Chicago Cybersecurity Conference

Thursday, January 29, 2026

Chicago Marriott Oak Brook

PARKING/DIRECTIONS

Hybrid

1401 West 22nd Street, Oak Brook, Illinois, USA, 60523

Join Us in Chicago for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

8:45 am

Current Security Operations

Presentation

9:15 am

The AI Genie Is Already Out of the Bottle- Now What?

AI adoption is happening faster than most organizations expected and often outside of formal approval processes. Employees are using AI tools to get work done, while security teams struggle to understand where data is going and what actually creates risk. In this session, Mariana Padilla shares insights from an analysis read more…
AI adoption is happening faster than most organizations expected and often outside of formal approval processes. Employees are using AI tools to get work done, while security teams struggle to understand where data is going and what actually creates risk.

In this session, Mariana Padilla shares insights from an analysis of 22 million enterprise AI prompts, highlighting where sensitive data exposure really occurs and why common responses like blanket blocking often fail. Attendees will learn how security leaders can regain visibility, focus on the risks that matter most, and support responsible AI use without disrupting productivity.

Bio

Mariana Padilla

Community Evangelist Harmonic Security

Sponsored by

Presentation

9:45 am

Why AI Can’t Fix Your Cyber Risk (and Might Be Making It Worse)

Since the release of ChatGPT 3.5 in 2022, AI (artificial intelligence) has become the default answer to almost every cybersecurity problem—including risk assessments. AI and large language models (LLM) can generate polished, confident-looking risk analyses in seconds. The problem? Confidence is not competence, and speed is not accountability. When used as read more…

Since the release of ChatGPT 3.5 in 2022, AI (artificial intelligence) has become the default answer to almost every cybersecurity problem—including risk assessments. AI and large language models (LLM) can generate polished, confident-looking risk analyses in seconds. The problem? Confidence is not competence, and speed is not accountability. When used as a substitute for human judgment, AI-driven risk assessments can obscure real exposure, misrepresent priorities, and create a dangerous illusion of control.

In this session, Chris Cronin will demonstrate why AI is fundamentally incapable of managing cybersecurity risk on its own—and how overreliance on AI can actually increase organizational risk. Attendees will see where AI outputs break down, why “AI-generated” does not mean “defensible,” and how regulators, auditors, and courts still expect human decision-making grounded in reasonableness.

Chris Cronin, creator of the Duty of Care Risk Analysis (DoCRA) Standard, has advised governments, courts, Fortune 100 companies, and startups on cybersecurity risk analysis and regulatory compliance. His work centers on helping organizations make risk decisions that can be explained, justified, and defended—not just automated.

Chris will reveal the simple rule Reasonable Risk uses to decide when AI belongs in their SaaS platform—and when it absolutely does not. Attendees will leave with a clear framework for using AI as a supporting tool rather than a decision-maker, and a practical understanding of how DoCRA principles are shaping AI, cybersecurity, and privacy laws around the world.

Bio

Chris Cronin

Partner HALOCK Security Labs

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

Join Matt Moss, Senior Sales Engineer at ESET, to learn about cyber risk insurance essentials in an AI-driven digital landscape!  During this session, Matt Moss will speak to the current cybersecurity landscape and explain the reasoning behind cybersecurity risk insurance.  Matt will also speak about AI’s impact on the threat read more…

Join Matt Moss, Senior Sales Engineer at ESET, to learn about cyber risk insurance essentials in an AI-driven digital landscape!  During this session, Matt Moss will speak to the current cybersecurity landscape and explain the reasoning behind cybersecurity risk insurance.  Matt will also speak about AI’s impact on the threat landscape, to include how AI can be leveraged to bolster a proactive and adaptive defense strategy.  This is your opportunity to learn more about cyber risk insurance and why it is so important for organizations of all sizes!

Bio

Matt Moss

Senior Solution Architect ESET

Sponsored by

11:15 am

Cyber Security Fundamentals

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

From Case Files to Firewalls and Encryption: What a Former Social Worker Knows About Security and Privacy

Bio

Karen Habercoss

Vice President, Chief Information Security and Privacy Officer | Board Member | Expert Witness UChicago Medicine
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

Automated Status Quo: The signal to noise crisis and how AI can change nothing and everything about detection.

Cyber teams are drowning in a sea of alerts and false positives. AI promises to resolve this, but it also enables attackers to generate massive amounts of unique noise to hide their true intentions. The real battle isn’t about creating more detections, it’s about refining detection logic and creating better read more…

Cyber teams are drowning in a sea of alerts and false positives. AI promises to resolve this, but it also enables attackers to generate massive amounts of unique noise to hide their true intentions. The real battle isn’t about creating more detections, it’s about refining detection logic and creating better detections. The art of maintaining signal fidelity in an environment underwater from AI amplified noise. Learn about the truth of using AI as a solution and exploring AI as a vector for a new class of attacks that exploit our reliance on automated decision making and new threat intelligence examples of AI success and failures.

Bio

Christopher Fielder

Field CTO Arctic Wolf

Sponsored by

Presentation

2:15 pm

The End of Legacy Network Security

The End of Legacy Network Security, by Todd Ellison, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates read more…

The End of Legacy Network Security, by Todd Ellison, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.

Bio

Todd Ellison

Director of Solution Architects Nile

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Survival Guide to Cyber Threats: Anatomy of an Attacker’s Kill Chain and How to Stop It

Taking a real-world cybersecurity attack, we’ll step through how the attack unfolds and present specifics on tactics and tools to combat the threat.
Taking a real-world cybersecurity attack, we’ll step through how the attack unfolds and present specifics on tactics and tools to combat the threat.
Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

3:30 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Brendan Ginty

Enterprise Systems Engineer Sophos

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Bradley Schaufenbuel

Vice President and Chief Information Security Officer Paychex
Bio

Oscar J. Giraldo

Assistant Vice President of Data Security Waterton
Bio

Jennifer Raiford

CEO & Chief Information Security Officer | Globe-Sec Advisory CISO and Chief Digital Risk and Trust officer | ENIGMA Protocol
Bio

Terry Kurzynski

Founder HALOCK Security Labs
Bio

Kay Solomon-Okoli

Assistant Vice President (AVP) - IT Controls & Quality- Governance CNA Insurance
5:15 pm

Closing Remarks