Los Angeles Cybersecurity Conference

Thursday, January 15, 2026

Hilton Los Angeles Culver City

PARKING/DIRECTIONS

Hybrid

6161 West Centinela Avenue, Culver City, California, 90230

Join Us in Los Angeles for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Hilton Los Angeles Culver City

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Jared Walter

Senior Solutions Engineer Sophos

Sponsored by

Keynote

9:15 am

The Sustainable CISO: Building a Program That Outlasts the Hype

Bio

Vijay Panati

Deputy Chief Information Officer at the County Los Angeles Probation Department
10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Survival Guide to Cyber Threats: Anatomy of an Attacker’s Kill Chain and How to Stop It

Analyzing a real-world cybersecurity attack, we’ll step through how the attack unfolds and present specifics on tactics and tools to combat the threat.

Analyzing a real-world cybersecurity attack, we’ll step through how the attack unfolds and present specifics on tactics and tools to combat the threat.

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

11:00 am

Rethinking Identity Security in 2026

Identity Security is essential to enterprise protection. Breaking down identity silos across environments on-prem & cloud for human & non-human identities (NHIs) is crucial for success in a modern Identity program. As businesses become increasingly connected the attack surface continues to grow. Identities, both human & non-human are the new read more…

Identity Security is essential to enterprise protection. Breaking down identity silos across environments on-prem & cloud for human & non-human identities (NHIs) is crucial for success in a modern Identity program. As businesses become increasingly connected the attack surface continues to grow. Identities, both human & non-human are the new perimeter – with Identity being the primary attack vector for threat actors. Protecting human & non-human identities across cloud (IaaS, SaaS, PaaS) & on-prem remains key. Yet most identity programs only partially solve the picture by either focusing on only cloud or on-prem, or only a single element of identity security – be that PAM, IGA,   ITDR or NHI – leaving open blind spots & exposure. Join Delinea to learn how to break down Identity silos & build a complete Identity program to solve the whole Identity picture

Bio

Tara Mattmuller

VP, Solutions Engineering Delinea

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

The "Agentic" Insider: When AI Becomes Your Most Dangerous Employee

Bio

Daniel Meacham

VP of Information and Content Security Legendary Entertainment
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The End of Legacy Network Security

The End of Legacy Network Security argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” read more…

The End of Legacy Network Security argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.

Bio

Pete Sakosky

Director Solutions Architect Nile

Sponsored by

Presentation

2:00 pm

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Maarten Buis

Sr. Product Marketing Manager Contrast Security

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Make Attackers Cry: Outsmart Them With Deception

In this session, Rick Horwitz will explore how next-generation web application defense techniques use deception to disrupt account-takeover attempts by returning responses that resemble invalid login credentials. Rather than outright blocking the request, this approach introduces uncertainty, making it harder for attackers to understand why their attempts are failing. This read more…

In this session, Rick Horwitz will explore how next-generation web application defense techniques use deception to disrupt account-takeover attempts by returning responses that resemble invalid login credentials. Rather than outright blocking the request, this approach introduces uncertainty, making it harder for attackers to understand why their attempts are failing.

This method leverages core principles of security deception—raising an attacker’s cognitive load, consuming their time, and prompting them to question the reliability of their tools or assumptions. Over time, this added friction can decrease the likelihood that they continue targeting the application.

Because these techniques typically require minimal configuration, they can offer immediate insight into attack patterns and behaviors. These signals help defenders analyze adversary tactics and strengthen overall protections, demonstrating how psychological and operational pressure can complement traditional security controls.

Bio

Rick Horwitz

Sr. Sales Engineer Fastly

Sponsored by

Presentation

3:15 pm

Without Threat Intel, Security Awareness Training Is Just Teaching to the Test

Annual phishing and email safety training often rank alongside OSHA compliance and harassment training in terms of employee enthusiasm—and questionable impact. Too often, phishing simulations fail to meaningfully reduce human risk. By integrating real-world threat intelligence, however, organizations can ensure users train against active, relevant threats. This not only makes read more…

Annual phishing and email safety training often rank alongside OSHA compliance and harassment training in terms of employee enthusiasm—and questionable impact. Too often, phishing simulations fail to meaningfully reduce human risk. By integrating real-world threat intelligence, however, organizations can ensure users train against active, relevant threats. This not only makes simulations more impactful but also provides awareness teams with actionable metrics to shape curriculum and measure genuine organizational risk.

Bio

Keith Tarantino

Senior Sales Engineer Proofpoint

Sponsored by

Presentation

3:45 pm

Secure and accelerate AI adoption

Bio

Brian Marks

Principal Solutions Engineer Cloudflare

Sponsored by

4:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:30 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Richard Greenberg

CISO at Security Advisors LLC President of ISSA LA
Bio

Sascha Schleumer

CISO Los Angeles County Department of Public Health
Bio

Rich Lindberg

Chief Information Security Officer JAMS
Bio

Eric Barricklow

Chief Information Security Officer City of Long Beach
Bio

Oksana Denesiuk

Cybersecurity & AI Executive Kaiser Permanente
5:30 pm

Closing Remarks