Detroit Cybersecurity Conference
Thursday, February 19, 2026
Hybrid
21111 Haggerty Road, Novi, Michigan, USA, 48375
Join Us in Detroit for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Keynote Speakers
“Emerging Chinese Cyber Threat & Prevention”
Marty D’Amico
Supervisory Special Agent Federal Bureau of Investigation (FBI)
Supervisory Special Agent Martin D’Amico started his career as an Intelligence Analyst in the FBI, working for the Directorate of Intelligence before becoming a founding member of the High Value Detainee Interrogation Group, focusing on interviews of “high value” terrorists throughout the world. SSA D’Amico graduated from the FBI Academy and was assigned as a Special Agent to the South Bend RA out of the Indianapolis Division, working all violations, but focusing on Counter Terrorism matters. During his time assigned to the South Bend RA, SA D’Amico led the first prosecution and repatriation of a U.S. Citizen and female ISIS supporter from Syria, leading to charges of material support. SSA D’Amico was then promoted to an SSA at FBI’s Counter Terrorism Division, Extra-territorial Unit IV covering all counterterrorism matters in Europe and Eurasia. Following SSA D’Amico’s stint at HQ, SSA D’Amico took over the Macomb RA/Detroit Division as the Supervisory Senior Resident Agent working Violent Crimes and Gangs. Following a two-year assignment as an SSRA, SSA D’Amico returned to work National Security matters as the Cyber National Security Supervisor on Detroit’s squad, CY-26. CY-26 is responsible for all computer intrusion and cyber investigations stemming from nation states and foreign actors. In 2025, SSA D’Amico obtained his MBA with a concentration in Cyber Security Management.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Karla Thomas
President Michigan InfraGard Member Alliance
Jennifer Raiford
CEO & Chief Information Security Officer | Globe-Sec Advisory CISO and Chief Digital Risk and Trust officer | ENIGMA Protocol
Marcus Rebelo
CISO & Head of AI Auxiom
Hemanth Tadepalli
Cybersecurity & Compliance Subject Matter Expert May Mobility
Amir Jabri
VP in IT services Governance City National Bank
Sponsors
Premier Platinum Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
AI-Powered Threats Versus Email Security: The Intelligence Gap
Threat actors employ a multitude of Tactics, Techniques, and Procedures (TTPs) to evade detection of their phishing pages, emails, and malware by both AI-based tools and humans. These TTPs also extend to making their content more difficult to analyze if it is detected. This briefing will highlight some of the most effective methods seen in 2025, with a focus on abuse of legitimate content and methods known to stymie SOCs. It will also include some specific mitigations that can be done to help improve security posture and SOC effectiveness.
Sponsored by
Keynote
Emerging Chinese Cyber Threat & Prevention
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Breaking down Silos - Operationalizing Exposure Management
Exposure Management is one of the most impactful evolutions you can make in your security program. Vulnerability Management has gone through many evolutions in the past few years. From traditional Vulnerability Management to Risk Based vulnerability Management then Unified vulnerability Management and now Exposure management with a few iterations in-between. Let’s navigate the ambiguity together, talk about what matters most and leave with some calls to action on how to move from VM to EM by breaking down the data silos between sensors and vendors.
Sponsored by
Your Guide to AI in Cyber Security
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
State of The Union: Annual Information Security Report
Sponsored by
Presentation
The 2026 Attackers Playbook: Hacking Trust
Attackers aren’t breaking in anymore — they’re logging in. Join Varonis security experts as they break down the 2026 Attacker’s Playbook and reveal how modern adversaries use AI, trusted tools, and misconfigurations to move through your environment undetected. In this fast‑paced session, you’ll walk away with clear insights into how attackers actually operate today — the tools they abuse, the trust relationships they exploit, and the misconfigurations that quietly open the door for them. You’ll leave with practical guidance you can bring back to your team to strengthen defenses and stay ahead of the 2026 threat landscape.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Modern Data Protection
Current Security Operations
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!