Denver, CO

Thursday, June 1, 2023

Hybrid

About the Event

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:15 am

The power of Threat - Informed Defense

Threat-informed defense is a strategic approach to cybersecurity that combines threat intelligence with traditional security measures and threat analysis. During this presentation you’ll learn how to form a strategy that can proactively identify threats before they can cause damage or disruption.

Threat-informed defense is a strategic approach to cybersecurity that combines threat intelligence with traditional security measures and threat analysis. During this presentation you’ll learn how to form a strategy that can proactively identify threats before they can cause damage or disruption.

Bio

Jeffrey Wheat

CTO Lumu

Sponsored by

Networking

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

The Science of Normal: Changing cybersecurity and your poker game

You wouldn’t play poker blind, so why search for cyberthreats without analytics? Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security related content read more…

You wouldn’t play poker blind, so why search for cyberthreats without analytics?

Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security related content including pre-built reports, dashboards, and visualizations can handle common security and compliance requirements. Analytics ensure sound security postures so organizations don’t fold to cyber threats.

By simplifying the review of an enterprise data lake using easily implemented data science with scaled analytics, you can eliminate blind spots and significantly improve your organization’s cybersecurity framework. We’ll also show you how the SOC can extract the most value from security data, plus we’ll share many more stealth tips for your advantage.

Bio

Bob Reny

CTO and Principal SE Exabeam

Sponsored by

Presentation

11:00 am

API’s: The Users Best Friend but Your Data’s Worst Nightmare

API’s have exploded over the last couple of years as the pandemic changed the way organizations do business and how they relate to their users. This has served to drastically increase the number of doors open to the Data. But what hasn’t changed is the target. With Data still in read more…

API’s have exploded over the last couple of years as the pandemic changed the way organizations do business and how they relate to their users. This has served to drastically increase the number of doors open to the Data. But what hasn’t changed is the target. With Data still in the crosshairs, the challenge of protecting that data has increased accordingly.

Learn what organizations are doing today to mitigate the threat to Data from the exponential increase in access to that data via the explosion of API’s and API access points.

Bio

Paul Steen

Principal Solutions Engineer Imperva, Inc

Sponsored by

Networking

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

"Truths - Myths - Maybes"

Bio

Merlin Namuth

Chief Information Security Officer REPAY - Realtime Electronic Payments

Networking

1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The Guide to Digital and Device Supply Chain Security

In today’s interconnected world, the digital and device supply chain has become increasingly complex, making it more vulnerable to security threats and attacks. As organizations rely on a myriad of devices and software to drive their operations, ensuring the integrity and security of the supply chain is paramount. In this read more…

In today’s interconnected world, the digital and device supply chain has become increasingly complex, making it more vulnerable to security threats and attacks. As organizations rely on a myriad of devices and software to drive their operations, ensuring the integrity and security of the supply chain is paramount.

In this session, we will cover:

  • Introduction to the digital and device supply chain: Understanding the interconnected ecosystem of hardware, software, and services

  • Understanding the Attack Surface Below the OS: Identifying potential weak points and vulnerabilities in the supply chain

  • Best practices for supply chain security: Proactive measures to strengthen security, including risk assessments, secure sourcing, verification and authentication processes, and supply chain visibility.

Bio

David Cundiff

VP of Technical Services and Solutions Eclypsium

Sponsored by

Presentation

2:00 pm

How to be Unhackable

Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review these proven solutions and which ones must be implemented today.

Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review these proven solutions and which ones must be implemented today.

Bio

Robert Kauffman

Senior Systems Engineer Versa Networks

Sponsored by

Networking

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Stories from the Front Lines: SOC Edition

There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include: The Case of the Missing Hard read more…

There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include:

  • The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat
  • From the UK to Aliens to Pink Floyd: The British Hacker Story
  • The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach

Daniel discusses not only the story of what happened, but the tools and techniques used and developed that brought success.

Bio

Daniel Smallwood

Threat Researcher and Engineer LiveAction

Sponsored by

Networking

3:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

3:30 pm

“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Bio

Merlin Namuth

Chief Information Security Officer REPAY - Realtime Electronic Payments
Bio

Mohamed Malki

Entreprise Security Architecture , Director State of Colorado Governor's Office of Information Technology
Bio

Cody Burrows

CISO/Penetration Tester/Architect/Engineer, Cyber Perimeter Security | VP - Director of Security Assurance, CXLoyalty (JP Morgan Chase
Bio

Dr. Michael Hutchison

Vice President; Information Security Bank of America
Bio

Quintana Patterson

IT Clinical and Compliance Manager University of Colorado Anschutz Medical Campus

Closing Remarks

4:30 pm

Closing Remarks

Share This