Dinner at Craftsteak Main Point of Contact: Sean Kettner +16897770180
oin the Huntress team for an interactive workshop where you will learn that practicing your IR plan is not just a routine exercise—it's a critical component of proactive cybersecurity management. This workshop will walk attendees through a real-life scenario from incident to resolution ensuring your team and your customers know how to react in an incident.
Threat actors have been doubling down on critical infrastructure segments that MSPs serve (healthcare, finance, and energy). Get firsthand insights on the evolving threats in this space and how to translate them into risk to revenue conversations with your clients and prospects. Join us for cocktails while we chat about the landscape of cyberthreats, and don’t miss our custom swag giveaway!
Stop chasing shadows – actively hunt threats with this interactive EDR workshop. Through hands-on exercises, you'll learn to leverage Endpoint Detection and Response (EDR) tools to identify, investigate, and contain threats in real-time. Attendees will walk away from this workshop with a heightened awareness of the real-life effort that goes into developing threat detection algorithms along with custom alerts for newly-emerging attack vectors. Participants will leave with a practical cyber prevention roadmap document exclusively provided during this workshop which was developed by the BLOKWORX team and honed over time with 25+ years experience.
Looking forward to discussing AI and help desk automations over a meal at Nellie's Southern Kitchen, where you can enjoy some homemade southern cuisine. The Pia team is eager to connect with the community as we unwind, share a meal, and talk about streamlining processes and resolving tickets. Main Point of Contact: Nic Ferraro
Wolfgang Puck, MGM Building at 7:30 on Thursday. Relaxed and engaging evening with great company and valuable discussions. POC: Francis Jones - (814) 243-2325 or Nick Wolf - (203) 437-0808
Take your MSP to MVP and join ScalePad for their VIP hosted dinner at CRUSH American Grill, located in the MGM Grand! POC: Ola Witukiewicz 403-466-3205
Once you are "Right of Boom", the options for detecting malicious actors are limited. This hands-on workshop will introduce you to network-based threat hunting, a versatile approach that requires no agents and is effective across a wide range of platforms including workstations, servers, network equipment, BYOD, IoT, and IIoT devices. Participants will gain skills in collecting and analyzing network telemetry to identify potential Command and Control (C2) channels as well as performing network forensics.
While there are hundreds of security program capabilities, there are a small subset that are essential to cyber resilience. Your expert instructor from BHIS calls these Atomic Controls. This session equips you with the. skills needed to assure the cyber resilience of IT infrastructure by taking a deep look at two key Atomic Controls - credential security and backups. You will walk away prepared to audit your control implementations readiness to protect and recover from adverse events.
Stop chasing shadows – actively hunt threats with this interactive EDR workshop. Through hands-on exercises, you'll learn to leverage Endpoint Detection and Response (EDR) tools to identify, investigate, and contain threats in real-time. Attendees will walk away from this workshop with a heightened awareness of the real-life effort that goes into developing threat detection algorithms along with custom alerts for newly-emerging attack vectors. Participants will leave with a practical cyber prevention roadmap document exclusively provided during this workshop which was developed by the BLOKWORX team and honed over time with 25+ years experience.
United States Army combat veteran Michael Crean (and former MSSP CEO) will be discussing principles of leadership he has learned on and off the battlefield. As an Army Combat Veteran, he came to understand that leadership is not just a responsibility; it is a profound privilege. Through his experiences on the battlefield and as a CEO for the last 21 years, he has witnessed firsthand how leadership can shape destinies and bring about significant change. Leading a team of Soldiers or a team of Executives is a weighty honor, as it means being entrusted with the well-being of others. The men and women who follow a leader place their trust and faith in that individual's decisions, knowing that their own success depends on the competence and judgment of their leader. This immense responsibility comes with the privilege of being able to make a positive impact on the lives of those under your command. Leadership is not about barking orders or seeking personal glory; it's about guiding, inspiring, and empowering the team. The privilege of Leadership is in the ability to influence positive change, to cultivate a culture of resilience and unity, and to guide the team towards a common goal. It is witnessing the transformation of individuals into a cohesive force, working together to overcome challenges and achieve shared objectives.
Michael Crean
SonicWall
Cybercriminals have become highly organized, operating sophisticated businesses designed to exploit vulnerabilities and profit from unprepared targets. In this panel discussion, ZB Serrato, a former MSP and now a leader at Bitdefender, will guide an expert panel including Mark Shaw (Stored Tech), Nett Lynch (Kraft & Kennedy), Kyle Christensen (Former MSP), and Martin Zugec (Bitdefender) as they explore the economic dynamics of cybercrime and their impact on the cybersecurity industry. Learn how MSPs can adapt to this evolving threat landscape, turn security into a competitive advantage, and protect their customers while driving sustainable growth. This session will offer actionable insights for MSPs looking to stay ahead in the business of cybersecurity.
Zibeon Serrato
Bitdefender
Nett Lynch
Kraft & Kennedy
Kyle Christensen
Empath
Martin Zugec
Bitdefender
Mark Shaw
Stored Technology Solutions, Inc.
MSP Dinner - Nine Fine Irishmen at New York-New York Hotel & Casino Main contact number: 720-550-3211
Join 1Password and Decipher for a fun evening at TopGolf from 8-11pm. Please meet the 1Password team at the entrance to TopGolf at 7:45pm. Come for the conversation, food, drinks, and a good swing of the club Main POC: Celeste Steele
With the rapid shift to cloud-based productivity suites like Microsoft 365 (M365), understanding and securing these platforms is no longer optional—it's essential. In our "Breaching M365" training, we’ll guide you through the hidden vulnerabilities and common misconfigurations that can leave M365 environments exposed. Default settings might seem convenient, but they can also be a gateway for attackers if left unchecked. This course will arm you with the expertise to uncover these weak points, exploit them ethically, and fortify your clients’ defenses. What You'll Learn: • In-Depth M365 Security: Get hands-on with the inner workings of M365 security, exploring real-world scenarios where attackers could gain access. • Identify & Exploit Weaknesses: Learn how to spot and exploit vulnerabilities before malicious actors do, giving you the upper hand in securing your clients' data. • Mitigation Strategies: Develop robust strategies to mitigate risks and ensure your clients’ M365 environments are as secure as possible. Whether you're an experienced penetration tester or just beginning your journey into cloud security, this session offers actionable insights that will elevate your skills and reinforce your value to your clients. Don’t just keep up with the threats—stay ahead of them with "Breaching M365."
