Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA International Web Conferences


 

ISSA International Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of ISSA members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA International Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here if you are interested in sponsoring an ISSA International Web Conference

Click here for On-Demand ISSA Web Conferences 

2016 Web Conference Schedule*


Legislative Impact: When Privacy Hides the Guilty Party

2-Hour Live Event: Tuesday, June 28, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.

Overview:
Increasingly legislation and regulation are becoming extremely important drivers for what information security professionals have to do, and the pace of delivery seems to be increasing wherever you work in the world today. 

What are organisations and individuals approaches to what and how they do information security? How do we prioritize what is most important? What can we do to make compliance easier? How do we get our policies aligned with the differing regulatory environments across different jurisdictions? How do we deal with export controls (software and information)? In some cases the question might be – How do we stay out of jail? Join our industry experts to get their views and this topic and the questions around it.


Hacking Social Grid / Gullible People at 670 Million Miles Per Hour

2-Hour Live Event: Tuesday, July 26, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.

Overview:
Over the past year we have seen numerous attacks against our computer infrastructures. While we think they are all geared against technology they are not. In just the last year we have seen improved phishing attacks using Facebook, LinkedIn and other social media. In addition, we have seen fake public announcements for companies -- like the hostile takeover of  Avon -- via a company that didn't exist.  Which raises the question... has it become too easy to attack a company using social media? 


IoT: The Information Ecosystem of the Future--And Its Issues

2-Hour Live Event: Tuesday, August 23, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.


Security Architecture & Failure Mode Threat


2-Hour Live Event: Tuesday, September 27, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.

Overview:
IoT, BYOD, Clouds, IAS, SAaS, and a host of other things – these are all symptoms of our real security problem. Every day we add to our corporate architecture and we don’t think about the security of it or how these elements will impact it. This session will cover strategies for defining these architectures and how to remodel your security architecture for 2017.

  • Do you often wonder what kind of security architecture you have?  Feel like you have a straw, wooden or brick security structure?
  • While we have repeatedly talked about point vulnerabilities, we have missed the fact that it is about the architecture that is being attacked. Yet we tend to ignore the Threat modeling / Security Architecture of how to do it.
  • What is going on when the security architecture fails?

How To Recruit and Retain Cybersecurity Professionals


2-Hour Live Event: Tuesday, October 25, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.


When TLS Reads: Totally Lost Security. SHA zam!


2-Hour Live Event: Tuesday, November 15, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here for more information and to register.

Overview:

Why isn't patching and updating successful in making us safe, even from known vulnerabilities in products for which fixes are available?
 
We've seen Java vulnerabilities fixed and available on our smart phones, only to be told that our organization cannot support the fix without breaking a critical tool we depend on. We know that improved versions of SSL and TLS were available for many years before they become widely adopted by browser developers and web site administrators. Rather than risk disrupting millions of users, fears of backward compatibility issues drive them to continue to offer vulnerable versions of these protocols and to ignore the dangers of relying on encryption and hash algorithms with known flaws.
 
A recent survey indicates that nearly 98% of websites supporting SSL were still using phishing friendly, weak X.509 digital certificates based on SHA-1. So, how does this bode for the Internet of Things? Will we see millions and millions of more vulnerable devices surround us that cannot be easily patched and managed securely? 
Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

6/28/2016
ISSA Web Conference: Legislative Impact: When Privacy Hides the Guilty Party

6/28/2016
Cyber Kill Chain: Como defenderse ante un ataque

6/30/2016
ISSA Pre-Professional Virtual Meet-Up: Cross Career Challenges: How to Move Into Security from Anoth

7/14/2016
July 2016 CISO Mentoring Webinar Series




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information