Salt Lake City Cybersecurity Conference

Thursday, August 15, 2024

Sheraton Salt Lake City Hotel

Parking/Directions

Hybrid

Join Us in Salt Lake City for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Sheraton Salt Lake City Hotel

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

9:00 am

Current Security Operations

Presentation

9:30 am

The Most Important Shift for Cybersecurity in a Generation

We live in a world where everything is hybrid. Whether it’s where we work, the clouds we run workloads on, or the devices we use — the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface many times over and the pressure to read more…
We live in a world where everything is hybrid. Whether it’s where we work, the clouds we run workloads on, or the devices we use — the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface many times over and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.
Bio

Steve Riley

Field CTO Netskope

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am
Bio

Doug Lubahn

VP Customer Success BlackFog

Sponsored by

Presentation

11:00 am

Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security read more…

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Bio

Swaroop Sham

Product Leader Wiz

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Keynote

12:00 pm
Bio

Dan Bowden

Global CISO Marsh
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The Evolution of Cybercrime Cartels and Conspiracies

During this fireside chat, we’ll discuss the evolution of cybercrime cartels and their cybersecurity conspiracies. We’ll also provide insights around trends in e-fraud and novel cyberattacks, as well as shoxing, destructive attacks, cloud jacking, AI’s dark passenger, chronos attacks and more.

During this fireside chat, we’ll discuss the evolution of cybercrime cartels and their cybersecurity conspiracies. We’ll also provide insights around trends in e-fraud and novel cyberattacks, as well as shoxing, destructive attacks, cloud jacking, AI’s dark passenger, chronos attacks and more.

Bio

Tom Kellermann

Senior Vice President of Cyber Strategy Contrast Security
Bio

Derek Booth

US Secret Service ATSAIC

Sponsored by

Presentation

2:00 pm

Predict, Explain, Retain – Data Analysis for Better Security

Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster read more…

Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.

Bio

Nathan Wenzler

Chief Security Strategist Tenable

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Redefining Priorities in Data Security: Why Protecting 'Low-Risk' Data is Key to Safeguarding High-Value Assets

In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Imperva, a Thales Company, is at read more…

In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Imperva, a Thales Company, is at the forefront of redefining this paradigm, asserting the vital importance of safeguarding all data including that categorized as ‘low-risk.’

Bio

Paul Steen

Principal Security Evangelist Imperva, Inc

Sponsored by

Presentation

3:15 pm

Bringing DevSecOps to Cloud Security

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure. Topics covered: ·      Understanding there is no one-size-fits-all read more…

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

Topics covered:
·      Understanding there is no one-size-fits-all model for DevSecOps
·      Best practices for integrating DevSecOps into your cloud security strategy
·      Exploring the intersection between development, security and DevSecOps

Bio

Brooks Cunningham

Senior Security Strategist Fastly

Sponsored by

3:40 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Michael Ouren

Sr, Manager of Technology and Cybersecurity Risk Oversight Zions Bancorporation
Bio

Dean Sapp

SVP, Information Security, Risk and Compliance Filevine
Bio

Steven Briggs

Vice President, Operations, IT, Security Alianza, Inc
Bio

Jake Bernardes

Chief Information Security Officer anecdotes
5:00 pm

Closing Remarks