![](http://v.fastcdn.co/t/aa805585/9e0ba551/1738875328-65348703-462x289-logo-ksl-white-verti.png)
APRIL 28, 2025
MGM GRAND | LAS VEGAS
JOIN US FOR KASEYA SECURITY LIVE!
An All-New Immersive Cybersecurity Event at Kaseya Connect Global
Kaseya Security Live is a dedicated pre-day event designed for professionals passionate about cybersecurity. This event offers an immersive, hands-on experience to tackle emerging cybersecurity threats facing businesses worldwide. Walk away with the skills and knowledge you need to fortify your internal and external systems against modern threats.
WHAT TO EXPECT
Thought Leadership Sessions
Hear from leading cybersecurity experts who will discuss the latest trends and challenges in the cybersecurity landscape.
Hands-On Security Workshops
Participate in interactive, real-world sessions designed to arm you with practical skills to identify, respond to, and mitigate threats.
Certified Training Opportunities
Gain access to certified training sessions throughout the event, equipping you with advanced knowledge and tools to strengthen your organization’s defenses.
WHY ATTEND?
In a world where cybersecurity threats evolve daily, staying ahead is critical. Kaseya Security Live ensures you leave armed with:
- Up-to-date knowledge on emerging threats.
- Practical skills to protect your organization’s systems.
- Insights from experts who understand the global cybersecurity landscape.
![](http://v.fastcdn.co/t/aa805585/9e0ba551/1738875336-65348716-88x100-ksl-geo1.png)
![](http://v.fastcdn.co/t/aa805585/9e0ba551/1738875334-65348715-90x103-ksl-geo2.png)
![](http://v.fastcdn.co/t/aa805585/9e0ba551/1738875337-65348714-88x100-ksl-geo3.png)
AGENDA AT A GLANCE:
![](http://v.fastcdn.co/t/aa805585/9e0ba551/1738875326-65348708-388x23-ksl-stripes-horiz.png)
KEYNOTE — 9:10AM - 10:20AM
The Evolving Threat Landscape and Kaseya's Role in Tackling Emerging Threats
WORKSHOP 1 — 10:50AM - 12:20PM
Demystifying EDR
Explore how EDR technology detects and stops sophisticated cyberattacks through real-world use cases and actionable strategies. Learn how to:
- Monitor endpoint behaviors to detect anomalies.
- Leverage the MITRE ATTACK framework for advanced threat detection.
- Stop ransomware and hands-on-keyboard attacks.
WORKSHOP 2 — 1:20PM - 2:50PM
Understanding Adversary-in-the-Middle (AiTM) Attacks on Microsoft 365
Dive into the sophisticated world of Adversary-in-the-Middle (AiTM) attacks targeting Microsoft 365 environments, key takeaways include:
- Understanding the full lifecycle of an AiTM attack.
- Exploring why traditional MFA is insufficient against these attacks.
- Implementing practical defenses like token protection and advanced M365 configurations.
WORKSHOP 3 — 3:20PM - 4:50PM
Incident Response Planning
Preparation is key to surviving and thriving in the face of cyber threats. Join Jeffrey Wells, a seasoned cybersecurity expert, as he leads this comprehensive workshop on incident response. Topics include:
- Developing incident response plans for ransomware, insider threats, and natural disasters.
- Creating business continuity and disaster recovery plans to maintain operations during crises.
- Understanding emerging risks and how to align strategies with national and international standards.
COPYRIGHT © 2025 | ALL RIGHTS RESERVED.