Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Web Conferences


ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here for On-Demand ISSA Web Conferences

2015 Web Conference Schedule*


Open Software and Trust--Better Than Free?

2-Hour Live Event: Tuesday, February 24, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information.


Cybersecurity -- New Frontier

2-Hour Live Event: Tuesday, March 24, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.


Overview:
What is Cyber Security?  Is Cyber Security like good food?  That is we all know what it is, but only a few people will have similar definitions?  This webinar will look at the changing face of Cyber Security.  This webinar could be broken down into the past, present, and potential future.

Moderator: Matt Mosley

 

Sponsored by


SDLC -- Secure Development Life Cycle

2-Hour Live Event: Tuesday, April 28, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.


Overview:
We have heard a lot about the Security Development LifeCycle, but what is it?  After almost 15 years we are still struggling with agreement on the implementation.  This having been said, wow should products be developed, created, deployed, and maintained?  Has it evolved and if so what are the changes that we need to consider?

 
Breach Report: How Do You Utilize It?

2-Hour Live Event: Tuesday, May 26, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.


Overview:
Once again, the new data breach reports are being published. The question is, will it be another round of "the sky is falling and the world is ending," or are we, as security professionals, finally succeeding in protecting our assets? 

This year we would like to look at best practices concerning the content of these reports. How do we make the best use of the information that is released?  Join our industry experts as they discuss the latest breach reports and provide insight into current trends and even potential solutions.

Moderator: Matt Mosley

  
Global Cybersecurity Outlook: Legislative, Regulatory and Policy Landscapes

2-Hour Live Event: Tuesday, June 23, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.


Overview:
Legislation and regulation continue to be extremely important drivers for information security professionals. Given the ever-increasing requirements for security, we're charged with understanding how current, pending, and possible future pronouncements will affect our approaches to information security, both nationally and internationally. 

Last year's legislative and regulatory issues have again put us in a position where we must try to address these question:
 
• How do we prioritize what is most important? 
• What can we do to make compliance easier? 
• How do we get our policies aligned with the differing regulatory environments across different jurisdictions? 
• How do we deal with export controls (software and information)?
• And in some cases, how do we avoid fines and simply stay out of jail? 

Hear the views on this topic and the questions around it from industry experts.

   
Biometrics & Identity Technology Status Review

2-Hour Live Event: Tuesday, July 21, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.

   
PEN Testing

2-Hour Live Event: Tuesday, August 25, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.

   
Legislation -- What's New & Year In Review

2-Hour Live Event: Tuesday, September 29, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.

   
Big Data -- Turst and Reputation, Privacy -- Cyber Threat Intelligence

2-Hour Live Event: Tuesday, October 27, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.

   
Forensic -- Tracking the Hacker

2-Hour Live Event: Tuesday, November 17, 2015
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London
Registration information to be announced.

What? You didn't know computers control you? 
Industrial Control Systems (ICS) and SCADA

2-Hour Live Event: Date To Be Announced
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information.



Interested in supporting the Web Conference program?

Please contact Vendor Relations at ISSA International Headquarters.

Don't forget to check back periodically for updates to our 2014 Web Conference program.

*All times and topics are subject to change.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

1/29/2015 » 1/30/2015
ISSA CISO Executive Forum - January 2015

2/9/2015
ISSA WIS SIG Webinar: The Art of the Ask: How to Ask for – and Get – What You Want in Your Career

3/18/2015
ISSA SEA SIG Webinar

 

 


Twitter



Copyright © 2012, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information