Dallas Cybersecurity Conference

Thursday, January 22, 2026

Renaissance Dallas Richardson Hotel

PARKING/DIRECTIONS

Hybrid

900 E. Lookout Drive, Richardson, Texas, USA, 75082

Join Us in Dallas for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Renaissance Dallas Richardson Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Assume Breach: Rethinking Cyber Defense in an Inevitable Compromise Era

Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but read more…

Traditional preventative security models are failing in a world of zero-days, nation-state actors, and credential abuse. History proves one truth: attackers get in. This presentation challenges legacy SOC thinking and outlines an active defense, post-breach strategy focused on detection, validation, threat hunting, and rapid response—because eliminating attackers is impossible, but finding them is not.

Bio

Rishi Joshee

Enterprise Cybersecurity Analyst LMNTRIX

Sponsored by

Presentation

9:15 am

New Tools/Old Rules: Or, How "This Is How We've Always Done It" Is Going To Mess Up Your AI Transformation

AI transformation is not just about deploying new tools; it is about confronting the fact that many of the rules, controls, and assumptions organizations rely on today no longer apply. In this session, Richard Bird explains why familiar mechanisms like identity and access policies, data loss prevention, privacy controls, and read more…

AI transformation is not just about deploying new tools; it is about confronting the fact that many of the rules, controls, and assumptions organizations rely on today no longer apply. In this session, Richard Bird explains why familiar mechanisms like identity and access policies, data loss prevention, privacy controls, and acceptable use policies begin to break down when AI systems are introduced into everyday workflows. As AI tools generate, transform, and act on data in ways that are non-deterministic, fast-moving, and increasingly autonomous, organizations discover that “this is how we’ve always done it” becomes a liability rather than a safeguard. Using real-world examples, this talk shows how trying to force AI into legacy governance models creates blind spots, weakens accountability, and gives leaders a false sense of control. AI transformation requires rethinking processes, policies, and governance from the ground up, not simply extending old rules to new tools.

Bio

Richard Bird

Chief Information Security Officer Singulr AI

Sponsored by

Presentation

9:45 am

7 Best Practices for VM in a World of Noise

Your team is facing a scalability crisis. Security resources grow only linearly while security work grows exponentially. Learn 7 crucial strategies/tactics to handle vulnerability management effectively, preventing reactive security practices, staff burnout, and poor outcomes.

Your team is facing a scalability crisis. Security resources grow only linearly while security work grows exponentially.
Learn 7 crucial strategies/tactics to handle vulnerability management effectively, preventing reactive security practices, staff burnout, and poor outcomes.

Bio

Frederico Hakamine

Technical Evangelist Axonius

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

Evolving Shift Left: Adapting Principles to the Complex Threats of Today.

For over two decades, “Shift Left” has shaped how organizations build secure software — moving testing earlier in development to catch vulnerabilities before release. It was the right idea at the right time, but today’s application ecosystems are far more complex and constantly under attack. Nation-states and sophisticated cybercrime groups read more…

For over two decades, “Shift Left” has shaped how organizations build secure software — moving testing earlier in development to catch vulnerabilities before release. It was the right idea at the right time, but today’s application ecosystems are far more complex and constantly under attack. Nation-states and sophisticated cybercrime groups have intensified the threat landscape, and with AI lowering the barrier to entry, even less-skilled actors can launch advanced attacks at scale. This session explores how the original principles of Shift Left must evolve into continuous assurance — where prevention, detection, and protection work together across the entire lifecycle.

Bio

Tom Houpt

Channel Solutions Engineer Contrast Security

Sponsored by

Presentation

11:15 am

When Priorities Collide: CIO & CISO Relationship Dynamics

Stop being a gatekeeper. Start being an enabler. The traditional wall between the CIO and CISO is crumbling. As budgets shrink and the pressure of AI mounts, the “old way” of managing IT and Security as separate silos is no longer just inefficient—it’s a business risk. In this session, Scott L. read more…
Stop being a gatekeeper. Start being an enabler.
The traditional wall between the CIO and CISO is crumbling. As budgets shrink and the pressure of AI mounts, the “old way” of managing IT and Security as separate silos is no longer just inefficient—it’s a business risk.
In this session, Scott L. Howitt (Founder, SVH Cyber) challenges the linear thinking that holds organizations back. Drawing on lessons from the invention of the shipping container to the radical digital evolution of Las Vegas, he explores why the most successful leaders in 2026 and beyond will be those who focus on business strategy over technology strategy.
Bio

Scott Howitt

CEO and Founder SVH Cyber

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

Super and Quantum and cyber and AI....oh my!

While we worry about our little niches, the world is evolving at the speed of life by redefining civilizational tenets, reshaping cultures and redefining global macro-economics and geo-politics. André will take you on a journey from the beginning of time to the near future where humankind itself will be redefined.

While we worry about our little niches, the world is evolving at the speed of life by redefining civilizational tenets, reshaping cultures and redefining global macro-economics and geo-politics.

André will take you on a journey from the beginning of time to the near future where humankind itself will be redefined.

Bio

André Mendes

Chief Information & Artificial Intelligence Officer Tarrant County, TX
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

AI-generated code: Maximize gains, minimize risks

AI coding assistants promise massive productivity gains, but recent academic research shows they also introduce instability, security weaknesses, and developer overconfidence. In this talk, I present data from large-scale studies demonstrating how AI-generated code affects delivery performance, vulnerability rates, and developer decision-making. I then outline a practical, end-to-end approach for read more…

AI coding assistants promise massive productivity gains, but recent academic research shows they also introduce instability, security weaknesses, and developer overconfidence. In this talk, I present data from large-scale studies demonstrating how AI-generated code affects delivery performance, vulnerability rates, and developer decision-making. I then outline a practical, end-to-end approach for reducing AI-induced risk while preserving the benefits of AI-assisted development.

Bio

Jerome Robert

CEO & Co Founder Symbiotic Security

Sponsored by

Presentation

2:15 pm

Annual information Security Report

Each year, the FRSecure team conducts about 400 validated risk assessments and 60 incident response cases. After a deep dive into 2025’s engagements, we’ve created a snapshot of information security programs across small- and medium-sized businesses. Mea, one of FRSecure’s consultants, shares insights on where we’re winning, where we’re lagging, read more…
Each year, the FRSecure team conducts about 400 validated risk assessments and 60 incident response cases. After a deep dive into 2025’s engagements, we’ve created a snapshot of information security programs across small- and medium-sized businesses. Mea, one of FRSecure’s consultants, shares insights on where we’re winning, where we’re lagging, what’s around the corner, as well as the latest threats and response techniques you need to know. The hope is to give you an idea of where your program stacks up to industry benchmarks—and to offer ideas for meaningful improvements that minimize risk and impact along the way.
Bio

Mea Yang

Information Security Consultant FRSecure

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Michael Pertuit

Senior Solutions Engineer Sophos

Sponsored by

Presentation

3:30 pm

From VPN to Zero Trust: Fast-track your remote access projects

Bio

Alan Nguyen

Solutions Engineer Cloudflare

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Renaldo McKenzie

President Cyversity North Texas
Bio

Aman Tara

Executive Director (Technology and Information Security Risk Management) Wells Fargo
Bio

Bindi Davé

Field Chief Information Security Officer Optiv
Bio

Royce Markose

Chief Information Security Officer VISTRADA
Bio

Paul Johnson

Chief of Corporate Security Harwood International
5:15 pm

Closing Remarks