supervisory Special Agent at FBI St. Louis
02:55 PM to 03:25 PM
Cybersecurity in the U.S. Marine Transportation System
General Sessions
event-simple-logo
James Kearns - MODERATOR
Special Counsel at Jones Walker LLP
Tyson B. Sigette
Maritime Cybersecurity at Coast Guard Sector Upper Mississippi River
Aimee Andres
Executive Director at Inland Rivers, Ports & Terminals, Inc
Dennis Wilmsmeyer
Executive Director at America’s Central Port District
03:40 PM to 04:10 PM
Cyber Executive Roundtable
General Sessions
Edward Liebig
Global Director Cyber Ecosystem at Hexagon AB
Jericho Simmons
Chief Information Security Officer at Sound Physicians
Aimee Andres
Executive Director at IRPT
Roftiel Constantine
Chief Information Security Officer at Berry-Wehmiller
Jim Cook
COO at Velta Technology
Derek Rieger
Chief Security Officer at KNOWiNK
04:10 PM to 05:15 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.
04:10 PM to 05:15 PM
Book Signing / Ed Adams: See Yourself in Cyber
General Session
See Yourself in Cyber
Ed Adams
President & CEO of Security Innovation
Add to Calendar 04/25/2024 04:10 PM 04/25/2024 05:15 PM America/Los_Angeles Book Signing / Ed Adams: See Yourself in Cyber

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

Location of the event

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.