Tampa Cybersecurity Conference
Thursday, June 26, 2025
Hybrid







































Join Us in Tampa for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“Leading with humanity in the era of LLM-driven transformation.”
Rob de Cespedes III
Chief Information Security Officer General Genomics Inc.
I have always found security, both cyber and physical, to be an incredibly entertaining space to work in. Over the years, wearing many hats, I’ve had the pleasure of working with some amazing teams on 3 continents doing red and blue team work and securing a wide range of environments for an incredibly diverse set of scenarios.
As Chief Information Security Officer, my focus on proactive threat management through cutting-edge technologies and methodologies has been at the forefront of what I keep my teams concentrating on. Security policy, disaster recovery preparedness, and client/employee education have been an incredibly important part of my priorities with every single engagement. With a dedication to continuous improvement and service excellence, I strive to create a secure digital landscape, empowering stakeholders with confidence in their cybersecurity infrastructure.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Stephan Gonzalez
Chief Information Security Officer Achieva Credit Union
Daniel Jarboe
SVP of IT & CISO American Coastal Insurance Corporation
Rich Latayan
Chief Information Security Officer AAA National
Rob de Cespedes III
Chief Information Security Officer General Genomics Inc.
Valerie Perlowitz
Senior Vice President WiCyS Florida Affiliate


Sponsors
Platinum Sponsors



Gold Sponsors





Silver Sponsors


























Partner







“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Tampa Airport Marriott
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Rebuild Your Software Security Program from the Breach Up
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.
This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by

Presentation
Shall I Certify You Sir?
Have you been tasked with obtaining a certification for your company? Which one? How? What does this involve? These questions and more will be answered so that you can gain support from your company and know which standard/frameworks are right for you.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Convergence of Networking and Security
As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls.
With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks.
Sponsored by

Presentation
Today’s Threat Landscape Requires a Unique Approach
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Leading with humanity in the era of LLM-driven transformation.
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Ransomware: A Security Reference Architecture
We will dive into the increasing threat posed by ransomware and why it’s critical to address this challenge head-on. Myriad360 will explain the value of a Reference Architecture in building a strong defense against these attacks. They will also explore how ransomware tactics are continuously evolving, requiring organizations to stay agile in their security approach. Lastly, they touch on other key factors that should be considered when planning a comprehensive cybersecurity strategy to protect against ransomware and other threats.
Sponsored by

Presentation
A Governance-Driven Holistic Approach to Cybersecurity
Cybersecurity is no longer just a technical issue. It’s a core component of strategic business leadership and organizational resilience that must be embedded into the fabric of enterprise governance. This session explores how a governance-driven, holistic approach to cybersecurity empowers organizations to align security initiatives with business objectives, manage risk proactively, and build resilience across all operational domains.
Attendees will gain insights into establishing executive accountability, defining clear roles and responsibilities, and integrating cybersecurity into strategic planning, compliance, and enterprise risk management frameworks. Real-world examples will illustrate how governance frameworks such as NIST CSF, ISO 27001, and CIS Controls can be leveraged not only to enhance security posture but to strengthen organizational decision-making and drive sustainable value.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Fix What Matters: A Roadmap for CTEM-Driven Remediation
Security teams don’t have a visibility problem; they have an action problem. With findings everywhere, the real challenge is knowing what to fix, when, and how to move fast. This session will break down Gartner’s CTEM framework and explore how organizations are using it to prioritize risk, reduce noise, and improve remediation outcomes. Whether you’re just getting started or scaling up, you’ll leave with a clearer understanding of how to make vulnerability & exposure management more focused and effective.
Sponsored by

Presentation
Cyber Risk Quantification – A Smarter Approach to Cyber Resilience
-
Quantifies Potential Cyber Financial Risks (assign dollar values to cyber risk scenarios)
-
Optimizes Investments (ensures spending is aligned with the highest cyber risk areas)
-
Supports Compliance and Insurance Needs (provides defensible metrics for compliance and cyber insurance)
-
Enhances Executive-Level Communications (translate cybersecurity into business terms executives understand)
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!