Los Angeles Cybersecurity Conference
Thursday, January 15, 2026
Hilton Los Angeles Culver City
Hybrid
6161 West Centinela Avenue, Culver City, California, 90230
Join Us in Los Angeles for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Keynote Speakers
“The "Agentic" Insider: When AI Becomes Your Most Dangerous Employee”
“The Sustainable CISO: Building a Program That Outlasts the Hype”
Vijay Panati
Deputy Chief Information Officer at the County Los Angeles Probation Department
Vijay Panati is a transformational executive who redefines how government and enterprise organizations approach digital resilience. As Acting CIO for the nation’s largest probation agency, Vijay orchestrates the technology strategy for a 4,000-person workforce, securing sensitive justice data against modern threats while driving mobile workforce modernization.
With a background spanning Fortune 100 corporate operations, Tier 1 research institutions, and critical public infrastructure, Vijay is known for turning legacy IT functions into agile strategic partners. He operates on the conviction that sustainable value is not bought in a software box but built through rigorous process optimization and human capital development.
Combining the rigor of a CISSP-certified leader with a “people-first” philosophy, Vijay mentors teams to build systems where security is inherent, not intrusive. At FutureCon, he goes beyond the hardware and software to discuss the true drivers of resilience: building the right team, fostering a culture of trust, and engineering processes that empower the mission.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Richard Greenberg
CISO at Security Advisors LLC President of ISSA LA
Sascha Schleumer
CISO Los Angeles County Department of Public Health
Rich Lindberg
Chief Information Security Officer JAMS
Eric Barricklow
Chief Information Security Officer City of Long Beach
Oksana Denesiuk
Cybersecurity & AI Executive Kaiser Permanente
Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Hilton Los Angeles Culver City
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
How to Get Away with Cybercrime
We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.
Sponsored by
Keynote
The Sustainable CISO: Building a Program That Outlasts the Hype
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Survival Guide to Cyber Threats: Anatomy of an Attacker’s Kill Chain and How to Stop It
Analyzing a real-world cybersecurity attack, we’ll step through how the attack unfolds and present specifics on tactics and tools to combat the threat.
Sponsored by
Presentation
Rethinking Identity Security in 2026
Identity Security is essential to enterprise protection. Breaking down identity silos across environments on-prem & cloud for human & non-human identities (NHIs) is crucial for success in a modern Identity program. As businesses become increasingly connected the attack surface continues to grow. Identities, both human & non-human are the new perimeter – with Identity being the primary attack vector for threat actors. Protecting human & non-human identities across cloud (IaaS, SaaS, PaaS) & on-prem remains key. Yet most identity programs only partially solve the picture by either focusing on only cloud or on-prem, or only a single element of identity security – be that PAM, IGA, ITDR or NHI – leaving open blind spots & exposure. Join Delinea to learn how to break down Identity silos & build a complete Identity program to solve the whole Identity picture
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
The "Agentic" Insider: When AI Becomes Your Most Dangerous Employee
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The End of Legacy Network Security
The End of Legacy Network Security argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.
Sponsored by
Presentation
Rebuild Your Software Security Program from the Breach Up
Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Make Attackers Cry: Outsmart Them With Deception
In this session, Rick Horwitz will explore how next-generation web application defense techniques use deception to disrupt account-takeover attempts by returning responses that resemble invalid login credentials. Rather than outright blocking the request, this approach introduces uncertainty, making it harder for attackers to understand why their attempts are failing.
This method leverages core principles of security deception—raising an attacker’s cognitive load, consuming their time, and prompting them to question the reliability of their tools or assumptions. Over time, this added friction can decrease the likelihood that they continue targeting the application.
Because these techniques typically require minimal configuration, they can offer immediate insight into attack patterns and behaviors. These signals help defenders analyze adversary tactics and strengthen overall protections, demonstrating how psychological and operational pressure can complement traditional security controls.
Sponsored by
Presentation
Without Threat Intel, Security Awareness Training Is Just Teaching to the Test
Annual phishing and email safety training often rank alongside OSHA compliance and harassment training in terms of employee enthusiasm—and questionable impact. Too often, phishing simulations fail to meaningfully reduce human risk. By integrating real-world threat intelligence, however, organizations can ensure users train against active, relevant threats. This not only makes simulations more impactful but also provides awareness teams with actionable metrics to shape curriculum and measure genuine organizational risk.
Sponsored by
Presentation
Secure and accelerate AI adoption
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!