Tampa Cybersecurity Conference
Thursday, March 12, 2026
Embassy Suites by Hilton Tampa USF Near Busch Gardens
Hybrid
3705 Spectrum Boulevard, Tampa, Florida, 33612
Join Us in Tampa for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Keynote Speaker
“Forging a Sentinel: Strategic Thinking for Cyber Threats”
Nicholas DeMeo
Chief Information Officer Vista Clinical Laboratory
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Sponsors
Premier Platinum Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Bronze Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The Missing Layer: Closing the Application Security Gap in Defense-in-Depth
Sponsored by
Presentation
Shall I Certify You, Sir?
“Shall I Certify You, Sir?” explores the certification landscape and how it has changed, identifying opportunities, consequences, and challenges most companies will need to plan for when seeking certification to a standard or framework. It will provide the advantages so that you can speak to your organization about the return on investment certification will bring and how to provide value to the certification process.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Security Program Modernization
Sponsored by
Presentation
AI: Cybersecurity’s Double Edge Sword
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Forging a Sentinel: Strategic Thinking for Cyber Threats
-
Identify and Pivot: Recognize the “Tool Supervisor Trap” and transition their team toward an Active Defense posture.
-
Master the Nexus: Implement a “Centaur” model of defense that fuses human intuition with the speed and scale of AI.
-
Apply Strategic Frameworks: Utilize the OODA loop to move two steps ahead of the threat actor.
-
Resource Optimization: Apply “Sentinel” principles to harden an environment using existing assets and “living off the land” techniques.
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
AI-generated code: Maximize gains, minimize risks
Sponsored by
Presentation
AI in Cybersecurity: Friend, Foe, or Both?
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
AI Security in the Real World: Today’s Exploits, Practical Frameworks, and Audit-Ready Controls
Generative AI and agentic workflows have expanded the attack surface in ways classic AppSec programs don’t fully cover. This session cuts through hype to focus on real threats happening now—including prompt injection and jailbreaks, sensitive data disclosure via chat and RAG pipelines, supply-chain compromise in model/tooling ecosystems, excessive agent permissions, and model abuse such as denial-of-service and theft. We’ll translate these AI-specific risks into cyber risk language (CIA impact, threat modeling, control objectives) using widely adopted references like the OWASP Top 10 for LLM and Agentic Applications and MITRE ATLAS.
Sponsored by
Presentation
How to Improve Business Resilience Through Identity-First Security
The true cost of cybercrime
-
- Why Gartner recommends an AD-specific security strategy
- Why fast AD recovery is important and why so many companies fail to achieve it
- The next steps to protect your hybrid AD environment
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!