Los Angeles Cybersecurity Conference

Thursday, March 20, 2025

Hilton Los Angeles Airport

Parking/Directions

Hybrid

This event has been rescheduled from January 16, 2025 to March 20, 2025 due to the wild fires in and around the LA area.

Join Us in Los Angeles for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Hilton Los Angeles Airport

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Rethinking Cybersecurity for Covert Application Risks

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly read more…

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.

Bio

Dave Martin

Senior Director of Product Management Contrast Security

Sponsored by

Presentation

9:30 am

THE UNINTENTIONAL INTRUDER: Executive Safety, Brand Integrity, and Social Media Defense

Bio

Ian Shiff

Regional Director, Southwest US and Latin America ZeroFox

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Every APP & API Needs DDoS Protection

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense read more…

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.

Bio

Rick Horwitz

Sr. Sales Engineer Fastly

Sponsored by

Presentation

11:00 am

What’s your Security Strategy?

Hear a former Adobe and Cisco security executive share the strategies that worked as he helped protect these top companies from advanced cyber-attacks. During the last 20 years Den Jones led teams responsible for securing some of the world’s top companies as well as security-focused startups. While at Adobe and read more…

Hear a former Adobe and Cisco security executive share the strategies that worked as he helped protect these top companies from advanced cyber-attacks.

During the last 20 years Den Jones led teams responsible for securing some of the world’s top companies as well as security-focused startups. While at Adobe and Cisco, Den sat on Advisory Boards for some of the security industry’s top vendors and collaborated with other executives on the latest strategies. During that journey he devised an approach that is cost-effective and efficient.

In this session, we’ll talk about security strategies; we’ll get a little controversial, and then a little practical.

Let’s ask/answer a few questions:

What’s worse?

  • Do you have too many tools poorly deployed, or too few tools expertly deployed?
  • Should you choose suites or best of breed?

Since we always lack budget and resources then what’s the strategy? We can’t do it all but at 909Cyber we have devised an approach that will help you meet today’s security challenges whether you have a team or not.

During the session we’ll dig into this and a lot more as I provide some proven tested strategies that help thwart today’s attacks.

Bio

Den Jones

Founder & CEO 909Cyber

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

The Future of Product Security: AI, Quantum Computing, and the Evolving Threat Landscape

The rapid evolution of AI and Quantum Computing is reshaping the security landscape, challenging traditional models, and demanding a paradigm shift in product security. AI is a double-edged sword, empowering defenders while simultaneously enhancing attackers’ ability to automate, evade detection, and steal sensitive data. Quantum Computing, on the other hand, read more…

The rapid evolution of AI and Quantum Computing is reshaping the security landscape, challenging traditional models, and demanding a paradigm shift in product security. AI is a double-edged sword, empowering defenders while simultaneously enhancing attackers’ ability to automate, evade detection, and steal sensitive data. Quantum Computing, on the other hand, threatens to break modern cryptographic standards, requiring proactive preparation to secure the future. This session will provide practical insights and a roadmap to help security leaders leverage AI for defense, mitigate emerging AI risks, and transition toward quantum-resistant architectures before threats become reality.

Bio

Jacob Combs

VP of Cybersecurity, Chief Information Security Officer | Enterprise & Product Security, Governance Tandem Diabetes Care
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Optimizing SOC Operations to Detect Earlier and Respond Faster

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

2:00 pm

Ransomware Evolution and Defense

Bio

Miguel Martinez

Chief Technology Officer Tec-Refresh, Inc.

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Observability for Security: Combining Runtime Risks with Observability

Bio

Joe Nguyen

Security Solutions Consultant Dynatrace

Sponsored by

Presentation

3:15 pm

Stacking Your Security: A Smarter Approach to Application Defense

Modern cyber threats don’t target just one layer of your security—they exploit gaps across your entire infrastructure. A stacked security approach ensures that your applications, APIs, and networks remain protected at every stage, from DDoS mitigation at the edge to origin protection against direct attacks.

Modern cyber threats don’t target just one layer of your security—they exploit gaps across your entire infrastructure. A stacked security approach ensures that your applications, APIs, and networks remain protected at every stage, from DDoS mitigation at the edge to origin protection against direct attacks.

Bio

Deborah Kyong

Solutions Engineer Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Marvin Cruz

Vice President, LA Metro Chief Technology Officer CGI
Bio

Dhruv Pandya

Director Information Security Wistia
Bio

Gary Gooden

Deputy Chief Information Officer County of Ventura
Bio

Annie Flippo

Chief Data Officer Urgently
5:00 pm

Closing Remarks