Los Angeles Cybersecurity Conference

  • Conference

As security experts in the local community continue to navigate the ever-changing landscape, you can ensure you’re on the leading edge by joining your peers at the Los Angeles Cybersecurity Conference. Sit alongside fellow IT and cyber executives as you hear from experts in both the public and private sectors, offering vital information on how move your organization through the latest threats.

Through interactive sessions, Q&A panels, and keynotes led by industry thought leaders and luminaries, the Los Angeles Cybersecurity Conference will allow you to gain the needed insights to prepare your team for the inevitable. Meet face-to-face with cyber solution providers to ensure your organization is protected and take advantage of several networking opportunities throughout the full-day conference.

Parking Information

Self-Parking in the garage at a discounted rate of $25 +tax, per night. Valet $60 +tax, per night.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.  

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 09:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:00 AM to 09:30 AM
How to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test.
General Sessions
Eric Escobar
Practice Lead, Secureworks Adversary Group at Secureworks
Add to Calendar 07/27/2023 09:00 AM 07/27/2023 09:30 AM How to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test.

We may be biased, but Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results; there are numerous things you can do to ensure you wring out every last drop of value. 

Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn: 

  • Major test types, and what questions they might help you answer 
  • How to get more than just findings 
  • Why you want to make your pen testers life hard

We may be biased, but Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results; there are numerous things you can do to ensure you wring out every last drop of value. 

Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn: 

  • Major test types, and what questions they might help you answer 
  • How to get more than just findings 
  • Why you want to make your pen testers life hard
09:30 AM to 10:00 AM
Cyber Resiliency using Modern Data Protection
General Sessions
Veeam
Michael Wisniewski
Systems Engineer at Veeam Software
Lewis Tsai
System Engineer at Veeam
10:00 AM to 10:30 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Mikkel Hansen
Field Engineer at Sevco Security
Ryan Heath
Sales Engineer at Deep Instinct
Kelly Robertson
Principal Security Practitioner at Horizon3.Ai
Ryan Williams
VP West Coast Operations at baramundi
10:55 AM to 11:15 AM
Getting Ahead of The Breach
General Sessions
Eric Bang
Senior Solutions Architect, North America at Picus
Add to Calendar 07/27/2023 10:55 AM 07/27/2023 11:15 AM Getting Ahead of The Breach

The day of a breach, commonly referred to as "cyber game day," is not the opportune moment to determine your ability to effectively counteract an attack and execute an effective incident response. One must adopt an attacker's mindset as the sole means of honing their craft. It is imperative to assess one's capabilities prior to the actual breach proactively. Learn how to rigorously challenge and evaluate the efficacy of your preventive and detection measures in the face of real-world attacks on a continuous basis. Quantify your security posture and how to ensure confidence in your resilience to everyday threat actors in an ever changing threat landscape.

The day of a breach, commonly referred to as "cyber game day," is not the opportune moment to determine your ability to effectively counteract an attack and execute an effective incident response. One must adopt an attacker's mindset as the sole means of honing their craft. It is imperative to assess one's capabilities prior to the actual breach proactively. Learn how to rigorously challenge and evaluate the efficacy of your preventive and detection measures in the face of real-world attacks on a continuous basis. Quantify your security posture and how to ensure confidence in your resilience to everyday threat actors in an ever changing threat landscape.

11:15 AM to 11:25 AM
Demo: Color Tokens
Demo of Fine Grain Micro segmentation
James White
Senior Solutions Engineer at Color Tokens
Add to Calendar 07/27/2023 11:15 AM 07/27/2023 11:25 AM America/Los_Angeles Demo: Color Tokens

Attendees will learn how ColorTokens implements Micro segmentation, leveraging host-based firewalls they already own.

Location of the event

Attendees will learn how ColorTokens implements Micro segmentation, leveraging host-based firewalls they already own.