We would like to invite you to a happy hour the Cisco team is hosting on February 20th at TopGolf. Join us to enjoy a taco dinner, an open bar, and practice your swing! TopGolf is an easy walk from the MGM Grand Convention Center. Main Point of Contact: Gabrielle Giles
Join us for a unique experience at Top Golf, where you'll have the opportunity to engage with industry professionals, MSPs, and key stakeholders in a relaxed and interactive environment. This event is perfect for those looking to establish new partnerships, explore business opportunities, and strengthen existing relationships within the MSP community! Main POCs: Amanda Young & Meaghan Gonzalez
We have the pleasure to host you to a fun evening at TOP Golf - Las Vegas! Food and Drinks are on us! Would love to say good golf shots are on us too but, that’s up to you! We will be sending a calendar invite to confirm your attendance. Make sure you add it to your calendar! Main Point of Contact: Nicole Ibarra
Master the fundamentals of security operations! This SOC Core Skills workshop equips you with essential skills for identifying and responding to cyber threats. Learn network analysis, live forensics, incident response, and more – all the critical tools needed to thrive in a Security Operation Center (SOC) environment.
The single hardest part of B2B solutions today isn’t selling them, it’s buying them. Today’s customers find themselves quickly confronted with too many options, too much information, and unimaginable decision complexity. The result is typically smaller, safer, price-driven purchase decisions often including no decision at all. For customers, the result is frustration and resignation. For suppliers, it’s missed targets and stalled growth. The good news: Customers’ struggle to make confident decisions represents sellers’ best opportunity to stand out and deliver real value. How? By building customers’ confidence in themselves to make large-scale, collective decisions on behalf of their company. To build customers’ self-confidence the best sellers adopt a “framemaking” approach to selling, providing customers clear, actionable frameworks for learning, deciding, and realizing value.
Brent Adamson
Discover how to build and scale a profitable virtual CISO (vCISO) practice in a practical panel discussion, which brings together three unique perspectives: •Jesse Miller, an independent vCISO expert, shares his journey and strategies for starting and selling vCISO services •Shawn Waldman, CEO of Secure Cyber Defense reveals actionable MSP best practices for launching and managing a vCISO practice; •Dr. Jerry Craig, CISO at Integris and ex Ntiva CISO, offers insights into expanding a security business within a large MSP framework. Gain invaluable advice on defining service offerings, building a winning team and delivering impactful cybersecurity solutions tailored to diverse MSP sizes and needs.
Jerry Craig
Integris
Tim Coach
Cynomi
Shawn Waldman
SecureCyber
Jesse Miller
PowerPSA Consulting
Secure Network Technologies is an Offensive Security Team specializing in Risk Based Penetration Assessments and Incident Response Services. We are looking forward to discussing to how we can help your clients on a proactive front and become an extension of your service offerings. Main POC: Megan Scherer
In today's rapidly evolving digital landscape, robust cybersecurity measures are paramount for safeguarding business integrity and customer trust. Our "Cyber-Security Practice Development Sessions" workshop is designed to equip participants with the foundational tools and strategies necessary to build an initial security go-to-market (GTM) strategy and plan, with a focus on delivering impactful customer business outcomes. Throughout this immersive workshop, participants will delve into the critical role of security in business transformation, exploring how strategic security architecture can drive innovation and resilience. Attendees will engage in hands-on activities to develop their GTM plans, supported by real-world security GTM business cases that illustrate successful implementations and outcomes. Key components of the workshop include: •Role of Security in Business Transformation: Understanding how security initiatives can act as catalysts for broader business transformation and growth. •Strategic Security Architecture: Crafting a robust security framework that aligns with business objectives and enhances overall security posture. •Developing Your GTM Plan: Step-by-step guidance on creating a comprehensive GTM strategy tailored to your organization's unique needs and market conditions. •Security GTM Business Cases: Analyzing successful case studies to extract valuable insights and best practices. •Developing Service Offerings: Designing compelling security service offerings that address customer pain points and drive value. •Executive-Level Messaging: Crafting a persuasive and coherent message that resonates with executive stakeholders, emphasizing the strategic importance of cybersecurity investments. By the end of the workshop, participants will have a well-rounded understanding of how to position their security offerings effectively in the market, develop compelling service propositions, and communicate the value of their security initiatives to executive leadership. Join us to transform your cybersecurity practice and drive meaningful business outcomes through strategic security planning and execution.
