APRIL 28, 2025

MGM GRAND | LAS VEGAS

days
hours
minutes
seconds
00
00
00
00
days
hours
minutes
seconds

JOIN US FOR KASEYA SECURITY LIVE!

An All-New Immersive Cybersecurity Event at Kaseya Connect Global

Kaseya Security Live is a dedicated pre-day event designed for professionals passionate about cybersecurity. This event offers an immersive, hands-on experience to tackle emerging cybersecurity threats facing businesses worldwide. Walk away with the skills and knowledge you need to fortify your internal and external systems against modern threats.

WHAT TO EXPECT

Thought Leadership Sessions

Hear from leading cybersecurity experts who will discuss the latest trends and challenges in the cybersecurity landscape.

Hands-On Security Workshops

Participate in interactive, real-world sessions designed to arm you with practical skills to identify, respond to, and mitigate threats.

Certified Training Opportunities

Gain access to certified training sessions throughout the event, equipping you with advanced knowledge and tools to strengthen your organization’s defenses.

WHY ATTEND?

In a world where cybersecurity threats evolve daily, staying ahead is critical. Kaseya Security Live ensures you leave armed with:

  • Up-to-date knowledge on emerging threats.
  • Practical skills to protect your organization’s systems.
  • Insights from experts who understand the global cybersecurity landscape.


AGENDA AT A GLANCE:

KEYNOTE — 9:10AM - 10:20AM

The Evolving Threat Landscape and Kaseya's Role in Tackling Emerging Threats

WORKSHOP 1 — 10:50AM - 12:20PM

Demystifying EDR

Explore how EDR technology detects and stops sophisticated cyberattacks through real-world use cases and actionable strategies. Learn how to:

  •     Monitor endpoint behaviors to detect anomalies.
  •     Leverage the MITRE ATTACK framework for advanced threat detection.
  •     Stop ransomware and hands-on-keyboard attacks.




WORKSHOP 2 — 1:20PM - 2:50PM

Understanding Adversary-in-the-Middle (AiTM) Attacks on Microsoft 365

Dive into the sophisticated world of Adversary-in-the-Middle (AiTM) attacks targeting Microsoft 365 environments, key takeaways include:

  • Understanding the full lifecycle of an AiTM attack.
  • Exploring why traditional MFA is insufficient against these attacks.
  • Implementing practical defenses like token protection and advanced M365 configurations.




WORKSHOP 3 — 3:20PM - 4:50PM

Incident Response Planning

Preparation is key to surviving and thriving in the face of cyber threats. Join Jeffrey Wells, a seasoned cybersecurity expert, as he leads this comprehensive workshop on incident response. Topics include:

  • Developing incident response plans for ransomware, insider threats, and natural disasters.
  • Creating business continuity and disaster recovery plans to maintain operations during crises.
  • Understanding emerging risks and how to align strategies with national and international standards.

COPYRIGHT © 2025  |  ALL RIGHTS RESERVED.