Salt Lake City Cybersecurity Conference

Thursday, August 21, 2025

Hilton Salt Lake City Center

Parking/Directions

Hybrid

Join Us in Salt Lake City for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Premier Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

Securing Data Flow in the AI-Quantum Era

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE). Join this session to learn: Choosing secure access read more…

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

Join this session to learn:

  • Choosing secure access methods for diverse use cases
  • Adapting security to risk, user behavior and AI interactions
  • Preparing for post-quantum encryption’s enterprise impact
Bio

Steve Riley

VP & Field CTO Netskope

Sponsored by

Presentation

9:15 am

Rebuild Your Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec read more…

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Bio

Maarten Buis

Sr. Product Marketing Manager Contrast Security

Sponsored by

Presentation

9:45 am

Breaking Down Silos: Unify Assets, Minimize Attack Exposure

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of read more…

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

Bio

Chris Pedigo

Senior Director of Sales Engineering Axonius

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

AI on the Frontlines: Smarter Defense in the Age of Cyber Threats

Bio

Steve Brining

Partner Technology Evangelist Acronis

Sponsored by

Presentation

11:15 am

The Mind at the Firewall: Rethinking Human Error at the Edge of the Network

We’ve spent decades throwing technology at the “human error” problem, but here’s the uncomfortable truth: we’ve been aiming at the wrong layer of the stack. This session challenges the traditional framing of user error as a nuisance and reframes it as a signal, one that can be harnesses, modeled, and read more…

We’ve spent decades throwing technology at the “human error” problem, but here’s the uncomfortable truth: we’ve been aiming at the wrong layer of the stack.

This session challenges the traditional framing of user error as a nuisance and reframes it as a signal, one that can be harnesses, modeled, and even predicted. Drawing from Psybersecurity: The Interplay of Minds & Machines, we’ll explore the concept of psychographic perimeter defense, a cognitive-aware approach that fuses behavioral baselining with identity, intent, and contextual triggers. From fatigue-driven mistakes to socially engineered compliance, the firewall isn’t just filtering packets anymore; it’s filtering patterns of thought.

You’ll walk away with practical strategies for weaving behavioral analytics, adaptive policy enforcement, and AI-powered edge visibility into your defense posture, all while seeing how an effective security fabric (i.e. Fortinet’s) enables more intelligent decision-making at the boundary between humans and machines.

 

Why This Topic Is Important: Despite technical advances, 82% of breaches still involve the human element (Verizon DBIR). We keep pushing for “zero trust”, yet trust decisions are still being made under cognitive load, stress, or social pressure. Most orgs deploy behavior-based security reactively, if at all. What’s missing is a convergence of psychology, security design, and edge technology, one that doesn’t just monitor users, but anticipates where failure is likely to occur.

As adversaries grow more psychologically savvy (look at modern phishing kits and deepfake voice tech), defenders need an equally nuanced response. AI-driven tools and behavioral analytics capabilities offer a path forward, but only if we build the right mental models to guide deployment.

Learning Objectives:

  1. Reframe “human error” as a behavioral pattern: Understand how repeated incidents stem from predictable psychological conditions (burnout, bias, cognitive shortcuts) and how these can be detected in network behavior.
  2. Explore the concept of Psychographic Perimeter Defense: Learn how to apply principles from Psybersecurity to firewall, endpoint, and identity controls by interpreting user behavior as a dynamic security signal.
  3. Map Security Technologies to Behavioral Controls (will use Fortinet as an example of available tools that hit certain check boxes for this initiative): Discover how SASE and ZTNA enforcement tools can move from reactive blocks to adaptive behavioral enforcement at the edge.
  4. Design edge defenses that learn and evolve: Learn how to architect a perimeter that evolves with user behavior, flags abnormal decision-making patterns, and shifts policies in real time (without destroying usability).
Bio

Tim Tipton Jr

Executive Cybersecurity Strategist Arctiq

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

2025 Cybercrime Trends – Are we stuck in Groundhog Day?

Bio

Derek Booth

Supervisory Special Agent U.S. Secret Service
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

The First Rule of GRC: We Don’t Talk About GRC… But Why? Learn the “Project Mayhem” Approach to Security Culture

Bio

Jake Bernardes

Chief Information Security Officer Anecdotes

Sponsored by

Presentation

2:15 pm

How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that read more…

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Bio

Brett Christie

Senior Solutions Engineer Sophos

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Every APP & API Needs DDoS Protection

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense read more…

The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection.

Bio

Samantha Remy

Senior Sales Engineer Fastly

Sponsored by

Presentation

3:30 pm

Moving Towards a Zero Trust Mindset

Bio

Julie Cardinalli

Solutions Engineer Cloudflare

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Randy Dickey

Sr Director, IT Infrastructure & Ops Evergy
Bio

Shalini Kesar

Professor & Director of MS-CSIA President & Co-Founder of WiCyS Utah
Bio

Chris Stucker

Deputy Chief Information Security Officer Froedtert ThedaCare Health
Bio

Derek Booth

Supervisory Special Agent U.S. Secret Service
Bio

Hayley McCormick

Director, Cyber Fraud United Airlines
5:15 pm

Closing Remarks