Home / / Denver, CO

Denver Cybersecurity Conference

Thursday, June 1, 2023

Live In Person @ DoubleTree Denver Tech Center

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

"Truths - Myths - Maybes"

Merlin Namuth

Chief Information Security Officer REPAY - Realtime Electronic Payments

Accomplished Information Security Leader – 26 years IT experience with the past 23 years focused on Information Security

I started my career in hands-on systems and network administration roles and worked my way up to building and leading security programs in small and medium sized companies. In addition, I architected and engineered multi-million dollar complex security solutions spanning several global locations. My passions include continuous improvement of security programs and creating healthy, productive teams. I have years of experience working with executive and senior leadership, including company owners. I not only enjoy leading security teams and working with the business on security initiatives, but I also stay current with emerging security technologies.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Merlin Namuth

Chief Information Security Officer
REPAY - Realtime Electronic Payments

Bio

Mohamed Malki

Entreprise Security Architecture , Director
State of Colorado Governor's Office of Information Technology

Bio

Cody Burrows

CISO/Penetration Tester/Architect/Engineer, Cyber Perimeter Security
| VP - Director of Security Assurance, CXLoyalty (JP Morgan Chase

Bio

Dr. Michael Hutchison

Vice President; Information Security
Bank of America

Bio

Quintana Patterson

IT Clinical and Compliance Manager
University of Colorado Anschutz Medical Campus

Bio

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:15 am

The power of Threat - Informed Defense

Threat-informed defense is a strategic approach to cybersecurity that combines threat intelligence with traditional security measures and threat analysis. During this presentation you’ll learn how to form a strategy that can proactively identify threats before they can cause damage or disruption.

Jeffrey Wheat

CTO Lumu
Bio

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Science of Normal: Changing cybersecurity and your poker game

You wouldn’t play poker blind, so why search for cyberthreats without analytics?

Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security related content including pre-built reports, dashboards, and visualizations can handle common security and compliance requirements. Analytics ensure sound security postures so organizations don’t fold to cyber threats.

By simplifying the review of an enterprise data lake using easily implemented data science with scaled analytics, you can eliminate blind spots and significantly improve your organization’s cybersecurity framework. We’ll also show you how the SOC can extract the most value from security data, plus we’ll share many more stealth tips for your advantage.

Bob Reny

CTO and Principal SE Exabeam
Bio

Presentation

11:00 am

API’s: The Users Best Friend but Your Data’s Worst Nightmare

API’s have exploded over the last couple of years as the pandemic changed the way organizations do business and how they relate to their users. This has served to drastically increase the number of doors open to the Data. But what hasn’t changed is the target. With Data still in the crosshairs, the challenge of protecting that data has increased accordingly.

Learn what organizations are doing today to mitigate the threat to Data from the exponential increase in access to that data via the explosion of API’s and API access points.

Paul Steen

Principal Solutions Engineer Imperva, Inc
Bio

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

"Truths - Myths - Maybes"

Merlin Namuth

Chief Information Security Officer REPAY - Realtime Electronic Payments
Bio

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The Guide to Digital and Device Supply Chain Security

In today’s interconnected world, the digital and device supply chain has become increasingly complex, making it more vulnerable to security threats and attacks. As organizations rely on a myriad of devices and software to drive their operations, ensuring the integrity and security of the supply chain is paramount.

In this session, we will cover:

  • Introduction to the digital and device supply chain: Understanding the interconnected ecosystem of hardware, software, and services

  • Understanding the Attack Surface Below the OS: Identifying potential weak points and vulnerabilities in the supply chain

  • Best practices for supply chain security: Proactive measures to strengthen security, including risk assessments, secure sourcing, verification and authentication processes, and supply chain visibility.

David Cundiff

VP of Technical Services and Solutions Eclypsium
Bio

Presentation

2:00 pm

How to be Unhackable

Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review these proven solutions and which ones must be implemented today.

Robert Kauffman

Senior Systems Engineer Versa Networks
Bio

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Stories from the Front Lines: SOC Edition

There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include:

  • The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat
  • From the UK to Aliens to Pink Floyd: The British Hacker Story
  • The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach

Daniel discusses not only the story of what happened, but the tools and techniques used and developed that brought success.

Daniel Smallwood

Threat Researcher and Engineer LiveAction
Bio

Networking

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

3:30 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Merlin Namuth

Chief Information Security Officer REPAY - Realtime Electronic Payments
Bio

Mohamed Malki

Entreprise Security Architecture , Director State of Colorado Governor's Office of Information Technology
Bio

Cody Burrows

CISO/Penetration Tester/Architect/Engineer, Cyber Perimeter Security | VP - Director of Security Assurance, CXLoyalty (JP Morgan Chase
Bio

Dr. Michael Hutchison

Vice President; Information Security Bank of America
Bio

Quintana Patterson

IT Clinical and Compliance Manager University of Colorado Anschutz Medical Campus
Bio

Closing Remarks

4:30 pm

Closing Remarks

Register

Share This