Milwaukee Cybersecurity Conference

Thursday, October 23, 2025

Sheraton Milwaukee Brookfield Hotel

Parking/Directions

Hybrid

Join Us in Milwaukee for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

9:00 am

Security Blindspots

Presentation

9:30 am

Advancing Risk Governance: How Executives Make Informed Cyber Decisions

What if a single control could eliminate most of your cybersecurity risk—would you use it? Cyber insurers consistently point to legal liability as your greatest exposure. The best predictor of post-breach legal costs isn’t the breach itself—it’s whether you can prove your cybersecurity program was reasonable. Reasonableness doesn’t mean perfection. It means showing you read more…

What if a single control could eliminate most of your cybersecurity risk—would you use it?

Cyber insurers consistently point to legal liability as your greatest exposure. The best predictor of post-breach legal costs isn’t the breach itself—it’s whether you can prove your cybersecurity program was reasonable.

Reasonableness doesn’t mean perfection. It means showing you made balanced, cost-justified decisions to reduce risks to the public as well as your business. Regulators and litigators evaluate how much you invested relative to the risks you sought to prevent. When a breach happens, they’ll find weaknesses—but what matters is whether your program was built to achieve fair, defensible outcomes.

Today, regulators increasingly define “reasonable” cybersecurity as: Safeguards that reduce risk to the public without being more burdensome than the risk itself.

Chris will walk you through how to break free from compliance checklists and maturity scores—and instead build a defensible risk management program that can withstand attackers, auditors, and attorneys.

Bio

Chris Cronin

Partner HALOCK Security Labs

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

From OSINT to Compromise: The AI Phishing Attack Pipeline

Threat actors are weaponizing your organization’s OSINT through AI models to generate personalized and polymorphic phishing attacks and payloads at unprecedented scale and minimal cost. This session exposes how adversaries scrape publicly available data and leverage it to create dynamic phishkits that evade traditional email security defenses. We’ll examine real-world read more…

Threat actors are weaponizing your organization’s OSINT through AI models to generate personalized and polymorphic phishing attacks and payloads at unprecedented scale and minimal cost. This session exposes how adversaries scrape publicly available data and leverage it to create dynamic phishkits that evade traditional email security defenses. We’ll examine real-world phishing examples that made it into enterprise mailboxes, the data sources that are most often being exploited, and provide actionable strategies to identify, monitor, and reduce your digital footprint and detect and mitigate AI-generated campaigns before they compromise your organization.

Bio

Josh Bartolomie

CSO/VP, Global Threat Services Cofense

Sponsored by

11:00 am

Building a Response Strategy

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

“Come Together” Working with all business units for easier adoption of cybersecurity

Bio

Darren (Freidel) Stevenson

Senior Cybersecurity Engineer Center for Internet Security
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Behind the Name: Unmasking DNS Threats

The Domain Name System (DNS) is often called the “phonebook of the internet”—but beneath its surface lies a complex and increasingly exploited attack vector. In “Behind the Name: Unmasking DNS Threats,” we’ll peel back the layers of this foundational technology to expose how cybercriminals are leveraging DNS for data exfiltration, command-and-control, read more…

The Domain Name System (DNS) is often called the “phonebook of the internet”—but beneath its surface lies a complex and increasingly exploited attack vector. In “Behind the Name: Unmasking DNS Threats,” we’ll peel back the layers of this foundational technology to expose how cybercriminals are leveraging DNS for data exfiltration, command-and-control, phishing, and more.

  • This session will explore real-world DNS threat scenarios, the latest trends in DNS-based attacks, and the often-overlooked vulnerabilities that can compromise even the most secure environments. Attendees will gain insights into:
  • How DNS is weaponized in modern cyberattacks
  • Techniques for detecting and mitigating DNS abuse
  • The role of DNS security in a zero-trust architecture
  • Best practices for securing DNS infrastructure

Whether you’re a security professional, IT leader, or simply curious about the hidden risks behind everyday internet activity, this talk will equip you with the knowledge to better defend your organization.

Bio

Chris Usserman

Global Public Sector CTO Infoblox

Sponsored by

Presentation

2:00 pm

Rapid AI Prototyping

The age-old complaint in security engineering is that “big ideas die in the backlog.” Lengthy discovery, design, and coding cycles smother urgency—especially when threats are evolving faster than releases. Enter AI-first development, where language models collapse friction at every step of the SDLC and let small teams translate concept into read more…

The age-old complaint in security engineering is that “big ideas die in the backlog.” Lengthy discovery, design, and coding cycles smother urgency—especially when threats are evolving faster than releases. Enter AI-first development, where language models collapse friction at every step of the SDLC and let small teams translate concept into running code in hours, not quarters. This talk tells the inside story of how we built a working Al Assisted Alert Agent & an Insider Threat & Fraud Detection module in a couple afternoons—then generalized the method into a repeatable playbook any security team can copy.

Bio

Devin Lindelof

Solutions Engineer Sumo Logic

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

2:45 pm

Defending Against Data Breaches

3:15 pm

Identifying Threats in your Workplace

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Terry Kurzynski

Senior Partner HALOCK Security Labs
Bio

Adi (Aditya) Agrawal

CTO, CIO CLR80 Inc.
Bio

Kasi Paturi

President Pan Asian American Business Council (PAABC)
Bio

Mark Mowers

Information Security Officer Landmark Credit Union
5:00 pm

Closing Remarks