OpenText will be hosting a special invite-only dinner at Morimoto Las Vegas at 7:30 pm on Thursday, February 20, 2025. Morimoto is located in the MGM Grand Hotel. Let's discuss how you can reimagine your cybersecurity and Microsoft strategies with OpenText. Morimoto Las Vegas Chef Masaharu Morimoto has created a bridge between the culinary traditions of his native Japan and the American palate, bringing intense excitement, exquisite technique, and perfectly balanced flavors to Las Vegas. The contemporary Japanese design of Morimoto Las Vegas combines delicate Japanese beauty and elegance, with exotic photographs by Yasumichi Morita, to create a stunning restaurant with a signature Morimoto touch. From the moment guests arrive, they will begin to experience Las Vegas in a new way; The Morimoto way. Main POC: Lisa Efstratis, lefstratis@opentext.com
You've been invited to join the NinjaOne team at a dinner at Morimoto during the Right of Boom. We're excited to have you attend. I'll keep it nice and brief. Dress code is business casual, and we'll meet at our booth to head over at 7 but you can meet us at the restaurant if you prefer at 7.30. I'm including a link to their website so you can get a feel for it beforehand if you'd like. https://mgmgrand.mgmresorts.com/en/restaurants/morimoto.html Main POC: Brett Pelster: brett.pelster@ninjaone.com and 4324888932
The Exigence MSP dinner will take place at: STK Las Vegas inside The Cosmopolitan. Meet us at the bar at 8pm for drinks and then we will go to the Tempest Storm Private Dining Room. Main Point of Contact: Noam Morginstin, 917-862-1819 (noam@exigence.io)
MSP Dinner With Guardz! POC: tal@guardz.com
Once you are "Right of Boom", the options for detecting malicious actors are limited. This hands-on workshop will introduce you to network-based threat hunting, a versatile approach that requires no agents and is effective across a wide range of platforms including workstations, servers, network equipment, BYOD, IoT, and IIoT devices. Participants will gain skills in collecting and analyzing network telemetry to identify potential Command and Control (C2) channels as well as performing network forensics.
While there are hundreds of security program capabilities, there are a small subset that are essential to cyber resilience. Your expert instructor from BHIS calls these Atomic Controls. This session equips you with the. skills needed to assure the cyber resilience of IT infrastructure by taking a deep look at two key Atomic Controls - credential security and backups. You will walk away prepared to audit your control implementations readiness to protect and recover from adverse events.
Wind down after Right of Boom with an exclusive dinner with Syncro at Superfrico on Feb 20 from 8-10 pm in the Cosmopolitan Hotel. Attendees are provided with Uber vouchers to cover their transportation to and from the restaurant. Main POC: Juan Maldonado - 720-709-2589
In this high-stakes cybersecurity tabletop session, Managed Service Providers (MSPs) will immerse themselves in a real-world, simulated incident involving the notorious Black Basta ransomware group. Participants will walk through a series of events where cybercriminals launch a massive spam campaign, impersonating the IT department to trick end users into downloading remote control software. This seemingly innocent action opens the floodgates for malware deployment, escalating into a full-blown ransomware attack. Throughout the session, MSPs will collaborate to identify vulnerabilities, react to the breach in real-time, and work through the critical steps of containment, eradication, and recovery. Attendees will gain hands-on experience in incident response, phishing prevention, and the strategic decision-making necessary to mitigate the impact of sophisticated social engineering tactics. By the end of this session, participants will be better equipped to fortify their defenses and navigate the complexities of modern ransomware attacks. This is a must-attend session for MSPs who want to sharpen their skills and better prepare for the rising tide of targeted cyberattacks. Special guests: Clark Harshbarger, Director of Incident Response at Crowdstrike and Chris Loehr, EVP of Solis.
Chris Loehr
Solis/Right of Boom
Noam Morginstin
Exigence Ltd.
Clark Harshbarger
CrowdStrike
We are thrilled to invite you to dinner at Smith & Wollensky's, located in the Venetian, at 7:30 PM. A bus will be available to transport guests from the MGM Grand to the dinner venue and back. Please refer to your calendar invite for detailed transportation instructions. We look forward to seeing you at Right of Boom! Main Point of Contact: Alicia Bowling, 815-595-0309
Machine Guns Vegas - join us a for a night out on the town Vegas style, featuring a stretch limo transportation to a top-of-the-line machine gun range, followed by a delicious meal catered by In-N-out Burger! Details will be sent via email, please meet us in the MGM Grand Lobby at 7pm. We can't wait to host you for an epic night! Main Point of Contact: Jeremy Bilfeld (jeremy@atakama.com)
Don’t be the reason your client fails their CMMC Assessment! This session will dive into the urgent requirements MSPs must meet to support Defense Industrial Base (DIB) clients under the Cybersecurity Maturity Model Certification (CMMC). We'll break down what compliance means for your business, the technical and operational changes you’ll need to implement, and the risks of falling behind. Learn how to position your MSP as a trusted partner in the DIB supply chain while avoiding costly pitfalls. If you're ready to secure your place in this high-stakes market, this session is a must-attend.
Ryan Bonner
DEFCERT
Mark Pardee
Prescott
Master the fundamentals of security operations! This SOC Core Skills workshop equips you with essential skills for identifying and responding to cyber threats. Learn network analysis, live forensics, incident response, and more – all the critical tools needed to thrive in a Security Operation Center (SOC) environment.