11:25 AM to 11:35 AM
Demo: ConductorOne
Making Least Privilege a Reality
Cole Smith
Identity Security at ConductorOne
Add to Calendar 07/27/2023 11:25 AM 07/27/2023 11:35 AM America/Los_Angeles Demo: ConductorOne Location of the event
11:35 AM to 12:05 PM
2023 Trends and Directions In Cybersecurity
General Sessions
event-simple-logo
Luis Marte-Diaz
Director of Growth at IONIX
Brian Zinsmeister
Senior Solutions Engineer at LogicGate, Inc.
Nagarajan Chakravarthy
Chief Digital Officer at Iopex
12:10 PM to 12:40 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:40 PM to 01:15 PM
Guest Keynote Presentation: Visibility and Management across Assets & Vulnerabilities
General Sessions
event-simple-logo
Nemi George
Vice President, Information Security at Pacific Dental Services
Victor Monga
CISO and Head of Cybersecurity Strategy at Virtually Testing Foundation
01:40 PM to 02:10 PM
Cybersecurity is only as strong as its weakest link.
General Sessions
David Hagen
Cyber Security Evangelist at TPX Communications
Add to Calendar 07/27/2023 01:40 PM 07/27/2023 02:10 PM Cybersecurity is only as strong as its weakest link.

 Let’s look at identifying most common gaps in our information security posture. No matter how sophisticated, advanced technology will always be constrained by human factors. Understanding vulnerabilities and your risk is the first step to putting the necessary measures in place to secure these weakest links.

 Let’s look at identifying most common gaps in our information security posture. No matter how sophisticated, advanced technology will always be constrained by human factors. Understanding vulnerabilities and your risk is the first step to putting the necessary measures in place to secure these weakest links.

02:10 PM to 02:45 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Victor Monga - Moderator
CISO and head of Cybersecurity Strategy at Virtually Testing Foundation
Nelson Estrada
IT Director at Good Farms
EJ Hilbert
Founder at KCECyber
Quincey Collins
Chief Security Officer at Sheppard, Mullin, Richter & Hampton, LLP.
Kirk Yamamoto
IT Project Manager at City of Long Beach
Derek Melber
VP of Product Engagement and Outreach at QOMPLX, Inc.
03:10 PM to 03:45 PM
Cyber Inter-Agency Panel
General Sessions
Deronda Dubose
Technical Special Agent at USSS
Mike Kingsley
Cybersecurity Advisor at CISA
Bryan Willett
Supervisory Special Agent (SSA) at FBI
03:45 PM to 04:20 PM
Keynote Presentation: Deserving the Budget You Need
General Sessions
event-simple-logo
Ira Winkler
Field CISO & VP CYE Security
Add to Calendar 07/27/2023 03:45 PM 07/27/2023 04:20 PM Keynote Presentation: Deserving the Budget You Need

Cybersecurity budgets are typically determined by a percentage of the IT budget, which is irrelevant to actual organizational risk. This presentation presents a methodology to use risk to determine return on investment for countermeasures to justify the needed program.

Cybersecurity budgets are typically determined by a percentage of the IT budget, which is irrelevant to actual organizational risk. This presentation presents a methodology to use risk to determine return on investment for countermeasures to justify the needed program.

04:20 PM to 05:30 PM
Networking Reception & Happy Hour with Book Signing.
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.
04:20 PM to 04:30 PM
Signed Books by Keynote Speaker Ira Winkler
General Sessions
event-simple-logo
About the Book:
You Can Stop Stupid
Add to Calendar 07/27/2023 04:20 PM 07/27/2023 04:30 PM America/Los_Angeles Signed Books by Keynote Speaker Ira Winkler

Stopping Losses from Accidental and Malicious Actions

Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses.

Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya’s You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement.

  • Minimize business losses associated with user failings
  • Proactively plan to prevent and mitigate data breaches
  • Optimize your security spending
  • Cost justify your security and loss reduction efforts
  • Improve your organization’s culture

Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.

Location of the event

Stopping Losses from Accidental and Malicious Actions

Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses.

Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya’s You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement.

  • Minimize business losses associated with user failings
  • Proactively plan to prevent and mitigate data breaches
  • Optimize your security spending
  • Cost justify your security and loss reduction efforts
  • Improve your organization’s culture

Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.