Austin Cybersecurity Conference

Thursday, December 4, 2025

Austin Southpark Hotel

PARKING/DIRECTIONS

Hybrid

4140 Governor's Row, Austin, Texas, 78744

Join Us in Austin for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

8:45 am

The Future of Cyber Security

Presentation

9:15 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Maarten Buis

Sr. Product Marketing Manager Contrast Security

Sponsored by

Presentation

9:45 am

Convergence of Network and Security

Bio

David Henning

Global Director Cybersecurity Operations Hughes, An EchoStar Company

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Future of SAT: Immersive Storytelling That Transforms Security Behavior

Traditional compliance training often fails to create real behavior change. This session introduces a next-generation approach to Security Awareness Training (SAT) that uses cinematic storytelling, immersive design, and neuroscience principles to build lasting security instincts. Through Locked Out, a motion-captured training experience built in Unreal Engine 5, attendees will see read more…

Traditional compliance training often fails to create real behavior change. This session introduces a next-generation approach to Security Awareness Training (SAT) that uses cinematic storytelling, immersive design, and neuroscience principles to build lasting security instincts. Through Locked Out, a motion-captured training experience built in Unreal Engine 5, attendees will see how emotion and atmosphere can make security lessons unforgettable. Learn how to evaluate your current SAT program and apply immersive techniques that transform knowledge into instinct.

Bio

Lee Martin

Senior Director, Product Management Cofense

Sponsored by

Presentation

11:15 am

A Governance-Driven Holistic Approach to Cybersecurity

Cybersecurity is no longer just a technical issue. It’s a core component of strategic business leadership and organizational resilience that must be embedded into the fabric of enterprise governance. This session explores how a governance-driven, holistic approach to cybersecurity empowers organizations to align security initiatives with business objectives, manage risk read more…

Cybersecurity is no longer just a technical issue. It’s a core component of strategic business leadership and organizational resilience that must be embedded into the fabric of enterprise governance. This session explores how a governance-driven, holistic approach to cybersecurity empowers organizations to align security initiatives with business objectives, manage risk proactively, and build resilience across all operational domains.

Attendees will gain insights into establishing executive accountability, defining clear roles and responsibilities, and integrating cybersecurity into strategic planning, compliance, and enterprise risk management frameworks. Real-world examples will illustrate how governance frameworks such as NIST CSF, ISO 27001, and CIS Controls can be leveraged not only to enhance security posture but to strengthen organizational decision-making and drive sustainable value.

Bio

Brett Price

Lead Cybersecurity Consultant, vCISO AccessIT Group

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

Keyboard Criminals – The human side of Cyber

Bio

Steve Lupo

Event Security Advisor, Chevron Retired FBI SWAT
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Cyber Defense Strategies For Earlier Detection and Faster Response

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

2:15 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Daniel LeRoy

Sales Engineer - Public Sector Sophos

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

When Policy Isn’t Enough: Enforcing zero trust before it’s too late.

Bio

Russell Dowdell

Senior Director of Product Management Imprivata

Sponsored by

Presentation

3:30 am

From input-handling flaws to crashables: Lessons from breaking LLM-based coding tools

Claude Code illustrates how LLM-based coding tools expand the attack surface. Design choices around approvals, parsing, and error handling can turn into security flaws. We present specific findings Kodem uncovered in Claude Code. Both issues highlight how LLM-based coding tools introduce new misconfiguration and input-handling risks. This talk dissects the read more…

Claude Code illustrates how LLM-based coding tools expand the attack surface. Design choices around approvals, parsing, and error handling can turn into security flaws. We present specific findings Kodem uncovered in Claude Code. Both issues highlight how LLM-based coding tools introduce new misconfiguration and input-handling risks. This talk dissects the issues, their broader implications for AI developer tools, and practical mitigations.

Bio

Mahesh Babu

CMO Kodem

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Brian Gardner Ph.D

Chief Information Security Officer City of Austin
Bio

John Abban Hanson

AVP – IT Audit & Data Analytics Randolph Brooks Federal Credit Union
Bio

Renaldo McKenzie

President Cyversity North Texas
Bio

Joshua Kuntz

Chief Information Security Officer | Executive Cybersecurity Leader and Speaker | Veteran VISTRADA
Bio

Dirce Eduardo Hernandez

Sr. Cybersecurity GRC Manager Raices Cyber
Bio

Oyefunke Fayoyin

Chief Information Security Officer Strike48
5:15 pm

Closing Remarks