Tampa Cybersecurity Conference

Thursday, March 12, 2026

Embassy Suites by Hilton Tampa USF Near Busch Gardens

PARKING/DIRECTIONS

Hybrid

3705 Spectrum Boulevard, Tampa, Florida, 33612

Join Us in Tampa for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

The Missing Layer: Closing the Application Security Gap in Defense-in-Depth

Defense in depth has long been the cornerstone of cybersecurity, layering protections across networks, endpoints, identity, and cloud environments. Yet today’s threat landscape — driven by sophisticated nation-state actors, automated attacks, and increasingly capable adversaries — continues to outpace traditional defenses. As development accelerates from waterfall to Agile, CI/CD, and read more…
Defense in depth has long been the cornerstone of cybersecurity, layering protections across networks, endpoints, identity, and cloud environments. Yet today’s threat landscape — driven by sophisticated nation-state actors, automated attacks, and increasingly capable adversaries — continues to outpace traditional defenses. As development accelerates from waterfall to Agile, CI/CD, and AI-assisted code generation, attackers are increasingly targeting applications in production, where visibility and prevention are lacking. Many organizations rely on Web Application Firewalls as their primary safeguard, but no single control is infallible, leaving a critical gap in the security stack. This session explores why runtime application protection is the missing layer in modern defense-in-depth strategies and how strengthening it prepares organizations not only for today’s attacks, but for emerging risks like quantum-driven cryptographic disruption.
Bio

Tom Houpt

Channel Solutions Engineer Contrast Security

Sponsored by

Presentation

9:30 am

Shall I Certify You, Sir?

“Shall I Certify You, Sir?” explores the certification landscape and how it has changed, identifying opportunities, consequences, and challenges most companies will need to plan for when seeking certification to a standard or framework. It will provide the advantages so that you can speak to your organization about the return read more…

“Shall I Certify You, Sir?” explores the certification landscape and how it has changed, identifying opportunities, consequences, and challenges most companies will need to plan for when seeking certification to a standard or framework. It will provide the advantages so that you can speak to your organization about the return on investment certification will bring and how to provide value to the certification process.

Bio

Paige Needling

CEO Needling Worldwide

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Security Program Modernization

Bio

Dan Waters

Strategy and Transformation Leader AccessIT Group

Sponsored by

Presentation

11:00 am

AI: Cybersecurity’s Double Edge Sword

Bio

Neil Youshak

Solutions Engineer ESET

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Forging a Sentinel: Strategic Thinking for Cyber Threats

The cybersecurity industry is locked in a technological arms race, yet breaches are at an all-time high. We have trained operators to supervise tools, but we have neglected to forge the strategic, intuitive guardians, Sentinels, required for the modern battlefield. In this session, author and CIO Nick DeMeo introduces a read more…
The cybersecurity industry is locked in a technological arms race, yet breaches are at an all-time high. We have trained operators to supervise tools, but we have neglected to forge the strategic, intuitive guardians, Sentinels, required for the modern battlefield.
In this session, author and CIO Nick DeMeo introduces a powerful framework for defense centered on the Human-AI Nexus. Moving beyond “alert fatigue” and reactive monitoring, attendees will learn how to cultivate “Vigilant Paranoia” and apply military-grade strategic thinking (the OODA loop) to disrupt the adversary’s decision cycle. Whether operating with a multi-million dollar budget or “living off the land” with zero resources, this session provides a roadmap for transforming a security team from a passive cost center into an active, resilient shield.
Learning Objectives
By the end of this session, attendees will be able to:
Bio

Nicholas DeMeo

Chief Information Officer Vista Clinical Laboratory
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

AI-generated code: Maximize gains, minimize risks

Bio

Edouard Viot

CTO Symbiotic Security,

Sponsored by

Presentation

2:00 pm

AI in Cybersecurity: Friend, Foe, or Both?

 AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits — automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection. But AI is a double-edged sword. While security teams use it to read more…
 AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits — automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection.
But AI is a double-edged sword. While security teams use it to predict and stop attacks, cybercriminals exploit it to craft sophisticated phishing campaigns, deepfakes, and adaptive malware.
This session explores AI’s evolution, its rapid rise in business environments, and its expanding role in today’s cybersecurity arms race. You’ll walk away with practical insights and clear steps to help your organization use AI securely, responsibly, and effectively.
Bio

Steve Weber

Team Lead, Global Solutions Engineering Sophos

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

AI Security in the Real World: Today’s Exploits, Practical Frameworks, and Audit-Ready Controls

Generative AI and agentic workflows have expanded the attack surface in ways classic AppSec programs don’t fully cover. This session cuts through hype to focus on real threats happening now—including prompt injection and jailbreaks, sensitive data disclosure via chat and RAG pipelines, supply-chain compromise in model/tooling ecosystems, excessive agent permissions, read more…

Generative AI and agentic workflows have expanded the attack surface in ways classic AppSec programs don’t fully cover. This session cuts through hype to focus on real threats happening now—including prompt injection and jailbreaks, sensitive data disclosure via chat and RAG pipelines, supply-chain compromise in model/tooling ecosystems, excessive agent permissions, and model abuse such as denial-of-service and theft. We’ll translate these AI-specific risks into cyber risk language (CIA impact, threat modeling, control objectives) using widely adopted references like the OWASP Top 10 for LLM and Agentic Applications and MITRE ATLAS.

Bio

Angela Polania

Founder Elevate Consult
Bio

Joe Cortese

Technical Knowledge Leader and Research & Development Director A-LIGN

Sponsored by

Presentation

3:15 pm

How to Improve Business Resilience Through Identity-First Security

Ransomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom—none of these options can prevent a business-ending attack. One step that is key to operational and business resilience? A dedicated, identity-first cybersecurity plan. In this session, Chris Ingle (Senior Solutions Architect, read more…
Ransomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom—none of these options can prevent a business-ending attack. One step that is key to operational and business resilience? A dedicated, identity-first cybersecurity plan.
In this session, Chris Ingle (Senior Solutions Architect, Semperis) explains why the ability to protect and quickly recover your core identity systems—Microsoft Active Directory (AD) and Entra ID, for most enterprise organizations—is vital to successful cyber disaster recovery. You’ll learn:

The true cost of cybercrime

    • Why Gartner recommends an AD-specific security strategy
    • Why fast AD recovery is important and why so many companies fail to achieve it
    • The next steps to protect your hybrid AD environment
Bio

Chris Ingle

Senior Solutions Architect Semperis

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Ron Bevans

Chief Information Security Officer BenefitHub
Bio

Bruce W. Beam

Global Chief Information Security Officer Galway Holdings
Bio

Wes Knight

Chief Information Security Officer Needling Worldwide
Bio

Nicholas DeMeo

Chief Information Officer Vista Clinical Laboratory
5:00 pm

Closing Remarks