Home / / Denver, CO

Denver CyberSecurity Conference

Wednesday, May 11, 2022 MT

Live in Person @ DoubleTree Denver Tech Center

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Keynote Speaker

Bio

Welcome to the Dark Side, we own EVERYONE’S Cookies...

Chris Roberts

vCISO, Researcher, Hacker, Consultant, Devil’s Advocate HillBilly Hit Squad

Chris is currently serving as a vCISO or advisor for a number of entities around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he’s founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures. He’s considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry. Chris has led or been involved in information security assessments and engagements for the better part of 25 years and has a wealth of experience with regulations such as GLBA, GDPR, HIPAA, HITECH, FISMA, and NERC/FERC. He has also worked with government, state and federal authorities on standards such as CMS, ISO, and NIST. Chris has been credentialed in many of the top IT and information security disciplines and as a CyberSecurity advocate and passionate industry voice, he is regularly featured in national newspapers, television news, industry publications and several documentaries.

CISO/Industry Leader Panel

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Trent Bunnell

Information System Security Officer
SAIC

Bio

Al Gardner

Vice President Information Technology
Salud Family Health Centers

Bio

Chris Roberts

vCISO, Researcher, Hacker, Consultant, Devil’s Advocate
HillBilly Hit Squad

Bio

Parker Brissette

vCISO
GRSee Consulting

Bio

Steve Winterfeld

Advisory Chief Information Security Officer
Akamai Technologies

Bio

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partners

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Conducting forensic investigations in a zero-trust environment.

The Zero-Trust security approach is quickly becoming the standard for corporations

and agencies. Within the United State government agencies, and those doing business with government agencies have been mandated to adopt a zero-trust level of security by 2024. This presentation will cover what Zero-Trust is, how it may impact the legitimate security work being carried out by you, and how investigations may be carried out in a Zero-Trust environment.

Justin Tolman

Forensic Evangelist Exterro
Bio

Presentation

9:30 am

Seize The Breach: Why breaches still occur and how to mitigate them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations

Bob Reny

CTO and Principal SE Exabeam
Bio

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Monitoring RUSSIAN Cyber Activities

What three things you should do to prepare your defenses:

Keeping our customers safe and protected is our highest priority.  The US Federal Gov’t recently issued a warning to the private sector to harden their cyber security infrastructure and defenses based on new intelligence around potential Russia cybersecurity attacks.

What can you do to prepare?

There is no way to know for certain what an attack may look like, but you can prepare.  Join us on and learn what three steps you should immediately take to protect your networks and infrastructure.

Nisaa Maragh

Head Regional Evangelist Forescout Technologies Inc.
Bio
Forescout logo

Presentation

11:00 am

Fast and Furious Attacks: Using AI to Surgically Respond

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join Nicholas Cantoni, Darktrace’s US-West Cyber Security Team Lead, to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

Nicholas Cantoni

Cyber Security Team Leader, US-West Darktrace
Bio

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

Welcome to the Dark Side, we own EVERYONE’S Cookies...

There you are! So, how’s it going? Good?

Y’all caught up on your awareness training?

Know what to click and what to avoid?

Figured out your passwords yet? (Summer20201! Doesn’t count)

Sorted out the OWASP top 10 yet?

Great!

So, feeling all good, protected, ready to fight the good fight, and do battle?

Splendid…

What if I told you it doesn’t make a damm difference…?

Really.

Like, not a difference. I mean you get that warm fuzzy feeling, and we all get a check in the audit box and go along on our merry way and feel good about things…

But it’s not going to change a damm thing.

Your ass belongs to me, and there’s nothing you can do to stop me from getting in.

Our record (March 2021) for breaking into a fully patched, XDR, UBA, NGFW, ABC, AI, ML target was 2 minutes and 6 seconds…

Our record for breaking through your web application with its containers, dockers, WAF’s and MFA’s…. about 5 minutes and that’s only because we got lost in the Amazon along the way…

So, now we’ve burst your bubble and introduced you to reality what CAN you do? What SHOULD you be doing? AND how can you reduce risks in the digital realm? WHERE is it most effective to build out security AND what the hell DO you do to make sure when I’m inside you know I’m there AND can do something about it BEFORE I wander off with all YOUR data, leaving behind a nice set of ransomed systems with an I-love-you note for $10m

Oh, and all of this is yesterday. Today we’re dealing with human hacking, tomorrow we must worry about the very fabric of space and time

Join us for a thought-provoking discussion

Chris Roberts

vCISO, Researcher, Hacker, Consultant, Devil’s Advocate HillBilly Hit Squad
Bio

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Continuous Breach Attack Simulation - A Pragmatic Approach to Your Security Portfolio

Avi Avivi, SafeBreach Chief Information Security Officer, looks at some guiding principles that make a case for using continuous breach attack simulation as one of the best ways to test and exercise your security posture. He examines the notion of abiding by the spirit of the compliance framework vs. the letter of that framework.

Avishai Avivi

CISO Safebreach
Bio

Presentation

2:00 pm

Zero Trust and Microsegmentation – Easier Than You Think

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Jeff Francis

Staff Technology Exploration Engineer, Office of the CTO Illumio
Bio

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:50 pm

The importance of understanding and knowing what’s in your software supply chain

Modern software applications and products are assembled from dozens if not hundreds of components, many of which nowadays are open-source projects.  Vulnerabilities like Log4J and Spring4Shell that came to light this year reinforce the need for organizations to rapidly mature the security of their software supply chains. The software industry is still early in our collective adoption of mature software supply chain controls. In this talk, Mr. Wisseman will share some of the best practices that organizations can take to mitigate their software supply chain exposure.

Stan Wisseman

Chief Security Strategist MicroFocus
Bio

Networking

3:20 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Break

3:50 pm

Prize Drawings | Honoree Awards

Panel Discussion

4:00 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Trent Bunnell

Information System Security Officer SAIC
Bio

Al Gardner

Vice President Information Technology Salud Family Health Centers
Bio

Chris Roberts

vCISO, Researcher, Hacker, Consultant, Devil’s Advocate HillBilly Hit Squad
Bio

Parker Brissette

vCISO GRSee Consulting
Bio

Steve Winterfeld

Advisory Chief Information Security Officer Akamai Technologies
Bio

Closing Remarks

5:00 pm

Closing Remarks | Prize Drawings

Register

Share This