Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
August CISO Forum Las Vegas 2014

Theme: Application Security - Threats, Challenges and Approaches
Date: August 4, 2014
Location: Las Vegas, NV

Applications provide the window to your organization’s most important asset: information. Recent reports suggest application security is one of the most common root causes of information security breaches. Are you aware of the most serious threats? Does your team have the tools and training to include appropriate security measures? In this forum, industry experts will help you reduce application risk by understanding not only the current threats and vulnerabilities landscape, but also risks associated with emerging technologies like embedded apps. In addition, you’ll have the chance to contribute your own expertise and learn from your colleagues through active roundtable discussions. Finally, you’ll gain insight into what business executives expect from security leaders in the current business environment. Don’t miss this opportunity to exchange expertise and network with your peers at this upcoming CISO Forum.

Register today to join us for this peer-only event. Click here for guest registration and criteriaFirst time qualified guests may attend at no charge.

Thank you to our August 2014 Sponsors!



Event Registration

CISO Executive Members 
click here to register to attend this ISSA CISO Executive Forum. Rooming reservations can be made at the host hotel, as described below.

CISO Guests click here for Membership Criteria and Guest Registration Details.


8:00 a.m. - 9:00 a.m.

Registration and Breakfast

9:00 a.m. - 9:15 a.m.

Opening Comments and Welcome Address
Kevin Rigney and Marnie Wilking, Las Vegas 2014 CISO Forum Co-chairs

9:15 a.m. - 10:15a.m.

Jim Manico Secure Coding Instructor and Author at Manicode Security

Top 10 Web Defenses
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective as attacks on prominent, well-protected websites occur daily. Most organizations world-wide have something in common: they have had websites compromised in some way. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques needed for low-risk, high-security web applications.
Presentation slides

10:15 a.m. - 10:45 a.m.

Networking Break-Sponsor Pavilion

10:45 a.m. - 12:00 p.m."Application Security" -  Executive Roundtables - Discussion
Break into groups of your peers for brainstorming sessions. Highlights from each table will be openly discussed with the full group at the end of the roundtables.
12:00 p.m. - 1:15 p.m.

Networking Lunch

1:15 p.m. - 2:15 p.m."Application Security" -  Executive Roundtables - Presentations
Break into groups of your peers for brainstorming sessions. Highlights from each table will be openly discussed with the full group at the end of the roundtables.
2:15 p.m. - 2:45 p.m.

Networking Break-Sponsor Pavilion

2:45 p.m. - 3:45 p.m.

Araceli GomesSecurity Advisor, Verizon

Verizon Data Breach Investigation Report
Presentation slides

3:45 p.m. - 4:15 p.m.

Networking Break-Sponsor Pavilion

4:15 p.m. - 4:30 p.m.

Sponsor Prize Drawing
4:30 p.m. - 5:30 p.m.

Jeff Snyder - President,

A 360 Degree View of Security Leadership
The CISO role has evolved from simply being the smartest person in the room to becoming a full-fledged member of the executive team, and the expectations for the role have evolved, as well. Jeff has talked with and listened to business leaders and industry experts, and knows what the business expects from a security leader and what the security leader’s peers and subordinates have suggested they expect in a leader they’re willing to follow. Based on significant research, Jeff will share what makes a well-rounded leader desirable to follow, to collaborate with and to take seriously at the “C” suite level.

5:30 p.m. - 8:30 p.m.

Stuart McClure - CEO/President, Founder at Cylance, Inc.
Closing Reception

Application security in the very cyber fabric
Embedded systems surround us invisibly every day. From traffic lights and Bluetooth headsets, to substation relays and nuclear power plants, the world of embedded applications is immense (many estimate well over 1 billion devices online today). So what happens when applications are built on these devices insecurely? Fun for the hacker. Pain for you and I.

*Please note: all times and speakers are subject to change.


Paris Las Vegas Hotel and Casino, Versailles Ballroom
3655 S Las Vegas Blvd.
Las Vegas, NV 89109

Transportation Options

Click here to access a list of shuttles to and from the McCarran International Airport
Click here for driving directions to the Paris Las Vegas Hotel and Casino

Questions? Please contact Leah Retting at ISSA International Headquarters: 1 866 349 5818 extension 4082.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

11/3/2016 » 11/4/2016
ISSA CISO Executive Forum - November 2016

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information