Join ContraForce and your peers for drinks and a great dinner at The Gambler’s Den, a private room in the Golden Steer Steakhouse (we are based in Texas after all!). Where: Gambler’s Den, Golden Steer Steakhouse, 308 W. Sahara Avenue, Las Vegas, NV, 89102 When: Drinks 7:30pm-8:00pm, Dinner 8:00pm – 10:00pm Dress code: Business casual ContraForce is transforming how managed security services are delivered by allowing service providers to jumpstart a new line of business, improve their margins and deliver better client outcomes. Main POC: Trevor Daughney, VP Marketing, 510-847-0567, trevor@contraforce.com
Todyl is looking forward to having you at BrewDog on Thursday, February 20th. Join us for appetizers, dinner, and drinks at 7:30pm. We have a private area reserved in The Fortress at BrewDog, located outside the MGM at 3767 Las Vegas Blvd S, Las Vegas, NV 89109 Date: Thursday, February 20th Time: 7:30pm Location: BrewDog - The Fortress (private space) Address: 3767 Las Vegas Blvd S, Las Vegas, NV 89109 Main Point of Contact: Molly Rudolph - mrudolph@todyl.com
Get ready for a night of camaraderie and fun! Join us at TopGolf on Thursday 20th at 7:45 PM for a fantastic evening filled with great conversation and good times. Our group will meet at the MGM Convention Center lobby at 7:30 PM and will depart shortly after 7:40 PM for a brief 5-minute walk to TopGolf Looking forward to seeing you there! Main Point of Contact: Miles Walker: (778) 788 3470
Excited to have you join us for the MSP Process & Mesh Hosted Dinner at Top Golf on Thursday, 20th February at 8 PM! We’ll be meeting at the MGM Grand Casino at 7:40 PM to walk over together, so feel free to meet us there, and we’ll head over as a group! POC: Elizabeth (elizabeth@mspprocess.com)
With the rapid shift to cloud-based productivity suites like Microsoft 365 (M365), understanding and securing these platforms is no longer optional—it's essential. In our "Breaching M365" training, we’ll guide you through the hidden vulnerabilities and common misconfigurations that can leave M365 environments exposed. Default settings might seem convenient, but they can also be a gateway for attackers if left unchecked. This course will arm you with the expertise to uncover these weak points, exploit them ethically, and fortify your clients’ defenses. What You'll Learn: • In-Depth M365 Security: Get hands-on with the inner workings of M365 security, exploring real-world scenarios where attackers could gain access. • Identify & Exploit Weaknesses: Learn how to spot and exploit vulnerabilities before malicious actors do, giving you the upper hand in securing your clients' data. • Mitigation Strategies: Develop robust strategies to mitigate risks and ensure your clients’ M365 environments are as secure as possible. Whether you're an experienced penetration tester or just beginning your journey into cloud security, this session offers actionable insights that will elevate your skills and reinforce your value to your clients. Don’t just keep up with the threats—stay ahead of them with "Breaching M365."
Establishing and maintaining Command and Control (C2) is at the core of nearly all successful cyber-attacks. Covert C2 mechanisms are critical for the stealthy operation of threat activity – the longer the dwell time, the likelihood increases that an attacker reaches their overall objective. This workshop delves into the sophisticated techniques used to underpin covert C2, exploring how attackers establish and maintain hidden communication channels within compromised environments. We will examine the techniques used to conceal C2 traffic, including the use of infrastructure, encryption/obfuscation, and the exploitation of legitimate services to blend in with normal network activity. Attendees will gain insights into the latest trends and tactics in covert C2 and learn methods that bypass traditional threat detection solutions. Additionally, we will cover the challenges in detecting and mitigating these threats, and best practices for enhancing network defenses. Furthermore, there will be a live walkthrough demonstrating the setup and execution of a malleable C2 framework, with material and resources provided for attendees to practice on their own.
Once you are "Right of Boom", the options for detecting malicious actors are limited. This hands-on workshop will introduce you to network-based threat hunting, a versatile approach that requires no agents and is effective across a wide range of platforms including workstations, servers, network equipment, BYOD, IoT, and IIoT devices. Participants will gain skills in collecting and analyzing network telemetry to identify potential Command and Control (C2) channels as well as performing network forensics.
Once you are "Right of Boom", the options for detecting malicious actors are limited. This hands-on workshop will introduce you to network-based threat hunting, a versatile approach that requires no agents and is effective across a wide range of platforms including workstations, servers, network equipment, BYOD, IoT, and IIoT devices. Participants will gain skills in collecting and analyzing network telemetry to identify potential Command and Control (C2) channels as well as performing network forensics.
Master the fundamentals of security operations! This SOC Core Skills workshop equips you with essential skills for identifying and responding to cyber threats. Learn network analysis, live forensics, incident response, and more – all the critical tools needed to thrive in a Security Operation Center (SOC) environment.
While there are hundreds of security program capabilities, there are a small subset that are essential to cyber resilience. Your expert instructor from BHIS calls these Atomic Controls. This session equips you with the. skills needed to assure the cyber resilience of IT infrastructure by taking a deep look at two key Atomic Controls - credential security and backups. You will walk away prepared to audit your control implementations readiness to protect and recover from adverse events.
Please join Appgate for dinner at Wolfgang Puck Bar & Grill , located within the MGM Grand Hotel & Casino. Wolfgang Puck Bar & Grill modernizes the traditional “bar and grill” concept offering an elevated dining experience in a dynamic and energetic atmosphere. Featuring an open setting, Wolfgang Puck Bar & Grill is the perfect place to dine. - if you have any dietary limitations or questions, call me at 510-517-8555 or email Richard.Miller@appgate.com
In today’s fast-moving business world, making the right decisions can feel like a superpower. These fun and engaging sessions, dive into game changing topics such as mergers and acquisitions, threat intelligence, and how to interview your next SOC provider. You’ll discover how to make smart, informed choices that actually fit your goals—whether it’s finding the right security partner or building your own network of trusted go-to people. Led by industry experts, we’ll skip the buzzwords (looking at you, AI fads!) and focus on what truly drives success. And to top it off, you’ll take part in the interactive “Build Your Own Board of Directors” exercise to craft your personal dream team of advisors. Expect to walk away with fresh ideas, practical tools, and a plan to crush 2025 and beyond!
We welcome you to an exciting evening of dinner and networking with the IRONSCALES team and your fellow MSP peers. Our reservation is at 7:45PM at Crush - located within the MGM Grand near the Studio Tower rooms entrance. We look forward to seeing you there! Main POC: Katie Schlatter | kschlatter@ironscales.com | 518-527-5520
Liongard - Attack Surface Management Main Point of Contact: Marcus McNall - marcus.mcnall@liongard.com
Slide is a modern backup purpose built for MSPs. Visit https://slide.tech and stay tuned for more details! Main POC: Rebecca Myers, rebecca@slide.tech
Stop chasing shadows – actively hunt threats with this interactive EDR workshop. Through hands-on exercises, you'll learn to leverage Endpoint Detection and Response (EDR) tools to identify, investigate, and contain threats in real-time. Attendees will walk away from this workshop with a heightened awareness of the real-life effort that goes into developing threat detection algorithms along with custom alerts for newly-emerging attack vectors. Participants will leave with a practical cyber prevention roadmap document exclusively provided during this workshop which was developed by the BLOKWORX team and honed over time with 25+ years experience.
