Phoenix Cybersecurity Conference

Thursday, November 13, 2025

Hyatt Regency Phoenix

PARKING/DIRECTIONS

Hybrid

Join Us in Phoenix for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am
Bio

Mike Stone

Senior Enterprise Solutions Engineer Cloudflare

Sponsored by

Presentation

9:15 am

Cyber Defense Strategies For Earlier Detection and Faster Response

Bio

John Minasyan

Chief Operating Officer LMNTRIX

Sponsored by

Presentation

9:45 am

Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all here at Veeam. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes read more…

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all here at Veeam. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Senior Systems Engineer Benjamin Petersen will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyberthreats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Benjamin will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

Bio

Benjamin Petersen

Systems Engineer/Architect Veeam

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Current Threat Landscape Requires a Unique Approach

As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of read more…
As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of threat actors and the successes they have had calls for a different approach, one that addresses mitigation of both risks and threats. Finally, we will conclude with an in-depth case study of a recent breach to see how this unique approach could have mitigated the attack
Bio

Eric Vanderbur

Solutions Architect, Global Alliances and Partners Forescout Technologies, Inc.

Sponsored by

11:15 am

Cyber Security Fundamentals

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Fireside Chat

12:15 pm

Real Talk: Leadership, Lessons & the Road Ahead

Bio

Michael Manrod

Chief Information Security Officer Grand Canyon Education, Inc.
Bio

Bianca Lochner, Ph.D.

Chief Information Officer City of Scottsdale
Bio

Errika Celsy

Chief Privacy and Compliance Officer Arizona Department of Homeland Security
Bio

Michael McAndrews

Chief Information Security Officer Archwell Holdings
Bio

Joshua Wycoff

Deputy Chief Information Security Officer Judicial Branch of Arizona in Maricopa County
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

The Ransomware Diaries: Tales of Attack, Response, and Resilience

The modern cybersecurity landscape is a high-stakes diary of evolving threats, and with this presentation, we will take you inside a day in the life of a modern ransomware attack, illustrating how the game is changing with the help of AI.  The financial fallout is staggering, with losses continuing to read more…

The modern cybersecurity landscape is a high-stakes diary of evolving threats, and with this presentation, we will take you inside a day in the life of a modern ransomware attack, illustrating how the game is changing with the help of AI.  The financial fallout is staggering, with losses continuing to grow for businesses of all sizes. The average cost of a ransomware attack can be in the millions, but the reputational damage and operational disruption are often far greater.

We will cover why ransomware is so successful today referencing leading industry cyber threat reports and show that a prevention approach to security is not enough. We will demonstrate why a proactive posture is essential for survival and security resilience that delivers far more favorable outcomes.

Bio

Trevor Park, CISSP

Sr. Director of Advanced Security Solutions

Sponsored by

Presentation

2:15 pm

What Good Looks Like: A Story-Driven Guide to Building Lasting Cybersecurity Programs

What makes a good cybersecurity security program? Harder question: how do you build one from scratch—and keep it operational while doing so?  In this story-driven session, I’ll walk through real-world lessons learned from building cybersecurity programs across multiple industries as a consultant and vCISO. These are programs that not only read more…
What makes a good cybersecurity security program?
Harder question: how do you build one from scratch—and keep it operational while doing so?
 In this story-driven session, I’ll walk through real-world lessons learned from building cybersecurity programs across multiple industries as a consultant and vCISO. These are programs that not only met compliance requirements but evolved into mature, sustainable, and scalable operations—even after I transitioned them to new leaders.
 Attendees will learn:
  • Key controls and governance processes that form the bedrock of every high-functioning cybersecurity program
  • Practical playbooks and frameworks you can adopt to scale quickly and build maturity while still responding to daily fires
  • How to align program structure to business context—whether you’re supporting healthcare, public sector, or private enterprise
  • Common pitfalls to avoid when building a program while running it (hint: it’s more common than you think)
 You’ll walk away with templates, models, and diagrams—ready to apply to your own environment, no matter where you are in your cybersecurity journey.
Bio

Andy Jordan

Founder/Owner New Genesis Solutions

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

3:00 pm

Cyber Security Predictions

Presentation

3:30 pm

Every APP & API Needs DDoS Protection

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense read more…

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.

Bio

Rick Horwitz

Sr. Sales Engineer Fastly

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Bindi Davé

Deputy CISO DigiCert
Bio

James Baird

Chief Information Security Officer GoTo Foods
Bio

Steven Murray

Chief Information Security Officer / VCISO GXO Logistics, Inc.
Bio

Derek Cunningham

Vice President, Security & Chief Information Security Officer ScriptPro
Bio

John Parsons

Chief Technology & Operations Officer Integro Bank
Bio

Dara Gibson

President InfraGard Arizona Members Alliance
5:15 pm

Closing Remarks