Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA International Web Conferences


ISSA International Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of ISSA members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA International Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here if you are interested in sponsoring an ISSA International Web Conference

Click here for On-Demand ISSA Web Conferences 

2016 Web Conference Schedule*

How To Recruit and Retain Cybersecurity Professionals

2-Hour Live Event: Tuesday, October 25, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here for more information and to register.


We have all heard the term "Cybersecurity talent shortage." With information security rising as one of the quickest growing industries, there are more jobs than there are qualified candidates. This creates a difficult HR environment and tends to lead to a high level of turnover. How can businesses recruit, but just as importantly, retain, key cybersecurity personnel?

When TLS Reads: Totally Lost Security. SHA zam!

2-Hour Live Event: Tuesday, November 15, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here for more information and to register.


Why isn't patching and updating successful in making us safe, even from known vulnerabilities in products for which fixes are available?
We've seen Java vulnerabilities fixed and available on our smart phones, only to be told that our organization cannot support the fix without breaking a critical tool we depend on. We know that improved versions of SSL and TLS were available for many years before they become widely adopted by browser developers and web site administrators. Rather than risk disrupting millions of users, fears of backward compatibility issues drive them to continue to offer vulnerable versions of these protocols and to ignore the dangers of relying on encryption and hash algorithms with known flaws.
A recent survey indicates that nearly 98% of websites supporting SSL were still using phishing friendly, weak X.509 digital certificates based on SHA-1. So, how does this bode for the Internet of Things? Will we see millions and millions of more vulnerable devices surround us that cannot be easily patched and managed securely?
Community Search
Sign In

Forgot your password?

Haven't registered yet?



ISSA International Conference Preview: Computer Science Curricula’s Failure

ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information