Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
2015 ISSA International Conference Resources

Presentations and recordings from the 2015 ISSA International Conference in Chicago

Click here to read the conference Live Blog

October 12, 2015

Opening Keynote Address: Vinton G. Cerf: We are Losing This Battle
Vice President and Chief Internet Evangelist, Google
10/12/2015, 9:00 am - 10:00 am, Room Salon 3

Embracing and Securing the Internet of Things (IoT)
10/12/2015, 10:00 am - 10:45 am, Room Salon 3
Track: Infrastructure
Demetrios Lazarikos: Chief Information Security Officer, vArmour

The Value Proposition for Federated Digital Identity Services
10/12/2015, 10:00 am - 10:45 am, Room Kane/McHenry
Track: Mobile Security
Stu Vaeth: Senior Vice President, Business Development, SecureKey

SELinux Integrity Instrumentation (SII)
10/12/2015, 10:00 am - 10:45 am, Room Lincolnshire 1&2
Track: Infrastructure
Mike Libassi: Doctorate Student and Adjunct Professor and Sr. Performance Engineer, Colorado Technical University

Pathways to Empowered Security Leadership
10/12/2015, 10:00 am - 10:45 am, Room Northwestern/Ohio State
Track: Business Skills for the Information Security Professional
Moderator: Marci McCarthy: President & CEO, T.E.N.
Panelists:
Todd Fitzgerald: Global Director Information Security, Grant Thornton International, Ltd
Larry Lidz: CISO, CNA Insurance
Jeff Reich: CSO, Barricade
Richard Rushing: CISO, Motorola

Silver Bullet for Identifying Hacking and Information Theft in ERP Systems (Audio file)
10/12/2015, 10:00 am - 10:45 am, Room Purdue/Wisconsin
Track: Business Skills for the Information Security Professional
Moshe Panzer: CEO, Xpandion

Malvertising, Drive-by Downloads, and Web Exploits: Stop Them All with Browser Isolation
10/12/2015, 10:00 am - 10:45 am, Room Michigan/Michigan State
Track: Infrastructure
Ben Strother: Director of Business Development, Spikes Security

Harnessing Innovation to Address Emerging Security Challenges
10/12/2015, 10:00 am - 10:45 am, Room Indiana/Iowa
Track: Incident Response
Moderator: Dr. Michael C. Redmond, PhD
Panelists:
Gautam Aggarwal: Chief Marketing Officer, Bay Dynamics
Sean Blenkhorn: Senior Director of Solutions Engineering, eSentire, Inc.
Jack Daniel: Strategist, Tenable Network Security, Inc.
Kevin Sapp: Vice President, Strategy, Pulse Secure

Information Security Needs a Reboot
10/12/2015, 11:00 am - 11:45 am, Room Salon 3
Track: Business Skills for the Information Security Professional
Arlan McMillan: CISO – IT Security, Risk, and Compliance, United Airlines

Engineering Lessons Applied to Cloud Security
10/12/2015, 11:00 am - 11:45 am, Room Ohare
Vern Williams: Dell SecureWorks University

Cisco Annual Security Report
10/12/2015, 11:00 am - 11:45 am, Room Kane/McHenry
Track: Mobile Security
James Natoli: Systems Engineering Manager, Cisco Systems Inc.

Understanding & Defending Against Data Breaches, as part of a Custom Software Development Process
Audio File

10/12/2015, 11:00 am - 11:45 am, Room Indiana/Iowa
Track: Application Security
Frank S. Rietta, MSIS: Senior Developer, Rietta Inc.

Mainframe Security: A Practical Overview
10/12/2015, 11:00 am - 11:45 am, Room Lincolnshire 1&2
Track: Infrastructure
Joe Sturonas: Chief Technology Officer, PKWARE, Inc.

