Columbus Cybersecurity Conference

Thursday, October 9, 2025

The Makoy

Parking/Directions

Hybrid

Join Us in Columbus for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

AI’s Influence on Cybersecurity and How to Prepare

We’ll explore how AI is reshaping cybersecurity—both as a threat and a defense tool. This isn’t just a technical issue; it’s a strategic governance challenge. Boards and executives must understand the risks, opportunities, and oversight responsibilities that come with AI’s growing influence.
We’ll explore how AI is reshaping cybersecurity—both as a threat and a defense tool. This isn’t just a technical issue; it’s a strategic governance challenge. Boards and executives must understand the risks, opportunities, and oversight responsibilities that come with AI’s growing influence.
Bio

Brad Nigh

Consulting Team Strategist FRSecure

Sponsored by

Presentation

9:30 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.

This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Melody Scheidler

Principal Product Marketing Manager Contrast Security

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

AI In the Cyber Trenches – How to Navigate Security in the AI Revolution

AI is the main buzzword of the moment – time to hear about it in action. Join us as we discuss the intersections of cybersecurity and AI, and how AI is both complicating and easing the burden on public sector cybersecurity professionals. We will also touch on ways to secure read more…

AI is the main buzzword of the moment – time to hear about it in action. Join us as we discuss the intersections of cybersecurity and AI, and how AI is both complicating and easing the burden on public sector cybersecurity professionals. We will also touch on ways to secure sensitive data from GenAI applications as well as how AI can help cybersecurity teams work more efficiently and securely.

Bio

Christina Kim

Security Engineering Manager Check Point Software Technologies

Sponsored by

Presentation

11:00 am

Convergence of Network and Security

Bio

David Henning

Global Director Cybersecurity Operations Hughes, An EchoStar Company

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

GenAI and Deepfake

Bio

Connie Matthews

Founder & CEO ReynCon Educational Services & Training
Bio

Jason Montgomery

Director, CISO, Principal Technical Consultant, & Course Author & Instructor ReynCon Educational Services & Training
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Andrew Short

Senior Solutions Engineer Sophos

Sponsored by

Presentation

2:00 pm

From Spam to Sophistication: How Email Threats Evolved with Phishing-as-a-Service

Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have read more…

Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have adapted over time, and take a closer look at the emerging threat of Phishing-as-a-Service (PhaaS)—a new, scalable model that’s lowering the barrier to entry for cybercriminals.

Bio

Sean Balzer

Senior Security Consultant Tenax Solutions an IP Pathways Company

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

SCUBA, Information Security, and Probably AI

We all know security is more so in the spotlight than ever before, but the question becomes what do you need to secure? Without visibility into your environment, you cannot possibly understand the attack surface that needs to be secured.

We all know security is more so in the spotlight than ever before, but the question becomes what do you need to secure? Without visibility into your environment, you cannot possibly understand the attack surface that needs to be secured.

Bio

Scott Hammond

Senior Security Engineer Nexum

Sponsored by

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Jana Moore

Chief Information Security Officer Belron® International
Bio

Julie Zwayer

Vice President, Technology and Cybersecurity Governance, Risk and Controls BreadFinancial
Bio

Kevin Wohlever

Deputy CISO State of Ohio
Bio

Tre Smith

Chief Information Security Officer Wexner Medical Center at The Ohio State University
5:00 pm

Closing Remarks