Los Angeles (Cybersecurity)
March 22 @ 8:00 am - 4:30 pm
The Los Angeles Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Threat Landscape & Sophos Synchronized Security
Discussing the evolution of today’s emergent threats and how to protect your network against them.
Nathan has been with Sophos since 2016, and has worked multiple roles in support, management and administration in the information security industry for 18 years, with a focus on Web and Data security.
Regional Sales Manager
What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.
Senior Sales Engineer, Cybereason
The Attack Lifecycle – Conquering All Stages of an Attack
Organizations that keep customer data safe don’t necessarily spend more on security, but have learned to artfully balance resources across prevent more, detect faster, mitigate more accurately, and minimize damage.
While initial network penetration is quick and sometimes difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools.
We’ll discuss the attack lifecycle and offer an approach for successful detection and response. Join & learn:
- A more in-depth look at the six stages of the attack lifecycle
- How to avoid the pitfalls that cause network infiltration detection to fail
- An effective approach for accurate detection throughout the entire attack lifecycle, not just an infiltration
Tim Amey, Senior Sales Engineer with Cybereason, has worked as an SE, Manager, and Director for 19 years covering enterprise accounts across the US. Extensive experience with network and endpoint security from a career working at Lucent, NetScreen, TippingPoint, F5 Networks, Q1 Labs/IBM, and Bromium – as well as experience with a diverse set of Cybereason customers in manufacturing, software development, services, energy, finance, and bio-med.
Director, Sales Engineering
Why DevOps Is a Game-Changer for Security
Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.
Kevin Albright is a results-oriented security leader with over 20 years of experience designing and implementing Infrastructure and Cyber Security projects for large and mid-size enterprises to support business transformation and growth. As the Director of Sales Engineering at Tenable, Kevin helps CISOs and security teams build cyber security solutions to protect their business in the face of digital transformation.
Cybercrime Tactics & Techniques: State of Malware
In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya. Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.
Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?
Rick Pither runs Global Security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his Bachelor’s degree in Management and Marketing from Purdue University.
Directory, Identity Practice- Novacoast
Passwords are high-risk, expensive, and everybody hates them. Why are we still using them? Authenticate using something other than passwords!
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Security Operations without going blind
The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events. Are Automation and AI solutions the answer? How do you get started without disrupting the infrastructure that you have in place?
Senior Marketing Manager
An Inside Look at How to Automate Phishing Security from the Inbox
No inbox can escape the deluge of email threats. While today’s technology has done an adequate job with blocking known threats, catching tip of the spear phishing attacks still alludes most IT organizations. To add to the headache, chasing and investigating these highly sophisticated attacks has become a full time job. In this session, learn how businesses are addressing the rise of Phishing emails in one easy click.