Patient Portal Security: Ensuring Security & Enhancing Patient Privacy
10/12/2015, 11:00 am - 11:45 am, Room Northwestern/Ohio State
Track: Laws and Regulations
George Bailey: Senior Security Advisor, Purdue Healthcare Advisors

Making the Business Case for Information Security (Audio File)
10/12/2015, 11:00 am - 11:45 am, Room Purdue/Wisconsin
Track: Business Skills for the Information Security Professional
William Perry: Chief Information Security Officer, California State University Office of the Chancellor

The Fight Against Phishing: Defining Metrics That Matter
10/12/2015, 11:00 am - 11:45 am, Room Michigan/Michigan State
Track: Securing the End Users
Mark Chapman: President and CEO, Phishline

CISO Panel Luncheon
10/12/2015, 12:00 pm – 1:30 pm, Salon 3
Moderator: Tim Stanley: Risk Management Consultant, Cummins Inc.
Panelists:
Mary Ann Davidson: Chief Security Officer, Oracle Corporation
Joe Filer: Vice President, Chief Information Security Officer, Harland Clarke Holdings Corp.
Tim Rains: Chief Security Advisor, Microsoft Worldwide Cybersecurity Business Unit.
Dane Sandersen: Global Security Director, Trek Bicycle Corporation
Tim Virtue: Chief Information Security Officer, Texas.gov

ISSA Women in Security SIG Presentation: TAP Into Your Potential
10/12/2015, 1:45 pm – 2:30 pm, Room O’Hare
Track: Business Skills for the Information Security Professional
Jyothi Charyulu: Senior Principal Application Architect, SABRE INC

It's Not a Cyberwar, It's a Lifestyle
10/12/2015, 1:45 pm - 2:30 pm, Room Salon 3
Track: Infrastructure
Jeff Reich: Chief Security Officer, Barricade

Preparing for the Big One
10/12/2015, 1:45 pm - 2:30 pm, Room Lincolnshire 1&2
Track: Incident Response
David Phillips: Managing Director, Cybersecurity Consulting, Berkeley Research Group

Cybersecurity Due Dilligence of a Vendor: Legal Requirements and Beyond
10/12/2015, 1:45 pm - 2:30 pm, Room Northwestern/Ohio State
Track: Laws and Regulations
Marilyn Hanzal: Associate General Counsel, University of Chicago Medical Center
Rich Skinner: Executive Advisor, S3 Venture Group

Why Traditional Perimeter Security Approaches Leave your APIs Exposed to Threats ​(Audio File)
10/12/2015, 1:45 pm – 2:30 pm, Room Indiana/Iowa
Track: Application Security
Sachin Agarwal: Vice President, Product Marketing and Strategy, Akana

Striking the Right Balance Between Security and User Enablement in Cloud Platforms
10/12/2015, 1:45 pm – 2:30 pm, Room Purdue/Wisconsin
Track: Securing the End Users
Ron Zalkind: CTO and Co Founder, CloudLock

“Architecting” Your InfoSecurity/Cybersecurity Organization, Teams, and Careers
10/12/2015, 1:45 pm – 2:30 pm, Room Kane/McHenry
Track: Business Skills for the Information Security Professional
David Foote: Co-Founder, Chief Analyst and Chief Research Officer, Foote Partners LLC

The New Security Stack – 2015–2020
10/12/2015, 1:45 pm – 2:30 pm, Room Michigan/Michigan State
Track: Incident Response
James Brown: Product Manager, OpenDNS

The Permissions Gap (Audio File)
10/12/2015, 3:00 pm - 3:45 pm, Room Indiana/Iowa
Track: Infrastructure
Lee V. Mangold: Managing Security Engineer, GuidePoint Security

InfoSec in the Hot Seat: How to Accomplish Breach Response Readiness
10/12/2015, 3:00 pm - 3:45 pm, Room Lincolnshire 1&2
Track: Incident Response
Peter Sloan: Partner, Husch Blackwell LLP
Rob Rudloff: Partner, RubinBrown LLP