While there are hundreds of security program capabilities, there are a small subset that are essential to cyber resilience. Your expert instructor from BHIS calls these Atomic Controls. This session equips you with the. skills needed to assure the cyber resilience of IT infrastructure by taking a deep look at two key Atomic Controls - credential security and backups. You will walk away prepared to audit your control implementations readiness to protect and recover from adverse events.
Master the fundamentals of security operations! This SOC Core Skills workshop equips you with essential skills for identifying and responding to cyber threats. Learn network analysis, live forensics, incident response, and more – all the critical tools needed to thrive in a Security Operation Center (SOC) environment.
Unlock the secrets to transforming cybersecurity from a cost center to a profit driver in the MSP Experts Guide to CIS Critical Security Controls. Join industry visionaries John Strand, Phyllis Lee, and Curt Dukes for an immersive three-hour clinic designed specifically for Managed Service Providers (MSPs). This dynamic session will empower you to: •Master the CIS Critical Security Controls for seamless and effective implementation, delivering measurable security outcomes for your clients. •Leverage "Reasonable Cybersecurity" to build a compelling sales wedge, positioning your services as essential, compliant, and cost-effective solutions. •Understand Secure by Design Principles to risk-manage your vendors, ensuring your supply chain strengthens—not jeopardizes—your operations. Packed with actionable insights, proven strategies, and real-world examples, this clinic is your roadmap to harnessing the CIS Controls to protect clients, grow your business, and lead in the competitive MSP landscape. Don’t miss this opportunity to future-proof your services and your reputation.Price: $199.00 includes lunch and a 100% credit if you purchase the MSP Experts Guide to the Critical Security Controls, now a trusted partner of CIS and fills the training requirement for the CREST Accreditation for the Critical Security Controls. Please reach out to events@rightofboom.com if you'd like to learn more or register here: https://www.rightofboom.com/rob-2025/register?promo=CIS-COURSE2025
John Strand
BHIS
Curt Dukes
CIS
Phyllis Lee
CIS
The two-time MSP owner and industry guru, Gary Pica will join Aharon Chernin on stage to explore how you should use automation as a sales wedge. Improve productivity and close more deals with the knowledge gained during this sales automation session. You will learn how to leverage automation tools to streamline your sales process, personalize outreach, and nurture leads more efficiently. Gain a competitive edge by automating repetitive tasks and focusing on high-impact sales activities.
Aharon Chernin
Rewst
Gary Pica
TruMethods
While there are hundreds of security program capabilities, there are a small subset that are essential to cyber resilience. Your expert instructor from BHIS calls these Atomic Controls. This session equips you with the. skills needed to assure the cyber resilience of IT infrastructure by taking a deep look at two key Atomic Controls - credential security and backups. You will walk away prepared to audit your control implementations readiness to protect and recover from adverse events.
Bitdefender would like to personally invite you to an exclusive dinner with our team on Thursday, February 20th at 7:30 pm. This will be a great opportunity to connect, discuss future opportunities, and enjoy a wonderful meal at Emeril’s New Orleans Fish House (located in the MGM). Main Point of Contact: Jennifer Childs - jchilds@bitdefender.com
MSPGeek and Cyber Drain are proud to be hosting this Pre-Pre Day-Event which will offer an immersive experience designed to build and challenge the cybersecurity mindset in the face of an incident. The event will feature three short expert-led talks followed by an exciting cybersecurity incident escape room. Participants will be divided into teams, racing against the clock and each other to solve complex cybersecurity challenges from a non-technical perspective – focusing on problem solving, teamwork and resource allocation. No alliances—only one team will emerge victorious! Sign up today to claim your spot.
Once you are "Right of Boom", the options for detecting malicious actors are limited. This hands-on workshop will introduce you to network-based threat hunting, a versatile approach that requires no agents and is effective across a wide range of platforms including workstations, servers, network equipment, BYOD, IoT, and IIoT devices. Participants will gain skills in collecting and analyzing network telemetry to identify potential Command and Control (C2) channels as well as performing network forensics.
We’re excited to tee off the evening with you at Top Golf on Thursday, Feb 20th at 8 PM! Join us for a fun night of food, drinks and a few swings! ⛳️ Here are walking directions from the MGM Grand Casino: https://mgmgrand.mgmresorts.com/en/amenities/topgolf.html Main POC: Zoha Khan - zkhan@meshsecurity.io
This session will include a free flowing discussion starting with an awkward “where ya from?” And evolve into talking about the weather, how you’re doing at the blackjack table, what you learned at the conference, and an obligatory introduction to what we are building at Empath. Don’t worry, we will have plenty of time to sales pitch you another time - come break bread and make friends with the Empath team. Main Point of Contact: Alex Farling
We'll send all of our group an email very soon, once the location of our dinner is confirmed. We're very much looking forward to meeting with you all. Main POC: Will Connor - Co-founder - will@inforcer.com
What are we doing about deepfakes and Gen-AI based social engineering Main POC: mike@netarx.com
Cynomi TopGolf Event. Main Point of Contact: Tim Coach- coach@cynomi.com
With the rapid shift to cloud-based productivity suites like Microsoft 365 (M365), understanding and securing these platforms is no longer optional—it's essential. In our "Breaching M365" training, we’ll guide you through the hidden vulnerabilities and common misconfigurations that can leave M365 environments exposed. Default settings might seem convenient, but they can also be a gateway for attackers if left unchecked. This course will arm you with the expertise to uncover these weak points, exploit them ethically, and fortify your clients’ defenses. What You'll Learn: • In-Depth M365 Security: Get hands-on with the inner workings of M365 security, exploring real-world scenarios where attackers could gain access. • Identify & Exploit Weaknesses: Learn how to spot and exploit vulnerabilities before malicious actors do, giving you the upper hand in securing your clients' data. • Mitigation Strategies: Develop robust strategies to mitigate risks and ensure your clients’ M365 environments are as secure as possible. Whether you're an experienced penetration tester or just beginning your journey into cloud security, this session offers actionable insights that will elevate your skills and reinforce your value to your clients. Don’t just keep up with the threats—stay ahead of them with "Breaching M365."
