
Conference
Orange County
Cybersecurity Conference
As security experts in the local community continue to navigate the ever-changing landscape, you can ensure you’re on the leading edge by joining your peers at the Orange County Cybersecurity Conference. Sit alongside fellow IT and cyber executives as you hear from experts in both the public and private sectors, offering vital information on how move your organization through the latest threats.
Through interactive sessions, Q&A panels, and keynotes led by industry thought leaders and luminaries, the Orange County Cybersecurity Conference will allow you to gain the needed insights to prepare your team for the inevitable. Meet face-to-face with cyber solution providers to ensure your organization is protected and take advantage of several networking opportunities throughout the full-day conference.
Learn more about Data Connectors here!
Date
Thu. Nov 17
-
Featured Speakers
Jason Miller
Protecting Against Cyber Attacks
Issara SrunProtecting Against Cyber Attacks
Gatewood GreenProtecting Against Cyber Attacks
Alfredo ContrerasProtecting Against Cyber Attacks
Bryan WillettCyber Inter-Agency Panel
Eric BrownCyber Inter-Agency Panel
Mario F. GarciaCyber Inter-Agency Panel
Jeffrey JohnsonCyber Executive Panel
Nemi GeorgeCyber Executive Panel
Richard GreenbergCyber Executive Panel
Nelson EstradaCyber Executive Panel
Junaid AasiCyber Executive Panel
Event Schedule
Times for this Event are in Pacific Time (PDT/PST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, November 17th.
- Welcome to the Orange County Cybersecurity Conference
-
The State of Secure Identity 9:00 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.Â
During this session, we’ll provide greater insight into which industries are:Â
– Most highly targeted by credential stuffing attacksÂ
– Most highly targeted by SQL injection attacksÂ
– Leading the way in MFA adoption to improve overall security postureÂ
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
The Battle of the Algorithms: How AI is Beating AI at Its Own Game 9:20 am
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.
Speaker:
-
Protecting Application Access with Zero Trust 10:05 am
In this presentation, see how Duo lays a strong foundation for your Zero Trust program. The presentation will cover proper Zero Trust authentication and policy design as well risk-based and step-up authentication features to stop the most advanced types of breaches.
Speaker:
-
Protecting Against Cyber Attacks 10:35 am
We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE. And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.
Panel Participants:
-
Windows 10, 11, or 12 -- The Windows journey continues… 11:25 am
Almost one year into the release of Windows 11, many IT departments are still considering whether to make the transition to Microsoft’s latest operating system. And with Microsoft’s new development cycle, there is already talk about yet another Windows version.Â
Alfredo Contreras from baramundi software will tackle the big questions, such as: Should I start planning deployment of Windows 11, or sit tight for a while? What effect will Microsoft’s latest OS have on our endpoint management approach? And how does it affect endpoint security?
Speaker:
-
What you don’t see will hurt you: visibility automation and the importance of being proactive 11:45 am
Please join Keysight to discuss network blind spots, automating visibility, and the importance of ongoing network test. As networks continue to grow more complex and move into cloud and multi-cloud environments, getting an accurate view into your network has never been harder or more important. Security tools are only part of the answer as they are only as good as they data they receive. Learn how network visibility and testing are key aspects to a successful network security strategy.
Speaker:
- Lunch Break
-
Identity & Access Management: A Growing Need for Mid-Sized Organizations 12:40 pm
Mid-market businesses today are faced with increasingly complex IT landscapes, rapidly evolving digital threats and growing pressure through privacy and security regulations. To protect their data and ensure appropriate access across various local and cloud services, medium-sized organizations more than ever depend on automated IAM solutions.
However, common IAM products designed for an enterprise context have proven too large and complex to be used effectively: Their lengthy setup and massive scope exceed the needs and resources of medium-sized companies. Mid-market access management takes a more efficient approach to help organizations quickly regain control of users and data.
In this session, you will learn:
• What makes identity & access management a necessity for the mid-market
• How IAM boosts security, productivity and compliance
• What to look out for when choosing an IAM providerSpeaker:
-
Look Your Enemy in Their Eyes 1:00 pm
It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.
Speaker:
-
What is Modern Data Security? 1:40 pm
The security space continues to grow as company data becomes more complex to manage and becomes vulnerable to ever increasing ransomware and cyber threats.Â
At Cohesity, we believe that technology should work harder and smarter for you, whether it’s reducing complexity or keeping your business secure.Â
Come listen to what you should be looking for in a Modern Security solution and how organizations can ensure they have hardened their backup system to prevent the tampering of data.
Speaker:
-
New Storage Protection Technology for Your Data Currently Being Developed in ITU-T International Standard Organization 2:00 pm
The existing cybersecurity protection technologies, such as network protection and endpoint protection are not enough against current cyberattacks. Today, the new cybersecurity protection mechanism, called the storage protection technology, is being standardized in the ITU-T SG 17 which is in charge of international cybersecurity standards.
It protects your data from a network storage standpoint. If data requests on the PC come into the network storage through the network drive, it analyzes what application on the PC is requesting the data on the storage and provides the real data only to the application which was preregistered on the storage. If unknown applications, including ransomware and data breach malware request data on storage, it provides a file with read-only or a file with read-and-fake-only to the application. If a file with a read-only attribute is opened on the PC, it can not be modified or encrypted by ransomware. If a file with a read-and-fake-only attribute is opened on the PC, original data can not be transferred or read by the malware.
Because it protects the data from the storage standpoint, it protects data from any kind of malware including future variations running on the PC. Especially it is lightweight compared to the existing behavioral detection-based endpoint and network protection technologies. It generates good synergy with the existing endpoint and network protection technology because the working area is different.
We will provide a cloud-based storage protection service free of charge to 100 participants in the session on a first-come, first-served basis for experiencing the new storage protection.
Speaker:
-
Cyber Inter-Agency Panel 2:20 pm
This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime. In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive Panel 3:10 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session 3:55 pm
- Los Angeles Cybersecurity Conference Networking Reception & Happy Hour 4:00 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners