Philadelphia Cybersecurity Conference

Thursday, March 19, 2026

Sheraton Valley Forge Hotel

Hybrid

480 North Gulph Road, King of Prussia, Pennsylvania, USA, 19406

Join Us in Philadelphia for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Premier Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Deception Tactics: Extending the Cat-and-Mouse Game

Every day, websites face a myriad of attacks. Traditionally, the instinct is to identify and block these threats with standard HTTP error codes. However, this often leads attackers to become more sophisticated in their evasion tactics. Studies show defenders spend 98% of their time identifying attackers and only 2% on read more…

Every day, websites face a myriad of attacks. Traditionally, the instinct is to identify and block these threats with standard HTTP error codes. However, this often leads attackers to become more sophisticated in their evasion tactics. Studies show defenders spend 98% of their time identifying attackers and only 2% on response strategies. This talk will delve into the importance of alternative blocking strategies, with a focus on deception, and how it can be effectively used to slow down and frustrate attackers.

Bio

Stephen Kiel

Director of Technology Partnerships Fastly

Sponsored by

Presentation

9:15 am

Rolling for Resilience: Turning Tabletop Exercises into Strategic Readiness Campaigns

In many organizations, tabletop exercises are treated as annual compliance events… predictable scenarios, scripted discussions, and binders opened only when auditors are watching.  Rolling for Resilience challenges this approach, arguing that true incident readiness is not built through checklist theater but through intentional design, engagement, and cross-functional alignment.  Drawing from read more…

In many organizations, tabletop exercises are treated as annual compliance events… predictable scenarios, scripted discussions, and binders opened only when auditors are watching.  Rolling for Resilience challenges this approach, arguing that true incident readiness is not built through checklist theater but through intentional design, engagement, and cross-functional alignment.  Drawing from experience in security leadership, penetration testing, and incident response strategy, Giovanni Cofré explores how immersive, well-structured tabletop exercises can reveal communication gaps, decision bottlenecks, and leadership misalignment long before a real breach occurs.  Using a narrative framework inspired by campaign-based strategy and gamification, this session examines how engagement fosters psychological safety, how communication pathways shape incident outcomes, and how departmental playbooks must translate into actionable field guides when pressure rises.  Rather than focusing solely on preventing every possible attack, this talk emphasizes building disciplined response capability.  Ensuring that when the horn sounds, teams know who moves first, who decides, and how action unfolds in real time.  Attendees will gain practical insight into transforming tabletop exercises into measurable readiness programs that strengthen coordination, clarify executive roles, and build resilience before the first breach occurs.

Bio

Giovanni Cofré

Consultant Secure Ideas

Sponsored by

Presentation

9:45 am

AI Cybersecurity’s Double Edge Sword

Bio

Victor Cotorobai

Solution Architect ESET

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am
Bio

Naomi Buckwalter

Senior Director of Product Security Contrast Security

Sponsored by

11:15 am

Building a Response Strategy

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

The Information We Keep Siloed: A Hidden Vulnerability

In today’s fast‑moving threat environment, silence is a vulnerability. It slows detection, hides attack patterns, fuels repeat intrusions, and creates cascading impacts that put your organization at greater risk. Silence anywhere increases risk everywhere. Only 20% of organizations hit by a major ransomware operation reported it. Silence from the remaining read more…

In today’s fast‑moving threat environment, silence is a vulnerability. It slows detection, hides attack patterns, fuels repeat intrusions, and creates cascading impacts that put your organization at greater risk. Silence anywhere increases risk everywhere.

Only 20% of organizations hit by a major ransomware operation reported it. Silence from the remaining 80% left critical intelligence unused and allowed the threat to move through the interconnected systems that power daily life. The campaign hit critical infrastructure including energy, healthcare, and financial services, disrupting essential services and causing significant economic damage. Officials were clear: earlier reporting would have provided superior insights and a clearer picture of the threat, likely slowing or stopping it sooner.

This keynote shows why trusted information sharing among peers, community networks, and partners is now mission‑critical — and how your organization can help close this vulnerability by building those relationships before an incident. Attendees will leave with practical steps to strengthen information‑sharing practices and a clear roadmap for using CISA’s voluntary, no‑cost services to boost visibility and collective defense.

Bio

Arielle Baine

Chief of Cybersecurity Cybersecurity and Infrastructure Security Agency
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

The Risks Behind Multi-Channel Attacks

Gone are the days when threat actors relied on a single email or file to deliver malware. Today, attackers continuously innovate, combining multiple delivery techniques—often augmented by large language models (LLMs). These techniques are not only becoming more sophisticated in identifying the right victims, but also leave a substantial footprint read more…
Gone are the days when threat actors relied on a single email or file to deliver malware. Today, attackers continuously innovate, combining multiple delivery techniques—often augmented by large language models (LLMs).
These techniques are not only becoming more sophisticated in identifying the right victims, but also leave a substantial footprint by targeting multiple attack surfaces across your environment.
Join this session as we explore real-world examples and the diverse channels attackers use to deceive victims, evade detection, and identify their ideal targets.
Bio

Bart Lenaerts-Bergmans

Product Strategist - Threat Intelligence Infoblox

Sponsored by

Presentation

2:15 pm

Guarding Tomorrow: AI’s Edge in Security Ops

This presentation dives into how AI’s transforming security operations today and shaping cybersecurity’s future. We’ll explore real-world roles like threat detection, automated responses, and predictive analytics, plus insights on booming AI stocks driving these innovations—like key players in the sector and their impact on the market.

This presentation dives into how AI’s transforming security operations today and shaping cybersecurity’s future. We’ll explore real-world roles like threat detection, automated responses, and predictive analytics, plus insights on booming AI stocks driving these innovations—like key players in the sector and their impact on the market.

Bio

John Davies

Principal Sales Engineer Arctic Wolf

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

3:00 pm

Security Blindspots

3:30 pm

Identifying Threats in your Workplace

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Jessica Hoffman

Deputy Chief Information Security Officer & HIPAA Security Officer City of Philadelphia
Bio

Hazel Cerra

National Security & Risk Governance Executive U.S. Secret Service
Bio

Dr. Jamaine Mungo

Chief Information Security Officer Philadelphia International Airport
Bio

Melina Scotto

Executive VP and Founder | Mastin and Associates Former CISO and VP CyberSecurity | Fortune 500 Hospitality Org
Bio

Mike Elkins

Chief Information Security Officer Humanis Technologies
5:15 pm

Closing Remarks