Establishing and maintaining Command and Control (C2) is at the core of nearly all successful cyber-attacks. Covert C2 mechanisms are critical for the stealthy operation of threat activity – the longer the dwell time, the likelihood increases that an attacker reaches their overall objective. This workshop delves into the sophisticated techniques used to underpin covert C2, exploring how attackers establish and maintain hidden communication channels within compromised environments. We will examine the techniques used to conceal C2 traffic, including the use of infrastructure, encryption/obfuscation, and the exploitation of legitimate services to blend in with normal network activity. Attendees will gain insights into the latest trends and tactics in covert C2 and learn methods that bypass traditional threat detection solutions.
Stop chasing shadows – actively hunt threats with this interactive EDR workshop. Through hands-on exercises, you'll learn to leverage Endpoint Detection and Response (EDR) tools to identify, investigate, and contain threats in real-time. Attendees will walk away from this workshop with a heightened awareness of the real-life effort that goes into developing threat detection algorithms along with custom alerts for newly-emerging attack vectors. Participants will leave with a practical cyber prevention roadmap document exclusively provided during this workshop which was developed by the BLOKWORX team and honed over time with 25+ years experience.
Establishing and maintaining Command and Control (C2) is at the core of nearly all successful cyber-attacks. Covert C2 mechanisms are critical for the stealthy operation of threat activity – the longer the dwell time, the likelihood increases that an attacker reaches their overall objective. This workshop delves into the sophisticated techniques used to underpin covert C2, exploring how attackers establish and maintain hidden communication channels within compromised environments. We will examine the techniques used to conceal C2 traffic, including the use of infrastructure, encryption/obfuscation, and the exploitation of legitimate services to blend in with normal network activity. Attendees will gain insights into the latest trends and tactics in covert C2 and learn methods that bypass traditional threat detection solutions. Additionally, we will cover the challenges in detecting and mitigating these threats, and best practices for enhancing network defenses. Furthermore, there will be a live walkthrough demonstrating the setup and execution of a malleable C2 framework, with material and resources provided for attendees to practice on their own.
Join Cynomi's executive team, MSP industry leaders and seasoned CISOs, for an interactive, hands-on workshop designed specifically for MSPs eager to master the essential components of risk assessment, compliance management and other cybersecurity services. This exclusive Right of Boom pre-day event will guide attendees through the day-to-day responsibilities of a CISO, providing practical exercises that simulate real-world scenarios. In the session: · The Market Opportunity: 75% of service providers see high demand for vCISOs services among their customer base. How come only 21% provide these services? · Monetization: How to package, monetize and succeed with vCISO services. · Practical Workshop: Step-by-step exercise simulating a vCISO engagement including completing a risk assessment, generating security policies and remediation plans, reporting and more. Key takeaways: · Expert Guidance: Learn the essential steps and insights from leading CISOs · Hands-On Experience: Acquire practical skills based on real-world scenarios to enhance your own practice · Automation Is Key: Discover how to use a vCISO platform to save precious time and deliver high-quality cybersecurity services Bonus resources: · CISO Templates: Receive ready-to-use templates to integrate directly into your day-to-day work · Document Samples: Get access to real-life samples to use as a reference and save time · Guides:Equip yourself with actionable guides and get a clear plan on how to start or elevate your vCISO practice Register now to secure your spot and start your journey towards delivering exceptional (and efficient) vCISO services!
In today’s rapidly evolving threat landscape, cybersecurity is no longer just a technical concern—it's a key business priority. As an MSP, you are on the front lines, not only defending your customers but also acting as a trusted advisor and strategic partner when a cyber incident occurs. This immersive 4-hour workshop is designed to help MSPs elevate their role as trusted advisors by demonstrating how to deliver maximum value to your clients throughout every stage of a cybersecurity incident. Whether you’re already dealing with incidents or preparing for future risks, this session will provide actionable insights, best practices, and tools to help your business thrive during and after a crisis. From preparing your customers with proactive planning to responding to incidents with confidence and leveraging opportunities to enhance relationships post-incident, this workshop covers the full spectrum of incident response. Attendees will learn: •How to prepare customers with effective incident response plans, business impact analysis, and optimized cybersecurity investments. •Best practices for managing technical and non-technical challenges during a cyber incident. •Post-incident strategies to build trust and create long-term value through products and services. By the end of this workshop, you will have a comprehensive, actionable playbook for responding to cybersecurity incidents and leveraging those incidents to grow your business. Establish your MSP as a trusted advisor and ensure that you’re not just reacting to threats but proactively preparing your customers for the future. Who Should Attend: This workshop is ideal for MSP business owners and key decision-makers who are committed to providing outstanding cybersecurity services. Whether you’re new to incident management or looking to refine your approach, this session will equip you with the tools and strategies necessary to strengthen your client relationships and protect your bottom line.
