Philadelphia Cybersecurity Conference

Thursday, March 27, 2025

Sheraton Valley Forge Hotel

Parking/Directions

Hybrid

Join Us in Philadelphia for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Sheraton Valley Forge Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Using Threat-Informed Defense to Stop Boiling the Ocean

It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.
It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.
Bio

Frank Duff

Chief Innovation Officer & Co-founder Tidal Cyber

Sponsored by

Presentation

9:30 am

Today’s Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by read more…

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Bio

Todd Bertchume

Technical Marketing Engineer Forescout

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Exposing Risk Exposure Gaps

In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in read more…
In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in plain sight. However, the very areas we fail to recognize can provide valuable insights that threat actors can exploit to refine their attacks.
This session will focus on the often overlooked or hidden risk exposure gaps that adversaries leverage to gather intelligence on your organization. Through real-world examples, we will explore how threat actors identify and target these gaps to tailor their social engineering, phishing, and malware campaigns, ultimately working to breach your defenses. Attendees will gain actionable strategies to identify and mitigate these overlooked areas to help strengthen their organization’s security posture.
Bio

Josh Bartolomie

Chief Security Officer/VP, Global Threat Services Cofense

Sponsored by

Presentation

11:00 am

Rethinking Cybersecurity for Covert Application Risks

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly read more…

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.

Bio

Naomi Buckwalter

Senior Director of Product Security Contrast Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Leading Cybersecurity Through Rapidly Evolving Changes, Challenges and Uncertainties

Bio

Anahi Santiago

Chief Information Security Officer ChristianaCare
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Rethinking Data Security in the Age of AI

The way we consume and interact with data is undergoing a seismic shift. As we transition from traditional SaaS and file-based ecosystems to an AI-driven world, the rules of data security are being rewritten. How does this transformation impact data protection strategies, and what new imperatives must organizations adopt to read more…

The way we consume and interact with data is undergoing a seismic shift. As we transition from traditional SaaS and file-based ecosystems to an AI-driven world, the rules of data security are being rewritten. How does this transformation impact data protection strategies, and what new imperatives must organizations adopt to ensure secure data consumption in an AI-first era? This session explores the evolving risks, challenges, and solutions at the intersection of AI and cybersecurity

Bio

Nishant Doshi

Chief Product and Development Officer Cyberhaven

Sponsored by

Presentation

2:00 pm

Unmasking the Hidden Threats of Malicious AdTech

Forget the image of the lone hacker in a basement—today’s cybercriminals are part of sophisticated, professional organizations that leverage malicious adtech to carry out large-scale cyberattacks. In return for a fee, these threats allow affiliates to prey on unsuspecting victims while evading threat research. In this session, presented by Infoblox, read more…

Forget the image of the lone hacker in a basement—today’s cybercriminals are part of sophisticated, professional organizations that leverage malicious adtech to carry out large-scale cyberattacks. In return for a fee, these threats allow affiliates to prey on unsuspecting victims while evading threat research. In this session, presented by Infoblox, we’ll uncover the true scope of malicious adtech, how these cybercriminal syndicates operate, and why traditional security measures often fail to detect these elusive attacks. We’ll also explore how DNS-based threat intelligence offers a powerful, proactive defense strategy to identify and block these hidden threats before they can do harm. Join us to learn how to stay one step ahead in protecting your organization from this growing danger.

Bio

Bart Lenaerts-Bergmans

Senior Product Marketing Manager - Threat Intelligence Infoblox

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Optimizing SOC Operations to Detect Earlier and Respond Faster

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

3:15 pm

Filling the Void in SecOps Tools With Cloud Context

Bio

Tom Gentsch

Security Architect Stream Security

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Keith McMenamin

Vice President of Information Technology Visit Philadelphia
Bio

Kim Sassaman

Chief Information Security Officer UHS of Delaware, Inc.
Bio

Anthony Mostak

Sr. Director, Cybersecurity Operations and Application Security MDLand
Bio

Anahi Santiago

Chief Information Security Officer ChristianaCare
Bio

Donna Ross

Chief Information Security Officer Radian
5:00 pm

Closing Remarks