Loading Events

« All Events

Los Angeles (Cybersecurity)

March 22 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
March 22
Time:
8:00 am - 5:00 pm
Event Category:

Venue

Los Angeles Airport Marriott Hotel
5855 W Century Blvd.
Los Angeles, CA 90045
United States
  + Google Map
Phone:
310-641-5700
Website:
http://www.marriott.com/hotels/travel/laxap-los-angeles-airport-marriott/

Overview

The Los Angeles Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Tim Amey
Senior Sales Engineer, Cybereason

The Attack Lifecycle – Conquering All Stages of an Attack

Organizations that keep customer data safe don’t necessarily spend more on security, but have learned to artfully balance resources across prevent more, detect faster, mitigate more accurately, and minimize damage.

While initial network penetration is quick and sometimes difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools.

We’ll discuss the attack lifecycle and offer an approach for successful detection and response. Join & learn:

  • A more in-depth look at the six stages of the attack lifecycle
  • How to avoid the pitfalls that cause network infiltration detection to fail
  • An effective approach for accurate detection throughout the entire attack lifecycle, not just an infiltration


Speaker’s Bio:

Tim Amey, Senior Sales Engineer with Cybereason, has worked as an SE, Manager, and Director for 19 years covering enterprise accounts across the US.  Extensive experience with network and endpoint security from a career working at Lucent, NetScreen, TippingPoint, F5 Networks, Q1 Labs/IBM, and Bromium – as well as experience with a diverse set of Cybereason customers in manufacturing, software development, services, energy, finance, and bio-med.

10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pm Session Eight

Jim Gerken
Directory, Identity Practice- Novacoast

2:15pm - 3:00pmSession Nine

Sponsors