What separates the most successful MSPs from the rest? It’s notjusttheir technology—it’s their ability to generate high-value leads, create meaningful differentiation, and deliver exceptional client success that drives long-term growth. In this 4-hour interactive session hosted by Blackpoint Cyber, join leading MSP partners as they share specific strategies they’ve used to enhance client outcomes, increase recurring revenue, and build long-term trust with their customer base. Walk away with actionable steps to integrate these innovations into your business today. Here’s what you’ll learn: Proven Lead-Generation Strategies to Win More Business Discover how top MSPs attract and convert qualified leads, target untapped markets, and stand out in a crowded landscape. Tips for Building Value and Differentiation Through Innovation Learn how advanced security solutions and tools can help you create meaningful differentiation and increase client retention. Learn how to implement scoring platforms to identify opportunities for improvement, design service offerings that resonate with high-value clients, and strengthen your competitive position. Actions You Can Take to Maximize Client Outcomes Winning the business is just the beginning. Learn how leading MSPs deliver game-changing post-sales support to maximize client success and retention. This session explores how to create long-term value, boost client “stickiness,” and create real competitive differentiation. Whether you’re focused on lead generation, improving client outcomes, or creating differentiation in the marketplace, this session offers practical takeaways and real-world advice from MSPs who’ve been in your shoes. Don’t miss this opportunity to transform your business in 2025 and beyond! Seats are limited—reserve your spot today!
Automation isn’t just about efficiency—it’s a key to unlocking stronger security. But how do you build a security-first automation culture without disrupting your day-to-day operations? Join Tim Fournet and Tricia Timney as they walk you through an interactive brainstorming session on how adopting an automation mindset can naturally fortify your MSP's security. Through real-world examples—like automating user access, security settings, and alert management—they’ll demonstrate how automation reduces errors, scales operations and strengthens your infrastructure. Don’t miss this session—it’s your chance to transform the future of your MSP by rethinking how you approach security, efficiency, and automation.
Security teams work hard to keep attackers out, but most don’t realize their systems are already at risk from the inside. Misconfigurations, inconsistent policies, and weak hardening leave gaps that attackers love. Microsoft doesn’t solve this problem, and patching alone won’t keep you safe. That’s where Senteon comes in. We take the guesswork out of hardening by automating secure configurations, enforcing compliance, and keeping systems locked down, accurately and consistently. Join us for a relaxed dinner where we’ll introduce how Senteon makes security teams stronger by eliminating soft spots before attackers can exploit them. No fluff, just real talk about security that actually works. Good food, good company, and a smarter way to secure your systems. Come hungry. Leave hardened. Main point of Contact: Zach Kromkowski
How about grabbing dinner at Tom Colicchio's Craftsteak? Join us Thursday, February 20th, at 8 PM for a night of amazing food, good conversations, and great company. We’ll dig into some bold dishes, chat about cybersecurity, life, and whatever else comes up, all while kicking back with some awesome people. We’ve got a spot with your name on it—come hungry and ready for a fun evening! Main Point of Contact: Becky Teal | 402-619-1975
Join the Blumira team for a fun night at TopGolf! Swing by our booth at 7:45 PM to walk over together, or meet us there at 8 PM for great food, drinks, and friendly competition. Can’t wait to see you! — Jake, Kass, and Ayela Main point of Contact: Kass Lawrence (klawrence@blumira.com, (734)749-4068)
With the rapid shift to cloud-based productivity suites like Microsoft 365 (M365), understanding and securing these platforms is no longer optional—it's essential. In our "Breaching M365" training, we’ll guide you through the hidden vulnerabilities and common misconfigurations that can leave M365 environments exposed. Default settings might seem convenient, but they can also be a gateway for attackers if left unchecked. This course will arm you with the expertise to uncover these weak points, exploit them ethically, and fortify your clients’ defenses. What You'll Learn: • In-Depth M365 Security: Get hands-on with the inner workings of M365 security, exploring real-world scenarios where attackers could gain access. • Identify & Exploit Weaknesses: Learn how to spot and exploit vulnerabilities before malicious actors do, giving you the upper hand in securing your clients' data. • Mitigation Strategies: Develop robust strategies to mitigate risks and ensure your clients’ M365 environments are as secure as possible. Whether you're an experienced penetration tester or just beginning your journey into cloud security, this session offers actionable insights that will elevate your skills and reinforce your value to your clients. Don’t just keep up with the threats—stay ahead of them with "Breaching M365."
With the rapid shift to cloud-based productivity suites like Microsoft 365 (M365), understanding and securing these platforms is no longer optional—it's essential. In our "Breaching M365" training, we’ll guide you through the hidden vulnerabilities and common misconfigurations that can leave M365 environments exposed. Default settings might seem convenient, but they can also be a gateway for attackers if left unchecked. This course will arm you with the expertise to uncover these weak points, exploit them ethically, and fortify your clients’ defenses. What You'll Learn: • In-Depth M365 Security: Get hands-on with the inner workings of M365 security, exploring real-world scenarios where attackers could gain access. • Identify & Exploit Weaknesses: Learn how to spot and exploit vulnerabilities before malicious actors do, giving you the upper hand in securing your clients' data. • Mitigation Strategies: Develop robust strategies to mitigate risks and ensure your clients’ M365 environments are as secure as possible. Whether you're an experienced penetration tester or just beginning your journey into cloud security, this session offers actionable insights that will elevate your skills and reinforce your value to your clients. Don’t just keep up with the threats—stay ahead of them with "Breaching M365."
Master the fundamentals of security operations! This SOC Core Skills workshop equips you with essential skills for identifying and responding to cyber threats. Learn network analysis, live forensics, incident response, and more – all the critical tools needed to thrive in a Security Operation Center (SOC) environment.
