Atlanta Cybersecurity Conference

Wednesday, November 5, 2025

Cobb Energy Performing Arts Centre

PARKING/DIRECTIONS

Hybrid

Join Us in Atlanta for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am
Bio

Daniel Lakier  

Cybersecurity Field CISO Myriad360

Sponsored by

Presentation

9:30 am

Shall I Certify You Sir?

Have you been tasked with obtaining a certification for your company?  Which one?  How?  What does this involve?  These questions and more will be answered so that you can gain support from your company and know which standard/frameworks are right for you.

Have you been tasked with obtaining a certification for your company?  Which one?  How?  What does this involve?  These questions and more will be answered so that you can gain support from your company and know which standard/frameworks are right for you.

Bio

Paige Needling

CEO Needling Worldwide

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

One Arrow, One Breach: The Medieval Mindset in Cyber Defense

In cybersecurity, the wisdom has often been likened to the defense strategies of medieval castles: every attack repelled. This talk, “One Arrow, One Breach,” challenges this notion, presenting a shift in approaching cybersecurity. Led by Kevin Johnson, this presentation delves into the antiquated belief that all attacks must be stopped read more…
In cybersecurity, the wisdom has often been likened to the defense strategies of medieval castles: every attack repelled. This talk, “One Arrow, One Breach,” challenges this notion, presenting a shift in approaching cybersecurity. Led by Kevin Johnson, this presentation delves into the antiquated belief that all attacks must be stopped to ensure security. Drawing parallels with medieval defense, Kevin argues for a strategic approach, emphasizing the importance of identifying and stopping the most critical threats rather than dispersing our resources across all points of attack.
Using real-world examples from his penetration testing experience, Kevin will demonstrate how this focused approach leads to more efficient use of resources and improved risk management. Attendees will gain insights into prioritizing threats and rethink their overall approach to cybersecurity.
Bio

Kevin Johnson

CEO Secure Ideas

Sponsored by

11:00 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.

This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Jason Adair

Vice President of Sales Contrast Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Elevating Your Security Program Through Business Enablement

Bio

James Azar

CISO, AP4 Group Host of The CyberHub Podcast, CISO Talk
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

1:30 pm

Current Risk Management

Presentation

2:00 pm

Identity Systems Security: The Key to Business Resilience

Microsoft Active Directory (AD) is a primary target for cyberattackers, making AD defense and recovery non-negotiable practices for a secure and resilient business. Join Chris Ingle (Semperis Senior Solutions Architect) to discover how threat actors breach AD and Entra ID environments and why planning for hybrid AD security and recovery is vital to operational resilience. You’ll read more…

Microsoft Active Directory (AD) is a primary target for cyberattackers, making AD defense and recovery non-negotiable practices for a secure and resilient business. Join Chris Ingle (Semperis Senior Solutions Architect) to discover how threat actors breach AD and Entra ID environments and why planning for hybrid AD security and recovery is vital to operational resilience. You’ll learn:

  • How to detect vulnerabilities in hybrid AD environments
  • The difficulty of executing an effective AD recovery plan
  • How to ensure a fast, clean AD forest recovery after a cyberattack
Bio

Chris Ingle

Senior Solutions Architect Semperis

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

2:45 pm

Defending Against Data Breaches

Presentation

3:15 pm

Going Unnoticed Protecting Sensitive Data Accessed via APIs and LLMs

APIs and Large Language Models (LLMs) are transforming digital operations but also expanding the attack surface for cyber threats. As organizations integrate AI and interconnected applications, risks such as data leakage, prompt injection, and model poisoning rise sharply. This session explores the evolving security landscape, highlighting real-world attack vectors and read more…

APIs and Large Language Models (LLMs) are transforming digital operations but also expanding the attack surface for cyber threats. As organizations integrate AI and interconnected applications, risks such as data leakage, prompt injection, and model poisoning rise sharply. This session explores the evolving security landscape, highlighting real-world attack vectors and the OWASP threats to GenAI and APIs. It emphasizes a multi-layered defense strategy—combining API security, data protection, and AI threat mitigation—to prevent data breaches, protect sensitive information, and maintain trust in AI-driven systems.

Bio

Mike Watson

Principal Sales Engineer Thales

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

James Azar

CISO, AP4 Group Host of The CyberHub Podcast, CISO Talk
Bio

Naresh Yelkoti

Sr. Information Security Engineer U.S. Bank
Bio

Kenneth Foster

Chief Information Security Officer Candescent
Bio

Luis Valenzuela

Director, Data Governance and Data Loss Prevention InComm Payments
Bio

Hussein Mereby

Chief Cyber Engineer SAIC
Bio

Kristen Ellis

Chief Information Security Officer NASCO
5:00 pm

Closing Remarks