APRIL 28, 2025

MGM GRAND | LAS VEGAS

days
hours
minutes
seconds
00
00
00
00
days
hours
minutes
seconds

JOIN US FOR KASEYA SECURITY LIVE!

An All-New Immersive Cybersecurity Event at Kaseya Connect 

Kaseya Security Live is a dedicated pre-day event designed for professionals passionate about cybersecurity. This event offers an immersive, hands-on experience to tackle emerging cybersecurity threats facing businesses worldwide. Walk away with the skills and knowledge you need to fortify your internal and external systems against modern threats.

WHAT TO EXPECT

Thought Leadership Sessions

Hear from leading cybersecurity experts who will discuss the latest trends and challenges in the cybersecurity landscape.

Hands-On Security Workshops

Participate in interactive, real-world sessions designed to arm you with practical skills to identify, respond to, and mitigate threats.

WHY ATTEND?

In a world where cybersecurity threats evolve daily, staying ahead is critical. Kaseya Security Live ensures you leave armed with:

  • Up-to-date knowledge on emerging threats.
  • Practical skills to protect your organization’s systems.
  • Insights from experts who understand the global cybersecurity landscape.


ALREADY REGISTERED?

Modify your event registration here to register for Kaseya Security Live!

AGENDA AT A GLANCE:

OFFICIAL WELCOME — 8:30AM - 8:45AM

Jim Lippie

Chief Product Officer, Kaseya

KEYNOTE — 8:45AM - 9:30AM

Keys to the Kingdom: Safeguarding Identity in Electronic Communications

Long gone are the days of sealing the deal with a handshake! For many businesses, in-person interactions of any kind are a rarity. With our ever-increasing dependance upon electronic communications to conduct business, how do we validate identity and establish trust? What happens when that process goes awry or is abused? Based on real-world examples and extensive experience helping businesses respond to and recover from cybersecurity incidents, this presentation will explore how identity attacks occur, discuss the business impact of email compromise, and review opportunities to safeguard identity in electronic communications.

Patterson Cake

Principal DFIR Consultant, Black Hills Information Security

WORKSHOP 1 — 10:00AM - 11:30AM

Understanding Adversary-in-the-Middle (AiTM) Attacks on Microsoft 365

Dive into the sophisticated world of Adversary-in-the-Middle (AiTM) attacks targeting Microsoft 365 environments, key takeaways include:

• Understanding the full lifecycle of an AiTM attack.

• Exploring why traditional MFA is insufficient against these attacks.

• Implementing practical defenses like token protection and advanced M365 configurations.

Benjamin Jones

Director of Managed SaaS Alerts, Kaseya

WORKSHOP 2 — 12:30PM - 3:00PM

Demystifying EDR

Explore how EDR technology detects and stops sophisticated cyberattacks through real-world use cases and actionable strategies. Learn how to:

• Monitor endpoint behaviors to detect anomalies.

• Leverage the MITRE ATTACK framework for advanced threat detection.

• Stop ransomware and hands-on-keyboard attacks

Christopher Gerritz

Director of Kaseya Labs, Kaseya

WORKSHOP 3 — 3:30PM - 5:00PM

Incident Response Planning

Preparation is key to surviving and thriving in the face of cyber threats. Join Jeffrey Wells, a seasoned cybersecurity expert, as he leads this comprehensive workshop on incident response. Topics include:

• Developing incident response plans for ransomware, insider threats, and natural disasters.

• Creating business continuity and disaster recovery plans to maintain operations during crises.

• Understanding emerging risks and how to align strategies with national and international standards. 

Jeffrey Wells

Senior Fellow, National Security Institute

COPYRIGHT © 2025  |  ALL RIGHTS RESERVED.