Charlotte Cybersecurity Conference

Thursday, September 4, 2025

Charlotte Marriott City Center

PARKING/DIRECTIONS

Hybrid

Join Us in Charlotte for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

As if Shadow AI isn't scary enough...

While the prevalence of Shadow AI continues to increase and pose new challenges for security teams, there is a deeper, darker threat hiding within the shadows of the shadows – threatening to undermine and circumvent all of the good work we’re doing to get AI under control.  In this session, read more…

While the prevalence of Shadow AI continues to increase and pose new challenges for security teams, there is a deeper, darker threat hiding within the shadows of the shadows – threatening to undermine and circumvent all of the good work we’re doing to get AI under control.  In this session, we’ll look at how these threats have evolved, share examples to illustrate the challenges they pose, and share practices to successfully combat them.

Bio

Eric Anderson

Cybersecurity Architect, Instructor, and Evangelist Atlantic Data Security
Bio

Carl Wasko

Solutions Engineer Netskope

Sponsored by

Presentation

9:30 am

Securing the Future: Cyber Risk Essentials in an Ai-Driven Digital Landscape

As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and align read more…

As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and align insurance with evolving risks to safeguard your organization.

Bio

Victor Cotorobai

Solution Architect ESET

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.

In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Randy Moline

Director of Customer Education & Training Contrast Security

Sponsored by

Presentation

11:00 am

Convergence of Networking and Security

As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern read more…

As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls. With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks.

Bio

David Henning

Global Director Cybersecurity Operations Hughes

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Evolution on the role of CISO in the age of AI

Bio

John Opala, PhD

VP & Global Chief Information Security Officer Hanesbrands Inc.
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Resistance is Futile: How AI Assimilated Custom Exploit Development

Most cybersecurity executives think they understand AI’s impact on their threat profile—automated scanners, intelligent reports, enhanced SOC capabilities. They’re missing the real revolution. AI isn’t just automating existing security tools; it’s democratizing custom exploit development that was previously limited to nation-state actors and elite criminal groups. Through a real-world penetration read more…

Most cybersecurity executives think they understand AI’s impact on their threat profile—automated scanners, intelligent reports, enhanced SOC capabilities. They’re missing the real revolution. AI isn’t just automating existing security tools; it’s democratizing custom exploit development that was previously limited to nation-state actors and elite criminal groups.

Through a real-world penetration testing case study, this presentation reveals how AI has fundamentally eliminated the technical barriers that have long protected proprietary systems and custom protocols through security through obscurity. More critically, it demonstrates why every “accepted risk” in your risk register that relies on attack complexity as a mitigating factor requires immediate re-evaluation. Attendees will leave with insights for updating their risk frameworks to address a threat landscape where complexity no longer provides meaningful protection.

Bio

Jason Gillam

CIO Secure Ideas

Sponsored by

Presentation

2:00 pm

Navigating the Modern Threat Landscape: Key Insights from the Microsoft Digital Defense Report

The cyber threat landscape is evolving at an unprecedented pace, driven by the convergence of nation-state and criminal actors, the rise of AI-enabled threats, and the growing sophistication of ransomware and fraud campaigns. This session distills key findings from the Microsoft Digital Defense Report, offering a strategic overview of the read more…

The cyber threat landscape is evolving at an unprecedented pace, driven by the convergence of nation-state and criminal actors, the rise of AI-enabled threats, and the growing sophistication of ransomware and fraud campaigns. This session distills key findings from the Microsoft Digital Defense Report, offering a strategic overview of the most pressing cybersecurity challenges facing organizations today.

Bio

Jim Moeller

Director Cybersecurity Response Engineering Microsoft

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Securing Data in the GenAI Era

Generative AI has ushered in a new era of data creation, processing, and consumption, presenting both innovative opportunities and substantial security risks. The emergence of shadow AI (unauthorized or unmanaged AI tools) and the persistence of dark data (unmonitored and unsecured information) are key challenges in this landscape. Consequently, organizations read more…

Generative AI has ushered in a new era of data creation, processing, and consumption, presenting both innovative opportunities and substantial security risks. The emergence of shadow AI (unauthorized or unmanaged AI tools) and the persistence of dark data (unmonitored and unsecured information) are key challenges in this landscape. Consequently, organizations must adapt their data security strategies. This session explores how modern data security solutions are evolving to address these emerging threats.

Bio

Brian Mathews

Principal Solutions Engineer Cyberhaven

Sponsored by

Presentation

3:15 pm

Cybersecurity using the Ultimate Threat Intelligence

Bio

Errin Fulp

Professor of Computer Science Wake Forest University

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices

Bio

Rick Doten

CISO | Executive Board Advisor, AI Governance and Ethics
Bio

Katie Cipkala

AVP | Information Security LPL Financial
Bio

Frank DePaola

Vice President, Chief Information Security Officer Enpro
Bio

John Opala, PhD

VP & Global Chief Information Security Officer Hanesbrands Inc.
5:00 pm

Closing Remarks