Home / / Denver, CO (Western Region)

Virtual Western | Denver CyberSecurity Conference

Wednesday, December 1, 2021 @ 8am MT

(CA, TX, CO, WA, AZ, OR, UT, OK)

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker


Future-proof your red team.

David Hunt

Chief Technology Officer Prelude

David Hunt is the CTO of Prelude. David specializes in building teams which bridge cybersecurity with best-practice technology. Before coming to Prelude, David spent two years at MITRE Corporation in a dual-role as head developer and project lead for the CALDERA adversary emulation framework. David designed CALDERA v2 from the ground up and instrumented a plan which made it the industry leader in open-source breach and simulation. Prior to this work, David spent 15 years in offensive security and management roles, ranging organizations like Rockwell Collins, John Deere, Kenna Security and FireEye. While at FireEye, David personally oversaw the storage and access of Mandiant’s threat intelligence data, as the leader of the (then secretive) Nucleus team. Over the years, David has also worked as a contractor for several U.S. intelligence agencies, working domestically and internationally, as a principal security specialist.

CISO/Industry Leader Panel

“Global Cyber Trends and Predictions for 2022”

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances


Jonathan Fowler

Chief Information Security Officer


Frank Balonis

Chief Information Security Officer and SVP Operations


Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television
Chief Security Advisor, SentinelOne


Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors



Times are subject to change

8:00 am – 8:05 am

Opening Introductions

9:00 am – 9:25 am

Rise of Secure Access Service Edge (SASE)

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases. Architectural considerations you should keep in mind when comparing SASE vendors. 

Kevin Sheu

Senior VP of Marketing Bitglass


9:25 am – 10:00 am

Modern Security Programs – IT Evolution to Security Revolution

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Daniel Clayton

VP Global Security Operations and Services Bitdefender


10:15 am – 11:15 am

Future-proof your red team.

As definitions go, what constitutes as a red team is a hotly debated topic in cybersecurity. And just as controversial is the topic of red team automation. Is it possible to automate a red team? Or are only defensive (blue) tools intended to be automated? And just why is automated red teaming such a heated topic in the industry?

In this talk, I will answer these questions by examining the role of offensive security in an organization’s Standard Operating Procedures. Describing red teaming by its functional role will help us better understand where and when automation plays a role today – and pinpoint where it may accelerate in the future.

David Hunt

Chief Technology Officer Prelude


11:30 am – 11:55 am

Conquering Cyber Risk in 3rd Party Communications

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Bob Ertl headshot

Bob Ertl

Sr. Director, Product Marketing Accellion

Panel Discussion

11:55 am – 12:55 pm

“Global Cyber Trends and Predictions for 2022”

A forward look at global breaking trends and predictions in cybersecurity.

Laureen Smith headshot

Laureen Smith

VP Global Strategic Alliances Accellion

Jonathan Fowler

Chief Information Security Officer Consilio

Frank Balonis

Chief Information Security Officer and SVP Operations Kiteworks

Morgan Wright

Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne

1:10 pm – 1:40 pm

Protecting Your Organization from the Business of Ransomware

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative?

Join this session to learn more about:

  • The business of ransomware
  • The evolving threat landscape
  • Ransomware Protection Tactics and Techniques
  • Your Security Roadmap for Hybrid and Remote Workers
  • Leveraging an EDR with Limited Security Staff

Robert Zamani

Senior Director of Engineering Malwarebytes

1:40 pm – 2:05 pm

Building a Response Strategy to Advanced Threats

Jeff Costlow

Deputy CISO ExtraHop

2:20 pm – 2:45 pm

Cyber Resilience for Digital Operations

Security operations needs context awareness to ensure the success of business initiatives in a world of advanced, targeted attacks. Netenrich empowers security, IT and cloud operations to thrive during adversity with adaptive incident resolution using real time, data driven risk and trust-based decision making. The Netenrich Resolution Intelligence platform streamlines the process of managing, analyzing, and fixing the root cause of incidents to prevent future disruption.

Christopher Morales

CISO and Head of Security Strategy Netenrich


2:45 pm – 3:15 pm

Getting Ahead of the Ransomware Operations Lifecycle

The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to include associated initial access techniques, ransomware-related business models, and our newest data around monetization schemes being leveraged by the eCrime extortion community. Lastly, CrowdStrike will close by proposing actionable recommendations that organizations can undertake in order to harden their cybersecurity environment against the ransomware threat.

Jason Rivera

Director, Strategic Threat Advisory Group, Global CrowdStrike


3:30 pm – 4:00 pm

Leveraging IAM for Effective and Efficient Threat Mitigation

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business

Lonnie Benavides

Head of Infrastructure and Application Security OneLogin


4:00 pm – 4:30 pm

Navigating Your XDR Strategy with AI Prevention First Approach

With the ever changing Cyber Threat Landscape, using next generation tactics, techniques and procedures, the complexity of maintaining cyber resiliency while executing next generation cyber technology provides many challenges for organizations.  Please join me in reviewing how an AI technology enabled Zero Trust centric approach to your cyber strategy can improve your security posture focusing on an XDR directional position.

Todd Berger

Head of Solution Engineering AMERs BlackBerry


4:35 pm – 5:05 pm

Securing Trust - How The Security Leader Enables Business Outcomes

What is the value of trust for a company, and what role does a security leader play to enable it? Join Advisory CISO Helen Patton in this informative session, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.

Helen Patton

Advisory CISO Cisco at Duo Security

5:05 pm – 5:10 pm

Closing Remarks

Registration isn’t open yet. Check back soon!

Share This