Dallas Cybersecurity Conference

Thursday, January 30, 2025

House of Blues Dallas

Parking/Directions

Hybrid

Join Us in Dallas for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

House of Blues Dallas

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am
Artificial Intelligence (AI) is significantly transforming social engineering tactics. Join Morgan Trust as he discusses the evolution of AI as a threat factor and how, by leveraging AI, attackers can automate and enhance phishing schemes, creating highly personalized and convincing messages that are more accurate and effective. You won’t want read more…

Artificial Intelligence (AI) is significantly transforming social engineering tactics. Join Morgan Trust as he discusses the evolution of AI as a threat factor and how, by leveraging AI, attackers can automate and enhance phishing schemes, creating highly personalized and convincing messages that are more accurate and effective. You won’t want to miss this cutting-edge talk from a Pen Tester on the front lines

Bio

Morgan Trust

Associate Pen Tester, FRSecure

Sponsored by

Presentation

9:30 am

Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

Bio

Raymond Neff

Solution Architect ESET

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

10:30 am

The Human Element of Cyber Security

Presentation

11:00 am

The Coming Earthquake in App & API Security

The ground upon which your existing security practices and defense philosophy is based is starting to crack, with these tectonic plates shifting underneath. In this session, we’ll look at the shifts taking place. Attack trends are shifting from simple infrastructure & identity compromises to the emergence of sophisticated multi-faceted attacks, read more…
The ground upon which your existing security practices and defense philosophy is based is starting to crack, with these tectonic plates shifting underneath. In this session, we’ll look at the shifts taking place.
Attack trends are shifting from simple infrastructure & identity compromises to the emergence of sophisticated multi-faceted attacks, which increasingly include application and API layer vulnerabilities. Risk measurement is shifting from prioritizing risks purely based on vulnerabilities in development to the emergence of prioritizing based on level of threat, blast radius, and other production context. And legal liability is shifting from corporations being protected by “reasonable and customary” box-checking to the emergence of both corporate AND EXECUTIVE liability without having to prove negligence for either vulnerabilities or bugs. Your current practices and defense philosophy were devised for a terrain map that is rapidly becoming outdated. What should they look like once the tremors subside?
Bio

Larry Maccherone

Dev(Sec)Ops Transformation Architect Contrast Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm
Bio

Brendon McCaulley

Chief Information Security Officer ConnexPay
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

SOC Strategies for Detecting Earlier and Responding Faster

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

2:00 pm

Data Security in a SaaS, Cloud and Gen AI Era: Lessons Learnt and Best Practices for CISOs and Security Practitioners

As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all read more…

As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all of which demand innovative solutions beyond traditional security tools.

In this session, we’ll dive into:

Emerging risks in SaaS, cloud, and Gen AI environments, including real-world examples of breaches and misconfigurations.

Actionable strategies to gain full visibility into sensitive data, enforce compliance, and protect against insider and external threats.

Case studies highlighting successful approaches to securing sensitive data in Gen AI workflows and SaaS platforms.

• Future trends such as Zero Trust principles and AI-driven security automation that will reshape how we protect organizational data.

Designed for CISOs and security practitioners, this talk offers practical takeaways to enhance your data security posture while balancing productivity and compliance in a SaaS-first, AI-driven era.

Bio

Aatish Mandelecha

Founder and CEO Strac

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

From Reactive to Proactive: How Agentic AI can help shape a Cyber Analysts Workflow

Join this session where we will dive into the role of AI in enhancing analysts, workflows, and intelligence gathering.

Join this session where we will dive into the role of AI in enhancing analysts, workflows, and intelligence gathering.

Bio

Joe Miller

Director of Product Polarity by ThreatConnect

Sponsored by

Presentation

3:15 pm

Runtime Risk: The Enemy You Don't Know

How do you defend against a threat you can’t see? Research confirms that 60-80% of all breaches involve the successful exploitation of code weaknesses – and yet, ironically, this is where teams have the least context. The good news is, observability data can help – and we’ll unpack this opportunity read more…

How do you defend against a threat you can’t see? Research confirms that 60-80% of all breaches involve the successful exploitation of code weaknesses – and yet, ironically, this is where teams have the least context. The good news is, observability data can help – and we’ll unpack this opportunity together in the session.

Bio

Justin Nichols

Lead Security Solutions Engineer Dynatrace

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Joe Paul

Cybersecurity Compliance Leader & Deputy CISO Choreograph
Bio

Phillip Wylie

Penetration Tester | Instructor | Keynote & International Speaker | Best Selling Author | Podcast Host Horizion3.ai
Bio

James Carpenter

CISO/CTO Texas Scottish Rite Hospital for Children
Bio

Ogechi Ugwulebo

Chief Information Security Officer Founder, Women in STEM Leadership
Bio

Catherine Wiles

Director of Infrastructure and Security Farmer Brothers Coffee
5:00 pm

Closing Remarks