Detroit Cybersecurity Conference

Wednesday, February 26, 2025

Suburban Collection Showplace

Parking/Directions

Hybrid

Join Us in Detroit for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

9:00 am

Current Risk Management

Sponsored by

Presentation

9:30 am

Securing the Future: Cyber Risk Essentials in an AI-Driven Digital Landscape

Bio

Matt Moss

Senior Solution Architect ESET

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Exposing Risk Exposure Gaps

In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in read more…

In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in plain sight. However, the very areas we fail to recognize can provide valuable insights that threat actors can exploit to refine their attacks.

This session will focus on the often overlooked or hidden risk exposure gaps that adversaries leverage to gather intelligence on your organization. Through real-world examples, we will explore how threat actors identify and target these gaps to tailor their social engineering, phishing, and malware campaigns, ultimately working to breach your defenses. Attendees will gain actionable strategies to identify and mitigate these overlooked areas to help strengthen their organization’s security posture.

Bio

Josh Bartolomie

Chief Security Officer/VP, Global Threat Services Cofense

Sponsored by

Presentation

11:00 am

The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Shawn Taylor

Field Technology Officer, Americas ForeScout Technologies

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 pm

Lunch

Keynote

12:00 pm

Innovating for resilience: Securing critical infrastructure and inspiring the future of cyber security

Bio

Hemanth Tadepalli

Cybersecurity & Compliance Subject Matter Expert May Mobility
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Building a Risk Aware Organization in the Age of Artificial Intelligence

In this session, Dwayne will provide guidance about building a Cyber resilient organization and an AI risk management profile.  After attending this session, you will have tools that you can use within your organization to align risk management processes with organizational goals, aligning your AI profile for responsible use and risk read more…

In this session, Dwayne will provide guidance about building a Cyber resilient organization and an AI risk management profile.  After attending this session, you will have tools that you can use within your organization to align risk management processes with organizational goals, aligning your AI profile for responsible use and risk awareness, and building and using a framework for AI risk management and cyber resilience.

Bio

Dwayne Natwick

Owner/CEO/Principal Trainer Captain Hyperscaler, LLC

Sponsored by

Presentation

2:00 pm
Bio

Greg Smalley

Senior Solutions Engineer Cloudflare

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Nation State & Nation-Sponsored ICS attacks

Just a few years ago, Nation State and Nation-sponsored cyberattacks went largely unaccredited.  Recently however, Nation State and Sponsored attacks are becoming more brazen as if this was a game of Grand Theft Auto.  We’ll explore who’s behind these attacks, the motivations, what industries are being selected, the common denominator read more…

Just a few years ago, Nation State and Nation-sponsored cyberattacks went largely unaccredited.  Recently however, Nation State and Sponsored attacks are becoming more brazen as if this was a game of Grand Theft Auto.  We’ll explore who’s behind these attacks, the motivations, what industries are being selected, the common denominator within these attacks, and the surprisingly simple way to prevent most of these attacks.

Bio

Allen Numerick

Principal Consultant Trustwave

Sponsored by

Presentation

3:15 pm

Utilizing Behavior Analytics to help detect Insider Threat

Hackers and other malicious outsiders get all the attention these days. But did you know that 60% of all data breaches now involve insider threats? In this session we will show how behavior analytics can help organizations to mitigate the associated risks. Recent insider threat report data will be used read more…
Hackers and other malicious outsiders get all the attention these days. But did you know that 60% of all data breaches now involve insider threats?

In this session we will show how behavior analytics can help organizations to mitigate the associated risks. Recent insider threat report data will be used to illustrate the main characteristics of insider threats, what they are looking for and what are the current challenges organizations are facing to detect them. We will show how behavior analytics can help detecting insider threats, and what are the best practices for deploying it.

Bio

Brian Albrecht

Solutions Engineering Director Securonix

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Darren Webb

Vice President, IT Security (CISO) McLaren Health Care
Bio

Brian Boulanger

Vice President of Information Technology Hart Medical Equipment
Bio

Mo Wehbi

Vice President, Information Security & PMO Penske Automotive Group
Bio

Maria Haight

Chief Operations & Technology Officer | CIO | CISO Advisory Board Member, Quintrix
Bio

Art Thompson

Chief Information Officer City of Detroit
5:00 pm

Closing Remarks