Los Angeles Cybersecurity Conference
Thursday, March 20, 2025
Hybrid





































Join Us in Los Angeles for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“The Future of Product Security: AI, Quantum Computing, and the Evolving Threat Landscape”
Jacob Combs
VP of Cybersecurity, Chief Information Security Officer | Enterprise & Product Security, Governance Tandem Diabetes Care
The rapid evolution of AI and Quantum Computing is reshaping the security landscape, challenging traditional models, and demanding a paradigm shift in product security. AI is a double-edged sword, empowering defenders while simultaneously enhancing attackers’ ability to automate, evade detection, and steal sensitive data. Quantum Computing, on the other hand, threatens to break modern cryptographic standards, requiring proactive preparation to secure the future. This session will provide practical insights and a roadmap to help security leaders leverage AI for defense, mitigate emerging AI risks, and transition toward quantum-resistant architectures before threats become reality.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"


Sponsors
Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors






Silver Sponsors























Partner








“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Hilton Los Angeles Airport
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Rethinking Cybersecurity for Covert Application Risks
Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.
Sponsored by

Presentation
THE UNINTENTIONAL INTRUDER: Executive Safety, Brand Integrity, and Social Media Defense
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Every APP & API Needs DDoS Protection
The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.
Sponsored by

Presentation
What’s your Security Strategy?
Hear a former Adobe and Cisco security executive share the strategies that worked as he helped protect these top companies from advanced cyber-attacks.
During the last 20 years Den Jones led teams responsible for securing some of the world’s top companies as well as security-focused startups. While at Adobe and Cisco, Den sat on Advisory Boards for some of the security industry’s top vendors and collaborated with other executives on the latest strategies. During that journey he devised an approach that is cost-effective and efficient.
In this session, we’ll talk about security strategies; we’ll get a little controversial, and then a little practical.
Let’s ask/answer a few questions:
What’s worse?
- Do you have too many tools poorly deployed, or too few tools expertly deployed?
- Should you choose suites or best of breed?
Since we always lack budget and resources then what’s the strategy? We can’t do it all but at 909Cyber we have devised an approach that will help you meet today’s security challenges whether you have a team or not.
During the session we’ll dig into this and a lot more as I provide some proven tested strategies that help thwart today’s attacks.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
The Future of Product Security: AI, Quantum Computing, and the Evolving Threat Landscape
The rapid evolution of AI and Quantum Computing is reshaping the security landscape, challenging traditional models, and demanding a paradigm shift in product security. AI is a double-edged sword, empowering defenders while simultaneously enhancing attackers’ ability to automate, evade detection, and steal sensitive data. Quantum Computing, on the other hand, threatens to break modern cryptographic standards, requiring proactive preparation to secure the future. This session will provide practical insights and a roadmap to help security leaders leverage AI for defense, mitigate emerging AI risks, and transition toward quantum-resistant architectures before threats become reality.
Jacob Combs
VP of Cybersecurity, Chief Information Security Officer | Enterprise & Product Security, Governance Tandem Diabetes Care
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Optimizing SOC Operations to Detect Earlier and Respond Faster
Sponsored by

Presentation
Ransomware Evolution and Defense
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Observability for Security: Combining Runtime Risks with Observability
Sponsored by

Presentation
Stacking Your Security: A Smarter Approach to Application Defense
Modern cyber threats don’t target just one layer of your security—they exploit gaps across your entire infrastructure. A stacked security approach ensures that your applications, APIs, and networks remain protected at every stage, from DDoS mitigation at the edge to origin protection against direct attacks.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!