Baltimore | Washington Cybersecurity Conference

Thursday, February 13, 2025

BWI Airport Marriott

Parking/Directions

Hybrid

Join Us in for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

BWI Airport Marriott

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Stacking Your Security: A Smarter Approach to Application Defense

Applications and websites are now prime targets for DDoS attacks, bot-driven abuse, and zero-day exploits. As threats grow more sophisticated and cheaper to launch, a single layer of security is no longer enough. In this session, we’ll walk through why a stacked security approach is essential—starting with DDoS protection at read more…

Applications and websites are now prime targets for DDoS attacks, bot-driven abuse, and zero-day exploits. As threats grow more sophisticated and cheaper to launch, a single layer of security is no longer enough.

In this session, we’ll walk through why a stacked security approach is essential—starting with DDoS protection at the edge, moving through web application firewalls and bot management, and closing with rate limiting and origin security. 

Bio

Ricardo “Rick” Fernandez

Senior Solutions Engineer, Enterprise Cloudflare

Sponsored by

Presentation

9:30 am

Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

Bio

Victor Cotorobai

Solution Architect ESET

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Convergence of Networking and Security

Bio

David Henning

Global Director Cybersecurity Operations Hughes

Sponsored by

Presentation

11:00 am

Exposing Risk Exposure Gaps

In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in read more…
In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in plain sight. However, the very areas we fail to recognize can provide valuable insights that threat actors can exploit to refine their attacks.
This session will focus on the often overlooked or hidden risk exposure gaps that adversaries leverage to gather intelligence on your organization. Through real-world examples, we will explore how threat actors identify and target these gaps to tailor their social engineering, phishing, and malware campaigns, ultimately working to breach your defenses. Attendees will gain actionable strategies to identify and mitigate these overlooked areas to help strengthen their organization’s security posture.
Bio

Josh Bartolomie

Chief Security Officer/VP, Global Threat Services Cofense

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

The Cost of a Data Breach – Financial and Reputational Risks

Bio

Anne Marie Zettlemoyer

Chief Security Officer | Fellow National Security Institute
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Using Threat-Informed Defense to Stop Boiling the Ocean

It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.

It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.

Bio

Frank Duff

Chief Innovation Officer & Co-founder Tidal Cyber

Sponsored by

Presentation

2:00 pm

From Crisis to Confidence: How Data Protection Can Enhance Your Incident Response and Recovery

Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add read more…
Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add yet another security tool.

Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. We will cover:

  • What typically occurs in each phase of a cyber attack
  • Common security coverage gaps in your data infrastructure
  • How to work better with your IT and backup teams
Bio

Marco Anthony

Senior System Engineer Druva

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Filling the Void in SecOps Tools with Cloud Context

As organizations migrate to the cloud, traditional security operations tools like EDR, SIEM, and XDR often fall short, as they are not designed to address the unique challenges and threats of cloud-native environments. Fragmented data, knowledge gaps, and tools designed for legacy and hybrid rather than cloud-native operations create weak read more…

As organizations migrate to the cloud, traditional security operations tools like EDR, SIEM, and XDR often fall short, as they are not designed to address the unique challenges and threats of cloud-native environments. Fragmented data, knowledge gaps, and tools designed for legacy and hybrid rather than cloud-native operations create weak points in threat detection and response. In this session, Stream.Security’s Samuel Galicia, Senior Solutions Architect, will discuss how to bridge these gaps by integrating cloud context into SecOps workflows. Learn how enriching existing tools with cloud context can equip your SOC to effectively combat today’s evolving threats – all while maintaining your security workflow, without the need for extensive retraining.

 

During this session, you will learn:

  • How cloud threats have significantly shifted today’s threat landscape, impacting modern security defenses
  • Practical methods to complement your existing security stack with cloud-native context, adapting to the cloud threats
  • How to integrate Cloud Detection & Response (CDR) seamlessly into your security workflows
Bio

Samuel Galicia

Senior Solutions Architect Stream Security

Sponsored by

Presentation

3:15 pm

Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch

Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever, correlated to the importance of the asset or its exposure to potential attack across the network. To have a real impact on lowering your risk of cyberattack, a modern vulnerability read more…

Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever, correlated to the importance of the asset or its exposure to potential attack across the network.

To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.

In this session, you will learn:

  • How your assets, networks, business, and security data visibility impacts vulnerability risk.
  • What scanners miss in discovery and prioritization, and how to fill the gaps.
  • How to reduce the scan-and-patch lag from weeks to hours.

Join Jessie Gibbons as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.

Bio

Jessie Gibbons

Technical Director Skybox Security

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Jessica Hoffman

Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Bio

Anne Marie Zettlemoyer

Chief Security Officer | Fellow National Security Institute
Bio

Nish Majmudar

VP & Chief Information Security Officer Mathematica
Bio

Dr. Kellep Charles

Director, Center for Cybersecurity Research and Analysis (CCRA) Chair, Cybersecurity Programs & Professor, Cybersecurity & Computer Science
Bio

Dr. Dele Bankole

CISO Consultant, Cybersecurity Programs NucoreVision
Bio

Jitendra Chandna

Chief Information Security Officer Maryland Department of Human Services
5:00 pm

Closing Remarks