Seattle Cybersecurity Conference
Thursday, May 15, 2025
Embassy Suites by Hilton Seattle Bellevue
Hybrid

































Join Us in Seattle for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Fundamentals - Distressingly Overlooked”
David Elfering
Chief Information Security Officer Carrix
As new threats dominate headlines, the quiet killers of cybersecurity programs remain the same: missing basics, misunderstood risk, and poorly planned resilience. David Elfering challenges the audience to rethink what true security maturity looks like. From passive risk retention to outcome-driven protection strategies, this session highlights why fundamentals — not flashy controls — are the foundation for surviving tomorrow’s inevitable disruptions.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Tony North
Senior Manager of IT Service King County, WA
Boris Goncharov
Chief Strategy Officer Amatas
Terry Williams
Chief Information Officer Open Door Community Health Centers
Marc Menninger
Director, Information Security JND Legal Administration
Cynthia Damian
Chief Information Security Officer Valon


Sponsors
Platinum Sponsors


Gold Sponsors






Silver Sponsors


















Partner









“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Rethinking Cybersecurity for Covert Application Risks
Sponsored by

Presentation
Securing the Future of Cybersecurity Protection: Essentials in an AI-Driven Digital Landscape
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Current Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by

Presentation
SOC Strategies to Detect Earlier and Respond Faster
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Fundamentals - Distressingly Overlooked
As new threats dominate headlines, the quiet killers of cybersecurity programs remain the same: missing basics, misunderstood risk, and poorly planned resilience. David Elfering challenges the audience to rethink what true security maturity looks like. From passive risk retention to outcome-driven protection strategies, this session highlights why fundamentals — not flashy controls — are the foundation for surviving tomorrow’s inevitable disruptions.
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Building a Response Strategy
Presentation
Breaking Down Silos: Unify Assets, Minimize Attack Exposure
In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.
Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.
As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Every APP & API Needs DDoS Protection
The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.
Sponsored by

Identifying Threats in your Workplace
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!