Establishing and maintaining Command and Control (C2) is at the core of nearly all successful cyber-attacks. Covert C2 mechanisms are critical for the stealthy operation of threat activity – the longer the dwell time, the likelihood increases that an attacker reaches their overall objective. This workshop delves into the sophisticated techniques used to underpin covert C2, exploring how attackers establish and maintain hidden communication channels within compromised environments. We will examine the techniques used to conceal C2 traffic, including the use of infrastructure, encryption/obfuscation, and the exploitation of legitimate services to blend in with normal network activity. Attendees will gain insights into the latest trends and tactics in covert C2 and learn methods that bypass traditional threat detection solutions.
Mike knows MSPs - he built and operated a highly successful MSP for over 30 years before recently selling his business. Drawing from personal experience he will explore the critical aspects of building a Managed Service Provider (MSP) for mergers and acquisitions (M&A). He will highlight the opportunities and challenges this presented before, during and after the transaction, providing a balanced perspective on the "Lightside & Darkside of M&A." He will share personal insights on "What I learned and loved" and "What I would do differently" to offer you valuable lessons for navigating M&A. His aim is to equip you with the knowledge and strategies needed for successful M&A initiatives and long-term business objectives.
Mike Estep
Blackpoint Cyber
Join AvePoint for an exclusive evening of dining and engaging conversation at Morimoto, Las Vegas onsite at the MGM Grand Resort. Enjoy an unforgettable experience featuring world-class Japanese cuisine, alongside industry peers and AvePoint Industry experts. This is more than just dinner—it’s an opportunity to connect and exchange insights, in a relaxed and refined atmosphere. Date: February 20, 2025 Time: 7:45 Pm Location: Morimoto, Las Vegas - MGM Grand Main POC: Scott Sacket
Join the Cynet Crew for a Night of Yummy Eats and Good Vibes! Get ready for an evening filled with delicious food and great company at Kraft Steakhouse! We’re thrilled to gather around the table, break some bread, and dive into fantastic conversations. This is a great opportunity to network with our awesome new CEO, Jason Magee, and make some amazing connections. We can't wait to connect with you, let’s make it a night to remember! Main POC: Jeannine Edwards, JeannineE@cynet.com
In this presentation we examine the pivotal role of AI in enhancing cybersecurity through capabilities such as threat detection and predictive analytics, while also acknowledging the risks of over-reliance on AI, data mismanagement, and skill shortages. Additionally, we will explore current threats that AI brings with criminal organizations and fraud in the gaming industry. To mitigate these issues, we propose best practices like establishing data governance, investing in continuous learning, maintaining AI transparency, balancing AI with human oversight, and upholding ethical standards. Attendees will leave with a nuanced understanding of AI's dual role as both a defender against and a potential vector for cyber threats, equipped with strategies to optimize AI implementation in cybersecurity without succumbing to common failures.
Aaron Torres
Cisco
The Rewst team looks forward to meeting you at Dinner at CRUSH American Grill! Main POC: Olivia Guidera, olivia.guidera@rewst.io, 610-350-9147
Let’s take a break from the hustle of Right of Boom and enjoy a great night together! 🎉 Join Timus Team and a fantastic group of MSPs for a relaxed and fun dinner at Hakkasan—one of Vegas' top spots! What to expect? Great food 🍽️ Even better company 🥂 Meaningful conversations (and some good laughs!) 😄 We’d love to see you there! Let us know if you can make it. Main POC: David Nankervis Looking forward to catching up! Team Timus
Join us for an unforgettable evening at the Eiffel Tower Restaurant in Paris Las Vegas! A shuttle will be provided for transportation, departing at 7:30 PM. Please meet us at the N-able booth (booth 53) beforehand to coordinate the meeting location for the shuttle. We look forward to sharing great food and even better company with you! Main Point of Contact: Jessica Lawther, (613) 762-7610
Join the Sophos team for dinner on February 20, from 8 PM to 10 PM at Luchini in the MGM Grand. This event is a fantastic opportunity for us to connect, share insights, and enjoy an evening together. We look forward to meeting you and discussing how we collaborate and innovate together. See you there! Main Point of Contact: Taylor McGregor, taylor.mcgregor@sophos.com
Establishing and maintaining Command and Control (C2) is at the core of nearly all successful cyber-attacks. Covert C2 mechanisms are critical for the stealthy operation of threat activity – the longer the dwell time, the likelihood increases that an attacker reaches their overall objective. This workshop delves into the sophisticated techniques used to underpin covert C2, exploring how attackers establish and maintain hidden communication channels within compromised environments. We will examine the techniques used to conceal C2 traffic, including the use of infrastructure, encryption/obfuscation, and the exploitation of legitimate services to blend in with normal network activity. Attendees will gain insights into the latest trends and tactics in covert C2 and learn methods that bypass traditional threat detection solutions.
Stop chasing shadows – actively hunt threats with this interactive EDR workshop. Through hands-on exercises, you'll learn to leverage Endpoint Detection and Response (EDR) tools to identify, investigate, and contain threats in real-time. Attendees will walk away from this workshop with a heightened awareness of the real-life effort that goes into developing threat detection algorithms along with custom alerts for newly-emerging attack vectors. Participants will leave with a practical cyber prevention roadmap document exclusively provided during this workshop which was developed by the BLOKWORX team and honed over time with 25+ years experience.
Cybersecurity is no longer just a technical requirement—it’s a business imperative. For MSPs, effectively selling and positioning cybersecurity solutions to end customers requires more than a product pitch; it demands trust-building, education, and a focus on outcomes. Join Scott Barlow, VP Global MSP at Sophos, and a panel of expert MSPs as they share proven strategies to articulate the value of cybersecurity in a way that resonates with decision-makers. This session will explore how to overcome objections, tailor your approach to different customer personas, and elevate your role as a trusted advisor in an era of escalating cyber threats.
Scott Barlow
Sophos
Rob Glass
RJ Young
Tyler Rasmussen
Executech
Charlie Wiley
Snap Tech IT