Preventing, Insuring and Surviving Fund Transfer Fraud
10/12/2015, 3:00 pm - 3:45 pm, Room Northwestern/Ohio State
Track: Laws and Regulations
Nick Merker, CISSP, CIPT: Attorney, Ice Miller LLP
Nick Reuhs: Attorney, Ice Miller LLP
Stephen Reynolds, CIPP/US: Partner, Ice Miller LLP

Diversified IT: Why the Security Workforce Needs Qualified Women...and Men
Audio File

10/12/2015, 3:00 pm - 3:45 pm, Room Kane/McHenry
Track: Business Skills for the Information Security Professional
Tammy Moskites: CIO and CISO, Venafi

Security & the Internet of Things
Audio File

10/12/2015, 3:00 pm - 3:45 pm, Room Purdue/Wisconsin
Track: Securing the End Users
Nich Percoco: Vice President, Strategic Services, Rapid7

House of Lies
10/12/2015, 3:00 pm - 3:45 pm, Room Michigan/Michigan State
Track: Incident Response
Aamir Lakhani: Senior Security Strategist, Fortinet

October 13, 2015

Keynote Address: Dan Geer
CISO, In-Q-Tel
10/13/2015, 9:00 am – 10:00 am, Salon 3

The Cyber Threatscape & the Need for Public/Private Partnership
10/13/2015, 10:15 am – 11:00 am, Room Salon 3
Arlette Hart: CISO, FBI

ISSA Women in Security SIG Presentation: Looking to 2020 -- Are we too late?
10/13/2015, 10:15 am – 11:00 am, Room O’Hare
Track: Incident Response
Jill Rhodes: Vice President and Chief Information Security Officer, Trustmark Companies

The Future of Mobile App Security
10/13/2015, 10:15 am – 11:00 am, Room Kane/McHenry
Track: Mobile Security
Vincent Sritapan: Program Manager for Mobile Security R&D, Department of Homeland Security, S&T – Cyber
Security Division

Practical Application Security for the Real World
10/13/2015, 10:15 am – 11:00 am, Room Indiana/Iowa
Track: Application Security
Andrew Leeth: Product Security Engineer, Salesforce

N-Gram Analysis in Suspect Author Identification of Anonymous Email
Audio File

10/13/2015, 10:15 am – 11:00 am, Room Lincolnshire 1&2
Track: Incident Response
Paul Herrmann, CISSP, EnCE, CISA, CPP: President, eVestigations Inc.

Embedded Like a Tick - Cyber Intelligence
10/13/2015, 10:15 am – 11:00 am, Room Northwestern/Ohio State
Track: Laws and Regulations
Jeff Bardin: Chief Intel Officer, Treadstone 71

Data Classification – Discovery and Response Prioritization
10/13/2015, 10:15 am – 11:00 am, Room Purdue/Wisconsin
Track: Securing the End Users
Tim Plona: Business Solution Architect, Freeport-McMoRan
Decision Tree


Build an Adaptive Awareness Program Based on NIST's Cybersecurity Framework
10/13/2015, 11:15 am – 12:00 pm, Room Michican/Michigan State
Track: Securing the End Users
Tom Pendergast: Director of Awareness Solutions, Instructional Design Manager, MediaPro
Steven Conrad: Managing Director, MediaPro

Applied Privacy Engineering: User-Controlled, User-Monetized Mobile Advertising
10/13/2015, 11:15 am – 12:00 pm, Room Kane/McHenry
Track: Mobile Security
Kevin O'Neil: CISSP, CYVA Research Corporation

Medical Device Safety and Security (MeDSS): Assessing and Managing Product Security Risk
10/13/2015, 11:15 am – 12:00 pm, Room Indiana/Iowa
Track: Application Security
John Lu: Principal, Cyber Risk Services, Life Sciences and Healthcare industry, Deloitte & Touche LLP
Muhammad Kashif: Manager, Cyber Risk Services, Life Sciences and Healthcare industry, Deloitte & Touche LLP

