
APRIL 28, 2025
MGM GRAND | LAS VEGAS
JOIN US FOR KASEYA SECURITY LIVE!
An All-New Immersive Cybersecurity Event at Kaseya Connect
Kaseya Security Live is a dedicated pre-day event designed for professionals passionate about cybersecurity. This event offers an immersive, hands-on experience to tackle emerging cybersecurity threats facing businesses worldwide. Walk away with the skills and knowledge you need to fortify your internal and external systems against modern threats.
WHAT TO EXPECT
Thought Leadership Sessions
Hear from leading cybersecurity experts who will discuss the latest trends and challenges in the cybersecurity landscape.
Hands-On Security Workshops
Participate in interactive, real-world sessions designed to arm you with practical skills to identify, respond to, and mitigate threats.
WHY ATTEND?
In a world where cybersecurity threats evolve daily, staying ahead is critical. Kaseya Security Live ensures you leave armed with:
- Up-to-date knowledge on emerging threats.
- Practical skills to protect your organization’s systems.
- Insights from experts who understand the global cybersecurity landscape.



ALREADY REGISTERED?
Modify your event registration here to register for Kaseya Security Live!
AGENDA AT A GLANCE:

OFFICIAL WELCOME — 8:30AM - 8:45AM

Jim Lippie
Chief Product Officer, Kaseya
KEYNOTE — 8:45AM - 9:30AM
Keys to the Kingdom: Safeguarding Identity in Electronic Communications
Long gone are the days of sealing the deal with a handshake! For many businesses, in-person interactions of any kind are a rarity. With our ever-increasing dependance upon electronic communications to conduct business, how do we validate identity and establish trust? What happens when that process goes awry or is abused? Based on real-world examples and extensive experience helping businesses respond to and recover from cybersecurity incidents, this presentation will explore how identity attacks occur, discuss the business impact of email compromise, and review opportunities to safeguard identity in electronic communications.

Patterson Cake
Principal DFIR Consultant, Black Hills Information Security
WORKSHOP 1 — 10:00AM - 11:30AM
Understanding Adversary-in-the-Middle (AiTM) Attacks on Microsoft 365
Dive into the sophisticated world of Adversary-in-the-Middle (AiTM) attacks targeting Microsoft 365 environments, key takeaways include:
• Understanding the full lifecycle of an AiTM attack.
• Exploring why traditional MFA is insufficient against these attacks.
• Implementing practical defenses like token protection and advanced M365 configurations.

Benjamin Jones
Director of Managed SaaS Alerts, Kaseya
WORKSHOP 2 — 12:30PM - 3:00PM
Demystifying EDR
Explore how EDR technology detects and stops sophisticated cyberattacks through real-world use cases and actionable strategies. Learn how to:
• Monitor endpoint behaviors to detect anomalies.
• Leverage the MITRE ATTACK framework for advanced threat detection.
• Stop ransomware and hands-on-keyboard attacks

Christopher Gerritz
Director of Kaseya Labs, Kaseya
WORKSHOP 3 — 3:30PM - 5:00PM
Incident Response Planning
Preparation is key to surviving and thriving in the face of cyber threats. Join Jeffrey Wells, a seasoned cybersecurity expert, as he leads this comprehensive workshop on incident response. Topics include:
• Developing incident response plans for ransomware, insider threats, and natural disasters.
• Creating business continuity and disaster recovery plans to maintain operations during crises.
• Understanding emerging risks and how to align strategies with national and international standards.

Jeffrey Wells
Senior Fellow, National Security Institute
COPYRIGHT © 2025 | ALL RIGHTS RESERVED.