Denver Cybersecurity Conference
Thursday, June 1, 2023
Live In Person @ DoubleTree Denver Tech Center
In Person | Virtual | Hybrid
Earn up to 10 CPE credits























About the Event
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
For sponsorship opportunities email sales@futureconevents.com
Keynote Speaker
"Truths - Myths - Maybes"
Merlin Namuth
Chief Information Security Officer REPAY - Realtime Electronic Payments
Accomplished Information Security Leader – 26 years IT experience with the past 23 years focused on Information Security
I started my career in hands-on systems and network administration roles and worked my way up to building and leading security programs in small and medium sized companies. In addition, I architected and engineered multi-million dollar complex security solutions spanning several global locations. My passions include continuous improvement of security programs and creating healthy, productive teams. I have years of experience working with executive and senior leadership, including company owners. I not only enjoy leading security teams and working with the business on security initiatives, but I also stay current with emerging security technologies.
CISO/Industry Leader Panel
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Merlin Namuth
Chief Information Security Officer
REPAY - Realtime Electronic Payments

Mohamed Malki
Entreprise Security Architecture , Director
State of Colorado Governor's Office of Information Technology

Cody Burrows
CISO/Penetration Tester/Architect/Engineer, Cyber Perimeter Security
| VP - Director of Security Assurance, CXLoyalty (JP Morgan Chase

Dr. Michael Hutchison
Vice President; Information Security
Bank of America

Quintana Patterson
IT Clinical and Compliance Manager
University of Colorado Anschutz Medical Campus
Platinum Sponsors


Gold Sponsors




Silver Sponsors













Partners




Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
The power of Threat - Informed Defense
Threat-informed defense is a strategic approach to cybersecurity that combines threat intelligence with traditional security measures and threat analysis. During this presentation you’ll learn how to form a strategy that can proactively identify threats before they can cause damage or disruption.

Networking
Sponsor Networking Time
Presentation
The Science of Normal: Changing cybersecurity and your poker game
You wouldn’t play poker blind, so why search for cyberthreats without analytics?
Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security related content including pre-built reports, dashboards, and visualizations can handle common security and compliance requirements. Analytics ensure sound security postures so organizations don’t fold to cyber threats.
By simplifying the review of an enterprise data lake using easily implemented data science with scaled analytics, you can eliminate blind spots and significantly improve your organization’s cybersecurity framework. We’ll also show you how the SOC can extract the most value from security data, plus we’ll share many more stealth tips for your advantage.

Presentation
API’s: The Users Best Friend but Your Data’s Worst Nightmare
API’s have exploded over the last couple of years as the pandemic changed the way organizations do business and how they relate to their users. This has served to drastically increase the number of doors open to the Data. But what hasn’t changed is the target. With Data still in the crosshairs, the challenge of protecting that data has increased accordingly.
Learn what organizations are doing today to mitigate the threat to Data from the exponential increase in access to that data via the explosion of API’s and API access points.

Networking
Sponsor Networking Time
Lunch
Keynote
"Truths - Myths - Maybes"
Networking
Sponsor Networking Time
Presentation
The Guide to Digital and Device Supply Chain Security
In today’s interconnected world, the digital and device supply chain has become increasingly complex, making it more vulnerable to security threats and attacks. As organizations rely on a myriad of devices and software to drive their operations, ensuring the integrity and security of the supply chain is paramount.
In this session, we will cover:
-
Introduction to the digital and device supply chain: Understanding the interconnected ecosystem of hardware, software, and services
-
Understanding the Attack Surface Below the OS: Identifying potential weak points and vulnerabilities in the supply chain
-
Best practices for supply chain security: Proactive measures to strengthen security, including risk assessments, secure sourcing, verification and authentication processes, and supply chain visibility.

Presentation
How to be Unhackable
Every business desires to be unhackable. Even air-gapped environments have data leakage, but there are proven steps that can significantly limit your exposure without causing undue irritation to your staff. In this session, we will review these proven solutions and which ones must be implemented today.

Networking
Sponsor Networking Time
Presentation
Stories from the Front Lines: SOC Edition
There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include:
- The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat
- From the UK to Aliens to Pink Floyd: The British Hacker Story
- The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach
Daniel discusses not only the story of what happened, but the tools and techniques used and developed that brought success.

Networking
Sponsor Networking Time
Panel Discussion
“Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”

Mohamed Malki
Entreprise Security Architecture , Director State of Colorado Governor's Office of Information Technology

Cody Burrows
CISO/Penetration Tester/Architect/Engineer, Cyber Perimeter Security | VP - Director of Security Assurance, CXLoyalty (JP Morgan Chase
