Denver Cybersecurity Conference
Thursday, July 24, 2025
Doubletree by Hilton Denver Tech Center
Hybrid


































Join Us in Denver for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“404 Plan Not Found: Building IR Strategies That Actually Work”
Merlin Namuth
Chief Information Security Officer City and County of Denver
Merlin Namuth is the Chief Information Security Officer at the City and County of Denver. He has worked in cybersecurity for over 25 years. His comprehensive experience spanning several industries includes leading 6 different security programs, creating strategy and building security programs from the ground up, advancing existing security programs, mergers and acquisitions, managing incident response teams, digital forensics, compliance, architecture, and engineering complex security solutions both on-prem and in the Cloud. Namuth has served as an advisor to security startup companies. He has presented at numerous conferences, including RSA Conference both domestically and internationally, been interviewed on renowned security podcasts, and frequently writes blogs and articles.


Sponsors
Platinum Sponsors


Gold Sponsors






Silver Sponsors



















Partner









“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The New Era of Deception: AI, Deep Fakes, and the Dark Web
Artificial Intelligence (AI) is significantly transforming social engineering tactics. Join Morgan Trust as he discusses the evolution of AI as a threat factor and how, by leveraging AI, attackers can automate and enhance phishing schemes, creating highly personalized and convincing messages that are more accurate and effective. You won’t want to miss this cutting-edge talk from a Pen Tester on the front lines!
Sponsored by

Presentation
Securing the Future: Cyber Risk Essentials in an Ai-Driven Digital Landscape
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
What is Cloud Security
Presentation
Rebuild Your Security Program from the Breach Up
Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
404 Plan Not Found: Building IR Strategies That Actually Work
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Taking A Data-First Approach to Cyber Risk Management
Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.
But does it really have to be that way?
Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:
- Improve monitoring for critical vulnerabilities to determine which ones really matter
- Identify, Prioritize and Assess affected third parties in real-time
- Leverage objective risk data into the decision-making processes
- Streamline workflows and scale your operations
Sponsored by

Presentation
How to Get Away with Cybercrime
We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries.Inthis talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Cyber Defense Strategies: For Earlier Detection and Faster Response
Sponsored by

Communicating Risk
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!