Baltimore | Washington Cybersecurity Conference
Thursday, February 13, 2025
Hybrid























Join Us in for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“The Cost of a Data Breach – Financial and Reputational Risks”
Anne Marie Zettlemoyer
Chief Security Officer | Fellow National Security Institute
Anne Marie Zettlemoyer is a senior security executive with over 20 years of experience in 8 industries. Sitting at the intersection of business, security, and analytics, Anne Marie has served as a trusted advisor for Fortune 500 companies, government agencies, law enforcement, security vendors, and think tanks. She is a Vice President of Security Engineering and Business Security Officer at Mastercard, a visiting National Security Institute Fellow at GMU’s Scalia Law School, and has held a number of strategic and technical security leadership roles including the Head of Security Architecture, Engineering, and Solutions at Freddie Mac, Director of the Cyber Think Tank at Capital One, Director of Business Analytics at FireEye, and Special Advisor for the Director of the US Secret Service. She has served on the board of directors and advisors for security companies and non profits, and advocated for security policies and improvements on Capitol Hill. In addition to CISSP and CeH certifications, Anne Marie holds an MBA from the University of Michigan-Ann Arbor as well as undergraduate degrees in both Accounting and Finance.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Jessica Hoffman
Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Anne Marie Zettlemoyer
Chief Security Officer | Fellow National Security Institute
Nish Majmudar
VP & Chief Information Security Officer Mathematica
Dr. Kellep Charles
Director, Center for Cybersecurity Research and Analysis (CCRA) Chair, Cybersecurity Programs & Professor, Cybersecurity & Computer Science
Dr. Dele Bankole
CISO Consultant, Cybersecurity Programs NucoreVision
Jitendra Chandna
Chief Information Security Officer Maryland Department of Human Services


Sponsors
Platinum Sponsors



Gold Sponsors





Silver Sponsors










Partner







“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
BWI Airport Marriott
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Stacking Your Security: A Smarter Approach to Application Defense
Applications and websites are now prime targets for DDoS attacks, bot-driven abuse, and zero-day exploits. As threats grow more sophisticated and cheaper to launch, a single layer of security is no longer enough.
In this session, we’ll walk through why a stacked security approach is essential—starting with DDoS protection at the edge, moving through web application firewalls and bot management, and closing with rate limiting and origin security.
Sponsored by

Presentation
Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Convergence of Networking and Security
Sponsored by

Presentation
Exposing Risk Exposure Gaps
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
The Cost of a Data Breach – Financial and Reputational Risks
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Using Threat-Informed Defense to Stop Boiling the Ocean
It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.
Sponsored by

Presentation
From Crisis to Confidence: How Data Protection Can Enhance Your Incident Response and Recovery
Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. We will cover:
- What typically occurs in each phase of a cyber attack
- Common security coverage gaps in your data infrastructure
- How to work better with your IT and backup teams
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Filling the Void in SecOps Tools with Cloud Context
As organizations migrate to the cloud, traditional security operations tools like EDR, SIEM, and XDR often fall short, as they are not designed to address the unique challenges and threats of cloud-native environments. Fragmented data, knowledge gaps, and tools designed for legacy and hybrid rather than cloud-native operations create weak points in threat detection and response. In this session, Stream.Security’s Samuel Galicia, Senior Solutions Architect, will discuss how to bridge these gaps by integrating cloud context into SecOps workflows. Learn how enriching existing tools with cloud context can equip your SOC to effectively combat today’s evolving threats – all while maintaining your security workflow, without the need for extensive retraining.
During this session, you will learn:
- How cloud threats have significantly shifted today’s threat landscape, impacting modern security defenses
- Practical methods to complement your existing security stack with cloud-native context, adapting to the cloud threats
- How to integrate Cloud Detection & Response (CDR) seamlessly into your security workflows
Sponsored by

Presentation
Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch
Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever, correlated to the importance of the asset or its exposure to potential attack across the network.
To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.
In this session, you will learn:
- How your assets, networks, business, and security data visibility impacts vulnerability risk.
- What scanners miss in discovery and prioritization, and how to fill the gaps.
- How to reduce the scan-and-patch lag from weeks to hours.
Join Jessie Gibbons as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!