Detroit Cybersecurity Conference

Thursday, February 19, 2026

Sheraton Detroit Novi Hotel

PARKING/DIRECTIONS

Hybrid

21111 Haggerty Road, Novi, Michigan, USA, 48375

Join Us in Detroit for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

AI-Powered Threats Versus Email Security: The Intelligence Gap

Threat actors employ a multitude of Tactics, Techniques, and Procedures (TTPs) to evade detection of their phishing pages, emails, and malware by both AI-based tools and humans. These TTPs also extend to making their content more difficult to analyze if it is detected. This briefing will highlight some of the read more…

Threat actors employ a multitude of Tactics, Techniques, and Procedures (TTPs) to evade detection of their phishing pages, emails, and malware by both AI-based tools and humans. These TTPs also extend to making their content more difficult to analyze if it is detected. This briefing will highlight some of the most effective methods seen in 2025, with a focus on abuse of legitimate content and methods known to stymie SOCs. It will also include some specific mitigations that can be done to help improve security posture and SOC effectiveness.

Bio

Max Gannon

Intelligence Analysis Manager Cofense

Sponsored by

Keynote

9:15 am

Emerging Chinese Cyber Threat & Prevention

Bio

Marty D’Amico

Supervisory Special Agent Federal Bureau of Investigation (FBI)
10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Breaking down Silos - Operationalizing Exposure Management

Exposure Management is one of the most impactful evolutions you can make in your security program.  Vulnerability Management has gone through many evolutions in the past few years. From traditional Vulnerability Management to Risk Based vulnerability Management then Unified vulnerability Management and now Exposure management with a few iterations in-between.  Let’s navigate the read more…

Exposure Management is one of the most impactful evolutions you can make in your security program.  Vulnerability Management has gone through many evolutions in the past few years. From traditional Vulnerability Management to Risk Based vulnerability Management then Unified vulnerability Management and now Exposure management with a few iterations in-between.  Let’s navigate the ambiguity together, talk about what matters most and leave with some calls to action on how to move from VM to EM by breaking down the data silos between sensors and vendors.

Bio

Casey Reid

Field CTO for NA and LATAM Tenable

Sponsored by

Presentation

11:00 am

The Dark Side of AI

Bio

Marcus Rebelo

CISO & Head of AI Auxiom

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Are your Vulnerabilities Patched?

Bio

Dr. Lovelie Moore

Business information Security Officer Toyota Financial Services Corporation
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The 2026 Attackers Playbook: Hacking Trust

Attackers aren’t breaking in anymore — they’re logging in. Join Varonis security experts as they break down the 2026 Attacker’s Playbook and reveal how modern adversaries use AI, trusted tools, and misconfigurations to move through your environment undetected. In this fast‑paced session, you’ll walk away with clear insights into how attackers read more…

Attackers aren’t breaking in anymore — they’re logging in. Join Varonis security experts as they break down the 2026 Attacker’s Playbook and reveal how modern adversaries use AI, trusted tools, and misconfigurations to move through your environment undetected. In this fast‑paced session, you’ll walk away with clear insights into how attackers actually operate today — the tools they abuse, the trust relationships they exploit, and the misconfigurations that quietly open the door for them. You’ll leave with practical guidance you can bring back to your team to strengthen defenses and stay ahead of the 2026 threat landscape.

Bio

Greg Stevens

Senior Solutions Engineer Varonis

Sponsored by

Presentation

2:00 pm

State of The Union: Annual Information Security Report

Bio

Greg Cloon

Information Security Consultant (vCISO) FRSecure

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

The Missing Layer: Closing the Application Security Gap in Defense-in-Depth

Defense in depth has long been the cornerstone of cybersecurity, layering protections across networks, endpoints, identity, and cloud environments. Yet today’s threat landscape — driven by sophisticated nation-state actors, automated attacks, and increasingly capable adversaries — continues to outpace traditional defenses. As development accelerates from waterfall to Agile, CI/CD, and read more…

Defense in depth has long been the cornerstone of cybersecurity, layering protections across networks, endpoints, identity, and cloud environments. Yet today’s threat landscape — driven by sophisticated nation-state actors, automated attacks, and increasingly capable adversaries — continues to outpace traditional defenses. As development accelerates from waterfall to Agile, CI/CD, and AI-assisted code generation, attackers increasingly target applications in production, where visibility and prevention are lacking. Many organizations rely on Web Application Firewalls as their primary safeguard, but no single control is infallible, leaving a critical gap in the security stack. This session explores why runtime application protection is the missing layer in modern defense-in-depth strategies and how strengthening it prepares organizations not only for today’s attacks but also for emerging risks like quantum-driven cryptographic disruption.

Bio

Tom Houpt

Channel Solutions Engineer Contrast Security

Sponsored by

Presentation

3:15 pm

Stacking Your Security: A Smarter Approach to Application Defense

Bio

Pat Blair

Senior Solutions Engineer Cloudflare

Sponsored by

Presentation

3:45 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Eli Johnson

Senior Solutions Engineer Sophos

Sponsored by

4:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:30 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Karla Thomas

President Michigan InfraGard Member Alliance
Bio

Jennifer Raiford

CEO & Chief Information Security Officer | Globe-Sec Advisory CISO and Chief Digital Risk and Trust officer | ENIGMA Protocol
Bio

Marcus Rebelo

CISO & Head of AI Auxiom
Bio

Hemanth Tadepalli

Cybersecurity & Compliance Subject Matter Expert May Mobility
Bio

Amir Jabri

VP in IT services Governance City National Bank
5:30 pm

Closing Remarks