Taking Control of ‘Control’: Addressing Cybersecurity in Industrial Control Systems
Audio File

10/13/2015, 11:15 am – 12:00 pm, Room Lincolnshire 1&2
Track: Infrastructure
Daniel Ziesmer: ISSO, Bechtel Corporation

Stake Your Reputation on your Cyber Security Incident Response Program CSIRT
10/13/2015, 11:15 am – 12:00 pm, Room Northwestern/Ohio State
Track: Incident Response
Dr. Michael C. Redmond: CEO and Lead Consultant, Redmond Worldwide

How to be a highly effective CISO - Top 10 Performance Success Factors!
10/13/2015, 11:15 am – 12:00 pm, Room Purdue/Wisconsin
Track: Business Skills for the Information Security Professional
Brian Schultz, CISSP, ISSMP, ISSAP, CISM, CISA: Technical Director, Cyber Architecture and Advisory Services,
Battelle
Bob Bigman: President, 2BSecure

Cyber Security Liability Insurance: Need It or Leave It
10/13/2015, 11:15 am – 12:00 pm, Room O’Hare
Track: Laws and Regulations
Moderator: Andrea Hoy: President, ISSA
Panelists:
Ronald Raether: Partner, Troutman Sanders
Brian Thornton: President, ProWriters

Intelligent Risk in a House Without Walls
10/13/2015, 11:15 am – 12:00 pm, Room Michigan/Michigan State
Track: Threats & Responses
Ryan DuPre: Symantec

2015 Verizon Data Breach Investigation Report
10/13/2015, 1:45 pm - 2:30 pm, Room Salon 3
Track: Incident Response
Dave Ostertag: Global Investigations Manager, Risk Team, Verizon

Security or Convenience? Enabling a Collaborative Work Environment
10/13/2015, 1:45 pm - 2:30 pm, Room Kane/McHenry
Track: Application Security
Guy Bunker: Senior Vice President of Products, Clearswift

Let's Hack a House (Audio File)
10/13/2015, 1:45 pm - 2:30 pm, Room Lincolnshire 1&2
Track: Infrastructure
Tony Gambacorta: Vice President, Operations, Synack

Current Trends and Our Methods for Defense
10/13/2015, 1:45 pm - 2:30 pm, Room Northwestern/Ohio State
Track: Laws and Regulations
Adam Keown: Security Consultant / Solutions Architect, TEKsytems

Computer Security for SMB/Gov’t
10/13/2015, 1:45 pm - 2:30 pm, Room Purdue/Wisconsin
Track: Securing the End Users
Marv Stein: Sr. Security Consultant, TDAmeritrade

Preventing the Inevitable - Safeguarding Critical Assets in the Age of the Mega-Breach
10/13/2015, 1:45 pm - 2:30 pm, Room Michigan/Michigan State
Track: Business Skills for the Information Security Professional
Robert Eggebrecht: Co-Founder, President, and Chief Executive Officer, InteliSecure

Information Security Beyond Tools and Toys: How Do We Advance the Culture Side of It?
10/13/2015, 1:45 pm - 2:30 pm, Room Indiana/Iowa
Track: Securing the End Users
Moderator: Sali Osman: Chairperson, Mentor-Protégé Committee, International Consortium of Minority Cybersecurity Professionals
Panelists:
Stephen Cobb: Sr. Security Researcher: ESET North America
Tyler Cohen Wood: Cyber Security Advisor, Inspired eLearning
Jamison Utter: Senior Consulting Engineer, Security, Infoblox

Securing our Future: Lessons From the Human Immune System
10/13/2015, 3:00 pm – 3:45 pm, Room Michigan/Michigan State
Track: Incident Response
Jeff Hudson: CEO, Venafi

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/10/2016
SecureMiami

12/12/2016
Women in Security SIG Monthly Webinar

12/13/2016
SANS/ISSA Women's CONNECT Event

12/15/2016
Healthcare SIG Webinar: Auditing and Access to Electronic Health Records




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information