San Diego Cybersecurity Conference

Wednesday, September 10, 2025

Wyndham San Diego Bayside

PARKING/DIRECTIONS

Hybrid

Join Us in San Diego for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Rebuild Your Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Tony Bailey

Product Marketing Director Contrast Security

Sponsored by

Presentation

9:30 am

Detect Ransomware Instantly with AI-Powered Infrastructure

In a world where ransomware evolves by the minute, the speed of detection is the difference between minor disruption and major loss. Learn how cutting-edge AI models integrated with intelligent storage systems can identify ransomware the moment it strikes, analyzing data in real time as it’s written. Reduce recovery times read more…

In a world where ransomware evolves by the minute, the speed of detection is the difference between minor disruption and major loss. Learn how cutting-edge AI models integrated with intelligent storage systems can identify ransomware the moment it strikes, analyzing data in real time as it’s written. Reduce recovery times from days to minutes and gain visibility across your entire IT environment. See how advanced threat detection, automated alerts, and seamless integrations with your existing security tools empower your organization to stay one step ahead of cyber threats.

Bio

Todd Virnoche

Data Solutions Architect IBM

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Foundation of Strong Security: Demystifying CIS Controls 1 & 2 for Enterprise Success Controls

Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them read more…

Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them in ways that drive real outcomes rather than just checking compliance boxes. You will gain practical guidance to improve efficiency, reduce risk, and translate security requirements into meaningful results.

Bio

Dan Jackobs

Senior Solutions Engineer Axonius

Sponsored by

Presentation

11:00 am

The Current Threat Landscape Requires a Unique Approach

As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of read more…
As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of threat actors and the successes they have had calls for a different approach, one that addresses mitigation of both risks and threats. Finally, we will conclude with an in-depth case study of a recent breach to see how this unique approach could have mitigated the attack
Bio

Karen Nguyen

Principal Systems Engineer Forescout Technologies

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

The Future of Security: Surviving the AI & Quantum Shift

The session addresses critical security challenges emerging from AI’s rapid advancement and the looming threat of quantum computing. It examines the “false security paradox” where organizations dismiss future quantum threats despite current devices remaining operational when quantum computers become viable, and explores the evolution of AI-driven attacks including agentic AI, read more…

The session addresses critical security challenges emerging from AI’s rapid advancement and the looming threat of quantum computing. It examines the “false security paradox” where organizations dismiss future quantum threats despite current devices remaining operational when quantum computers become viable, and explores the evolution of AI-driven attacks including agentic AI, context hijacking, and autonomous attackers. The talk also covers quantum-specific risks like the “hold now, decrypt later” strategy, where adversaries collect encrypted data today for future quantum decryption. Attendees will receive a practical 90-day implementation roadmap covering asset inventory, vendor risk assessment, and security controls to build quantum-resistant, AI-aware systems from the ground up.

Bio

Jacob Combs

VP of Cybersecurity, Chief Information Security Officer | Enterprise & Product Security, Governance Tandem Diabetes Care
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Cyber Defense Strategies For Earlier Detection and Faster Response

Bio

Hamlet Khodaverdian

Co-Founder & Vice President, Americas LMNTRIX

Sponsored by

2:00 pm

What’s Your Security Strategy?

Bio

Den Jones

Founder & CEO 909Cyber

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Jared Walter

Senior Solutions Engineer Sophos

Sponsored by

Presentation

3:15 pm

Moving Towards a Zero Trust Mindset with Email Security

Email is the top communication tool—and the top attack vector. This session explores how a Zero Trust approach strengthens email security against phishing, BEC, and account takeovers. We’ll compare traditional and modern security methods, highlighting strategies like link isolation and post-delivery retraction to reduce risk

Email is the top communication tool—and the top attack vector. This session explores how a Zero Trust approach strengthens email security against phishing, BEC, and account takeovers. We’ll compare traditional and modern security methods, highlighting strategies like link isolation and post-delivery retraction to reduce risk

Bio

Alex Kuck

Principal Solutions Engineer Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Darin Andersen

CEO & Co-Founder NXT Robotics
Bio

Rajesh “Raj” Arora

Vice President- Data Platform Engineering MUFG - Union Bank
Bio

Gary Hayslip

Senior Security Executive in Residence Halcyon.ai
Bio

Drew Martin

Chief Information Officer FAT Brands Inc. ·
Bio

Rosalia Hajek

Chief Information Security Officer Topgolf Callaway Brands
Bio

Justine Phillips

Partner Baker McKenzie | Cyber Attorney
5:00 pm

Closing Remarks