• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Pacific Time (PDT/PST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, November 17th.

  • Welcome to the Orange County Cybersecurity Conference
  • The State of Secure Identity 9:00 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • The Battle of the Algorithms: How AI is Beating AI at Its Own Game 9:20 am

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    Click to Expand

    Speaker:

    Katherine McGauley
    Katherine McGauley

    Katherine McGauley

    Senior Technical Manager, Darktrace

    Collapse This Item

  • Protecting Application Access with Zero Trust 10:05 am

    Presented by Cisco

    In this presentation, see how Duo lays a strong foundation for your Zero Trust program. The presentation will cover proper Zero Trust authentication and policy design as well risk-based and step-up authentication features to stop the most advanced types of breaches.

    Click to Expand

    Speaker:

    Brian Verenkoff
    Brian Verenkoff

    Brian Verenkoff

    Worldwide Director - Solutions Architecture - Zero Trust, Cisco

    Collapse This Item

  • Protecting Against Cyber Attacks 10:35 am

    We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE.  And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Issara Srun
    Issara Srun

    Issara Srun

    Regional Vice President, Engineering, Arctic Wolf Networks

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Alfredo Contreras
    Alfredo Contreras

    Alfredo Contreras

    Senior Consultant at baramundi

    Collapse This Item

  • Windows 10, 11, or 12 -- The Windows journey continues… 11:25 am

    Presented by baramundi

    Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version. 

    Alfredo Contreras from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while? What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?

    Click to Expand

    Speaker:

    Alfredo Contreras
    Alfredo Contreras

    Alfredo Contreras

    Senior Consultant at baramundi

    Collapse This Item

  • What you don’t see will hurt you: visibility automation and the importance of being proactive 11:45 am

    Presented by Keysight

    Please join Keysight to discuss network blind spots, automating visibility, and the importance of ongoing network test. As networks continue to grow more complex and move into cloud and multi-cloud environments, getting an accurate view into your network has never been harder or more important. Security tools are only part of the answer as they are only as good as they data they receive. Learn how network visibility and testing are key aspects to a successful network security strategy.

    Click to Expand

    Speaker:

    Mayra Salman
    Mayra Salman

    Mayra Salman

    Director Business Development, Keysight

    Collapse This Item

  • Lunch Break
  • Identity & Access Management: A Growing Need for Mid-Sized Organizations 12:40 pm

    Presented by Tenfold

    Mid-market businesses today are faced with increasingly complex IT landscapes, rapidly evolving digital threats and growing pressure through privacy and security regulations. To protect their data and ensure appropriate access across various local and cloud services, medium-sized organizations more than ever depend on automated IAM solutions.

    However, common IAM products designed for an enterprise context have proven too large and complex to be used effectively: Their lengthy setup and massive scope exceed the needs and resources of medium-sized companies. Mid-market access management takes a more efficient approach to help organizations quickly regain control of users and data.

    In this session, you will learn:
    • What makes identity & access management a necessity for the mid-market
    • How IAM boosts security, productivity and compliance
    • What to look out for when choosing an IAM provider

    Click to Expand

    Speaker:

    Helmut Semmelmayer
    Helmut Semmelmayer

    Helmut Semmelmayer

    VP Revenue Operations at tenfold

    Collapse This Item

  • Look Your Enemy in Their Eyes 1:00 pm

    Presented by Redacted

    It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.

    Click to Expand

    Speaker:

    Ryan Jamieson
    Ryan Jamieson

    Ryan Jamieson

    Head of Advisory Services, Redacted

    Collapse This Item

  • What is Modern Data Security? 1:40 pm

    Presented by Cohesity

    The security space continues to grow as company data becomes more complex to manage and becomes vulnerable to ever increasing ransomware and cyber threats. 

    At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity or keeping your business secure. 

    Come listen to what you should be looking for in a Modern Security solution and how organizations can ensure they have hardened their backup system to prevent the tampering of data.

     

    Click to Expand

    Speaker:

    David Jayanathan
    David Jayanathan

    David Jayanathan

    Field Technical Director, Cohesity

    Collapse This Item

  • New Storage Protection Technology for Your Data Currently Being Developed in ITU-T International Standard Organization 2:00 pm

    Presented by FilingBox

    The existing cybersecurity protection technologies, such as network protection and endpoint protection are not enough against current cyberattacks. Today, the new cybersecurity protection mechanism, called the storage protection technology, is being standardized in the ITU-T SG 17 which is in charge of international cybersecurity standards.

    It protects your data from a network storage standpoint. If data requests on the PC come into the network storage through the network drive, it analyzes what application on the PC is requesting the data on the storage and provides the real data only to the application which was preregistered on the storage. If unknown applications, including ransomware and data breach malware request data on storage, it provides a file with read-only or a file with read-and-fake-only to the application. If a file with a read-only attribute is opened on the PC, it can not be modified or encrypted by ransomware. If a file with a read-and-fake-only attribute is opened on the PC, original data can not be transferred or read by the malware.

    Because it protects the data from the storage standpoint, it protects data from any kind of malware including future variations running on the PC. Especially it is lightweight compared to the existing behavioral detection-based endpoint and network protection technologies. It generates good synergy with the existing endpoint and network protection technology because the working area is different.

    We will provide a cloud-based storage protection service free of charge to 100 participants in the session on a first-come, first-served basis for experiencing the new storage protection.

    Click to Expand

    Speaker:

    John Woo
    John Woo

    John Woo

    CEO at Filing Box

    Collapse This Item

  • Cyber Inter-Agency Panel 2:20 pm

    This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Bryan Willett
    Bryan Willett

    Bryan Willett

    SSA, FBI Los Angeles Field Office

    Eric Brown
    Eric Brown

    Eric Brown

    Special Agent, HSI

    Mario F. Garcia
    Mario F. Garcia

    Mario F. Garcia

    Cybersecurity State Coordinator, DHS

    Collapse This Item

  • Cyber Executive Panel 3:10 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jeffrey Johnson
    Jeffrey Johnson

    Jeffrey Johnson

    Former Vice President, Head of Security (CISO and Regional Security Officer) at Siemens Healthcare

    Nemi George
    Nemi George

    Nemi George

    VP, Information Security Officer & IT Service Operations at Pacific Dental Services

    Richard Greenberg
    Richard Greenberg

    Richard Greenberg

    CEO Security Advisors LLC

    Nelson Estrada
    Nelson Estrada

    Nelson Estrada

    IT Director, GoodFarms

    Junaid Aasi
    Junaid Aasi

    Junaid Aasi

    Senior Technical Security Risk Engineer, UCLA Health

    Collapse This Item

  • Conference Closing Session 3:55 pm
  • Los Angeles Cybersecurity Conference Networking Reception & Happy Hour 4:00 pm
Partners Register