Charlotte Cybersecurity Conference
Thursday, September 4, 2025
Charlotte Marriott City Center
Hybrid








































Join Us in Charlotte for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Evolution on the role of CISO in the age of AI”
John Opala, PhD
VP & Global Chief Information Security Officer Hanesbrands Inc.
A Cyber security executive with 19 years of experience in Information Technology (IT) specializing in IT
management, IT infrastructure engineering, IT security management, and enterprise security architecture.
Defined and delivered cyber security strategy for security engineering, identity and access management (IDM), cloud security, operation technology (OT), IoT and cyber security operation center (CSOC). Performed evaluations and selection of cyber security tools and successfully implemented them to provide optimal security and risk controls for critical business information systems. Prepared and presented cyber security risk posture and enhancements on quarterly basis.
CISO/Industry Leader Panel
Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices


Sponsors
Platinum Sponsors


Gold Sponsors






Silver Sponsors



























Partner







“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
As if Shadow AI isn't scary enough...
While the prevalence of Shadow AI continues to increase and pose new challenges for security teams, there is a deeper, darker threat hiding within the shadows of the shadows – threatening to undermine and circumvent all of the good work we’re doing to get AI under control. In this session, we’ll look at how these threats have evolved, share examples to illustrate the challenges they pose, and share practices to successfully combat them.
Sponsored by

Presentation
Securing the Future: Cyber Risk Essentials in an Ai-Driven Digital Landscape
As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and align insurance with evolving risks to safeguard your organization.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Rebuild Your Software Security Program from the Breach Up
Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by

Presentation
Convergence of Networking and Security
As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls. With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Evolution on the role of CISO in the age of AI
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Resistance is Futile: How AI Assimilated Custom Exploit Development
Most cybersecurity executives think they understand AI’s impact on their threat profile—automated scanners, intelligent reports, enhanced SOC capabilities. They’re missing the real revolution. AI isn’t just automating existing security tools; it’s democratizing custom exploit development that was previously limited to nation-state actors and elite criminal groups.
Through a real-world penetration testing case study, this presentation reveals how AI has fundamentally eliminated the technical barriers that have long protected proprietary systems and custom protocols through security through obscurity. More critically, it demonstrates why every “accepted risk” in your risk register that relies on attack complexity as a mitigating factor requires immediate re-evaluation. Attendees will leave with insights for updating their risk frameworks to address a threat landscape where complexity no longer provides meaningful protection.
Sponsored by

Presentation
Navigating the Modern Threat Landscape: Key Insights from the Microsoft Digital Defense Report
The cyber threat landscape is evolving at an unprecedented pace, driven by the convergence of nation-state and criminal actors, the rise of AI-enabled threats, and the growing sophistication of ransomware and fraud campaigns. This session distills key findings from the Microsoft Digital Defense Report, offering a strategic overview of the most pressing cybersecurity challenges facing organizations today.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Securing Data in the GenAI Era
Generative AI has ushered in a new era of data creation, processing, and consumption, presenting both innovative opportunities and substantial security risks. The emergence of shadow AI (unauthorized or unmanaged AI tools) and the persistence of dark data (unmonitored and unsecured information) are key challenges in this landscape. Consequently, organizations must adapt their data security strategies. This session explores how modern data security solutions are evolving to address these emerging threats.
Sponsored by

Presentation
Cybersecurity using the Ultimate Threat Intelligence
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!