Print Page   |   Contact Us   |   Sign In   |   Register
ISSA International Web Conferences


 

ISSA International Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of ISSA members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA International Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here if you are interested in sponsoring an ISSA International Web Conference

Click here for On-Demand ISSA Web Conferences 
2017 Webinar Schedule

February - Cyber Residual Risk


2-Hour Live Event: Tuesday, February 28, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here for more information and to register.

Generously Sponsored By:


Overview:

How do you analyze your environment and calculate Cyber Residual Risk. Once you are done, you of course want to close up that last bit of exposure with Cyber Insurance. Yet then you get the bill and it doesn’t seem to make sense. The cost almost outweighs the projected risk. Then the worst happens and you need to file a claim, and … it is denied. First, how do you calculate your residual cyber risk, and once you do, how does an organization get proper cyber insurance.
  

March - Internet of Things


2-Hour Live Event: Tuesday, March 28, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

IoT – Is a radical game changer. As more devices get defined, deployed, and hacked we are only just beginning the conversations around privacy and security. Of course with these conversations come regulations and legislation, but the real question is what's in store and how will it be implemented. Who is responsible when your fridge orders 200 pizzas or gets turned off in defrost mode while you are away? Was the October 2016 DDoS attack that primarily used IoT devices as intrusion vectors a glimpse of things to come or a wakeup call that will be heeded? Projecting into the future, how will things look in the regulatory world given the new reality of a massive Internet of Things landscape?
  

April - Evolution of Cryptography


2-Hour Live Event: Tuesday, April 25th, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

Encryption, the ultimate protection for individuals, or a weapon of mass destruction for terrorists. This debate has been going on since the early 90s and has anything really changed. This webinar will frame the debate and provide the background for the next round of these discussions. As the password dies and the Internet of Things rises, cryptography is destined to become the backbone of data protection and access control. And yet cryptography remains a niche in most organizations and many harbor concerns over 'back doors', quantum threats, relying on out of date standards (FIPS), poor key management, lack of security training, and limited innovation. So, can cryptography take the heat? Is cryptography ready for prime time?
  
Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

2/19/2017
HIMSS17 Cybersecurity Forum

2/20/2017 » 2/24/2017
CCISO Training, Austin, TX

2/27/2017
ISSA Pre-Professional Virtual Meet-Up: Security Across Different Verticals

2/28/2017
International Web Conference - Cyber Residual Risk

3/9/2017
CISO Mentoring Webinar Series




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information