Atlanta Cybersecurity Conference
Wednesday, November 5, 2025
Cobb Energy Performing Arts Centre
Hybrid
Join Us in Atlanta for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Keynote Speaker
“Elevating Your Security Program Through Business Enablement ”
James Azar
CISO, AP4 Group Host of The CyberHub Podcast, CISO Talk
James Azar is a CISO that works, leads, and is dedicated to the security and business mission to ensure the continuity and fluidity of cybersecurity within the business. In his experience, James has served as CTO, CIO, and CISO but his passion is the intersection of Security and Business where innovation and out of box thinking are needed to succeed.
James is the host of The CyberHub Podcast, CISO Talk, and a new and noteworthy privacy podcast called Goodbye Privacy.
James is a public speaker and event host that hosts the annual CyberHub Summit in Atlanta and has spoken in events across the globe from CyberTech Israel, RSA, and has been published in Fox, OAN, AJC, ABC, and many more publications
James has served on the Board of Advisors for the NTSC and currently serves as Vice President of Programming for AFCEA Atlanta Chapter, IAC (Israeli American Council) Eitanim Mentor, and works with the Veteran community as well as supports several Non-Profits.
James enjoys multiple espressos a day, chasing down a steak with Whiskey, Bourbon, or scotch.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
James Azar
CISO, AP4 Group Host of The CyberHub Podcast, CISO Talk
Naresh Yelkoti
Sr. Information Security Engineer U.S. Bank
Kenneth Foster
Chief Information Security Officer Candescent
Luis Valenzuela
Director, Data Governance and Data Loss Prevention InComm Payments
Hussein Mereby
Chief Cyber Engineer SAIC
Kristen Ellis
Chief Information Security Officer NASCO
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Shall I Certify You Sir?
Have you been tasked with obtaining a certification for your company? Which one? How? What does this involve? These questions and more will be answered so that you can gain support from your company and know which standard/frameworks are right for you.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
One Arrow, One Breach: The Medieval Mindset in Cyber Defense
Sponsored by
Rebuild Your Software Security Program from the Breach Up
Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.
This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Elevating Your Security Program Through Business Enablement
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Current Risk Management
Presentation
Identity Systems Security: The Key to Business Resilience
Microsoft Active Directory (AD) is a primary target for cyberattackers, making AD defense and recovery non-negotiable practices for a secure and resilient business. Join Chris Ingle (Semperis Senior Solutions Architect) to discover how threat actors breach AD and Entra ID environments and why planning for hybrid AD security and recovery is vital to operational resilience. You’ll learn:
- How to detect vulnerabilities in hybrid AD environments
- The difficulty of executing an effective AD recovery plan
- How to ensure a fast, clean AD forest recovery after a cyberattack
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Defending Against Data Breaches
Presentation
Going Unnoticed Protecting Sensitive Data Accessed via APIs and LLMs
APIs and Large Language Models (LLMs) are transforming digital operations but also expanding the attack surface for cyber threats. As organizations integrate AI and interconnected applications, risks such as data leakage, prompt injection, and model poisoning rise sharply. This session explores the evolving security landscape, highlighting real-world attack vectors and the OWASP threats to GenAI and APIs. It emphasizes a multi-layered defense strategy—combining API security, data protection, and AI threat mitigation—to prevent data breaches, protect sensitive information, and maintain trust in AI-driven systems.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!