Loading Events

« All Events

Los Angeles (Cybersecurity)

March 22 @ 8:00 am - 4:30 pm

Event Navigation


March 22
8:00 am - 4:30 pm
Event Category:


Los Angeles Airport Marriott Hotel
5855 W Century Blvd.
Los Angeles, CA 90045
United States
  + Google Map


The Los Angeles Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Nathan McClean
Sales Engineer

Threat Landscape & Sophos Synchronized Security

Discussing the evolution of today’s emergent threats and how to protect your network against them.

Speaker’s Bio:

Nathan has been with Sophos since 2016, and has worked multiple roles in support, management and administration in the information security industry for 18 years, with a focus on Web and Data security.

9:15am - 9:45amSession Two

Bobby Josker
Regional Sales Manager

What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough

Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Tim Amey
Senior Sales Engineer, Cybereason

The Attack Lifecycle – Conquering All Stages of an Attack

Organizations that keep customer data safe don’t necessarily spend more on security, but have learned to artfully balance resources across prevent more, detect faster, mitigate more accurately, and minimize damage.

While initial network penetration is quick and sometimes difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools.

We’ll discuss the attack lifecycle and offer an approach for successful detection and response. Join & learn:

  • A more in-depth look at the six stages of the attack lifecycle
  • How to avoid the pitfalls that cause network infiltration detection to fail
  • An effective approach for accurate detection throughout the entire attack lifecycle, not just an infiltration

Speaker’s Bio:

Tim Amey, Senior Sales Engineer with Cybereason, has worked as an SE, Manager, and Director for 19 years covering enterprise accounts across the US.  Extensive experience with network and endpoint security from a career working at Lucent, NetScreen, TippingPoint, F5 Networks, Q1 Labs/IBM, and Bromium – as well as experience with a diverse set of Cybereason customers in manufacturing, software development, services, energy, finance, and bio-med.

10:45am - 11:15amSession Four

Kevin Albright
Director, Sales Engineering

Why DevOps Is a Game-Changer for Security

Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.

Speaker’s Bio:

Kevin Albright is a results-oriented security leader with over 20 years of experience designing and implementing Infrastructure and Cyber Security projects for large and mid-size enterprises to support business transformation and growth. As the Director of Sales Engineering at Tenable, Kevin helps CISOs and security teams build cyber security solutions to protect their business in the face of digital transformation.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Scottie Jack
Regional Manager

Cybercrime Tactics & Techniques:  State of Malware

In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya.  Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.


1:00pm - 1:30pmSession Seven

Rick Pither
Global Security Sales and OEM

Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?   

Download the Presentation

Speaker’s Bio:

Rick Pither runs Global Security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.

Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.

Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.

Pither earned his Bachelor’s degree in Management and Marketing from Purdue University.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pm Session Eight

Jim Gerken
Directory, Identity Practice- Novacoast

Eliminate Passwords!

Passwords are high-risk, expensive, and everybody hates them. Why are we still using them? Authenticate using something other than passwords!

2:15pm - 3:00pmSession Nine

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Greg Taylor-Broun
Product Strategist

Security Operations without going blind

The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events.  Are Automation and AI solutions the answer?  How do you get started without disrupting the infrastructure that you have in place?

Prize Drawings for All in Attendance
3:45pm - 4:15pmSession Eleven

Don Lewis
Senior Marketing Manager

An Inside Look at How to Automate Phishing Security from the Inbox

No inbox can escape the deluge of email threats. While today’s technology has done an adequate job with blocking known threats, catching tip of the spear phishing attacks still alludes most IT organizations.  To add to the headache, chasing and investigating these highly sophisticated attacks has become a full time job. In this session, learn how businesses are addressing the rise of Phishing emails in one easy click.

Prize Drawings for All in Attendance