Nashville Cybersecurity Conference

Wednesday, December 10, 2025

Embassy Suites by Hilton Franklin Cool Springs

PARKING/DIRECTIONS

Hybrid

820 Crescent Centre Dr, Franklin, TN 37067

Join Us in Nashville for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The End of Legacy Network Security

The End of Legacy Network Security, by Todd Ellison, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates read more…

The End of Legacy Network Security, by Todd Ellison, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured.

Bio

Todd Ellison

Director of Solution Architects Nile

Sponsored by

Presentation

9:30 am

Today’s Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introducea new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – thatteams can use to stop guessing and start defending.

Bio

Michele Leung

Vice President, Product & Growth Marketing Contrast Security

Sponsored by

Presentation

11:00 am

Detect Ransomware Instantly with AI-Powered Infrastructure

In a world where ransomware evolves by the minute, the speed of detection is the difference between minor disruption and major loss. Learn how cutting-edge AI models integrated with intelligent storage systems can identify ransomware the moment it strikes, analyzing data in real time as it’s written. Reduce recovery times read more…

In a world where ransomware evolves by the minute, the speed of detection is the difference between minor disruption and major loss. Learn how cutting-edge AI models integrated with intelligent storage systems can identify ransomware the moment it strikes, analyzing data in real time as it’s written. Reduce recovery times from days to minutes and gain visibility across your entire IT environment. See how advanced threat detection, automated alerts, and seamless integrations with your existing security tools empower your organization to stay one step ahead of cyber threats.

Bio

Ric Halsaver

Principal FlashSystem Specialist IBM North America

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Warning: Sarcastic Cybersecurity

Bio

Joe Esposito

Chief Information Security Officer Wellpath
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Generative and Agentic AI: How They’re Reshaping Data Risk

Generative and agentic AI are reshaping how data is created, accessed, and distributed across modern environments. As autonomous agents interact with systems and collaborate with users, they introduce new pathways for sensitive-data exposure, privilege expansion, and uncontrolled data propagation. In this session, we’ll cover: How these AI capabilities alter data-risk read more…

Generative and agentic AI are reshaping how data is created, accessed, and distributed across modern environments. As autonomous agents interact with systems and collaborate with users, they introduce new pathways for sensitive-data exposure, privilege expansion, and uncontrolled data propagation.

In this session, we’ll cover:

  • How these AI capabilities alter data-risk models and challenge existing governance frameworks
  • Key security considerations, including prompt-based data leakage, agent autonomy, monitoring AI-driven workflows, and protecting data used as model inputs
  • Practical guidance to support the secure, responsible adoption of generative and agentic AI
Bio

Dustin Anderson

Senior Sales Engineer Proofpoint

Sponsored by

Presentation

2:00 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that read more…
We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.
Bio

Eli Johnson

Senior Solutions Engineer - MDR Sophos

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Email at the Center of Workspace Security

Bio

Scott Harris

Principal Solutions Engineer Cloudflare

Sponsored by

3:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Melissa Page

Director of Information Technology and Security Cumberland University
Bio

Joe Esposito

Chief Information Security Officer Wellpath
Bio

Srikanth Boddireddy

Principal Engineer, Technical Leader Optum Digital
Bio

Jennifer Raiford

CEO & Chief Information Security Officer | Globe-Sec Advisory CISO and Chief Digital Risk and Trust officer | ENIGMA Protocol
5:00 pm

Closing Remarks