
Conference
Los Angeles 2021
Cybersecurity Conference
Very few industries have required the level of flexibility as cybersecurity has since 2020 began. However, IT professionals have sprung into action, and continued to remain vigilant to the newest threats that organizations are facing. Continue to stay on top of the latest at the Data Connectors Cybersecurity Conference in Los Angeles.
This conference will gather professionals from the local community to network with their peers as well as from panels of industry experts and keynote speakers.
SEE A SNEAK PEEK OF OUR KEYNOTE HERE
Date
Wed. Sep 22
Location
The Pacific Palms Resort - Los Angeles
1 Industry Hills Pkwy
City of Industry, California 91744
626-810-4455
-
Featured Speakers
John Felker
Keynote: Cybersecurity Leadership Lessons, from Hawaii to Afghanistan
Jeffrey JohnsonCISO RoundTable
Nemi GeorgeCISO RoundTable
Jason LoomisCISO RoundTable
E.J. HilbertCISO RoundTable
Event Schedule
Times for this Event are in Pacific Time (PDT/PST)
The Conference will be open from 8AM to 6PM.
- Welcome / Introductions
-
Is Active Directory and Multi-Cloud Leaving you Exposed? 9:10 am
Come learn why Active Directory has become a primary target for attackers and how multi-cloud adoption is dramatically expanding your attack surface. We will discuss advanced attacks that are exploiting these weaknesses and outline steps you should take to reduce your risk of being compromised.
Panel Participants:
-
Securing the Modern API Ecosystem 9:40 am
APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022. Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:
- API discovery and inventory management
- Continuous vulnerability identification and testing
- Runtime prevention and detection
Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.
Panel Participants:
-
Risk Mitigation Strategies for TCP/IP Vulnerabilities in OT 10:05 am
Join this session to dive into the industry’s most comprehensive study of TCP/IP vulnerabilities. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.
Join this discussion to learn about:
- Recently discovered vulnerabilities and how they impact the NicheStack TCP/IP stack
- Organizations and devices with the highest potential to be affected
- How to assess and mitigate risk and protect enterprise networks
Panel Participants:
-
Expert Panel Discussion: Protecting Users 10:45 am
Protecting Users - Identity, Endpoints and Access Management
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept up?
Panel Participants:
-
Secure Your Last Line of Defense 11:20 am
Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses.
Panel Participants:
-
Remote Work – The Wild West of Endpoint Management 11:45 am
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.
Panel Participants:
- Demo Sessions / Lunch Break
-
Demo Session: Neurons for Zero Trust Access 12:15 pm
As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before.
Join Ivanti’s Global CTO, Tony Valteau, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.
Panel Participants:
-
Keynote: Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:45 pm
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Panel Participants:
-
How I Gained Access to Your Network - A Novice Hacker's Guide to the Attack Surface Galaxy 1:35 pm
Do you lay awake at night staring at the stars and wondering how you can mitigate breaches at your company? In today’s talk, we will explore some ways even a novice hacker can find your organization’s weak spots for a possible attack. Armed with this information, you can learn how to reduce the attack surface to help mitigate such threats!
Panel Participants:
-
Ransomware Resilience 2:20 pm
Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs.
Join this live session and hear how your company can:
- Instantly resume operations post-attack
- Reduce your data loss from days to seconds/minutes
- Test and isolate data to ensure a safe recovery
Panel Participants:
-
Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 2:45 pm
DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected (escapes or false negatives)? Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.
Panel Participants:
-
Expert Panel Discussion: Ransomware 3:10 pm
100 Ransomware Attacks Since Colonial Pipeline: What Have We Learned?
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
What CISOs Get Wrong About Connected Device Product Security (And Why You Should Care) 3:45 pm
With billions of connected devices powering up every year, crowded markets have created unique challenges and opportunities for device manufacturers. In this environment, competitive differentiation is key. As attackers move away from application layer attacks, connected devices are now the ultimate low-hanging fruit to offer unauthorized access to critical IT and OT networks.
Breaches in product security will have unprecedented impacts on device manufacturers and owners. According to Gartner, cyber-physical attacks resulting in fatal casualties will cost over $50B by 2023. Even the White House is taking note, with a new Cybersecurity EO that will add new requirements for secure software.
In this presentation by Finite State, we’ll take a close look at how product security breaches occur, and how the financial impact of these breaches have tangible permanent effects on industry competitors. Learn proactive approaches to product security that are being adopted by some of the world’s largest device manufacturers, as well as how to ensure that your product security strategies generate value for your customers and shareholders.
Panel Participants:
-
CISO RoundTable 4:30 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Community Garden Party & Networking Reception
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners