Salt Lake City Cybersecurity Conference
Thursday, August 21, 2025
Hybrid




























Join Us in Salt Lake City for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
Derek Booth
Supervisory Special Agent U.S. Secret Service
U.S. Secret Service ATSAIC Derek Booth is a founding member of the Mountain West Cyber Fraud Task Force (MWCFTF) which consists of 300+ members of federal, state and local law enforcement, network security personnel, private business owners, and academia partners in the Rocky Mountain Region. The MWCFTF’s mission is to investigate cybercrime in the Mountain West States while supporting our task force partners’ cyber investigations including Ransomware, Network Intrusion attacks, ATM & Gas Pump Skimming, Business Email Compromise, and Computer/Cellphone Forensics. Derek became a Computer/Cellphone Forensic Examiner in 2012 after spending his first 13 years on the job protecting a plethora of dignitaries including President George W. Bush and family full-time. Derek graduated from Southern Utah University with a Master’s in Accounting and is originally from St. George, Utah
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Randy Dickey
Sr Director, IT Infrastructure & Ops Evergy
Shalini Kesar
Professor & Director of MS-CSIA President & Co-Founder of WiCyS Utah
Chris Stucker
Deputy Chief Information Security Officer Froedtert ThedaCare Health
Derek Booth
Supervisory Special Agent U.S. Secret Service
Hayley McCormick
Director, Cyber Fraud United Airlines


Sponsors
Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors







Silver Sponsors














Partner







“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Security Blindspots
Presentation
Breaking Down Silos: Unify Assets, Minimize Attack Exposure
In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.
Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.
As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.
Sponsored by

Zero Trust Best Practices
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Tricks for Endpoint Security
Building a Response Strategy
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Securing Data Flow in the AI-Quantum Era
Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).
Join this session to learn:
- Choosing secure access methods for diverse use cases
- Adapting security to risk, user behavior and AI interactions
- Preparing for post-quantum encryption’s enterprise impact
Sponsored by

What is Cloud Security
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Every APP & API Needs DDoS Protection
The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.
Sponsored by

Current Risk Management
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!