Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
On Demand ISSA Web Conferences


The ISSA Web Conferences bring together ISSA members from across the world to share leading industry presentations and answer member’s questions. Each event is designed to address relevant topics for the timely needs of our members. The following web conferences are available for on-demand viewing.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our post event quizzes and online surveys are powered by SurveyGizmo.


ISSA On-Demand Web Conferences


When TLS Reads "Totally Lost Security"

Recorded (2 Hour Event) on Tuesday, November 15, 2016

Click here for more information and to access the recording.


Generously sponsored by


Giving the Internet an Identity



How to Recruit and Retain Cybersecurity Professionals

Recorded (2 Hour Event) on Tuesday, October 25, 2016

Click here for more information and to access the recording.


Security Architecture & Network Situational Awareness

Recorded (2 Hour Event) on Tuesday, September 27, 2016

Click here for more information and to access the recording.


Generously sponsored by


RedSeal. The measure of resilience.



IoT: The Information Ecosystem of the Future--And Its Issues

Recorded (2 Hour Event) on Tuesday, August 23, 2016

Click here for more information and to access the recording.


Generously sponsored by


Giving the Internet an Identity



Hacking the Social Grid: Gullible People at 670 Million Miles per Hour

Recorded (2-hour event): Tuesday, July 26, 2016

Click here for more information and to access the recording.


Legislative Impact: When Privacy Hides the Guilty Party

Recorded (2-hour event): Tuesday, June 28, 2016

Click here for more information and to access the recording.


Breach Report Analysis--SWOT or SWAT?

Recorded (2-hour event): Tuesday, May 24, 2016

Click here for more information and to access the recording.

Generously sponsored by


The Sky Is Falling... CVE-2016-9999(nth)?


Recorded (2-hour event): Tuesday, April 26, 2016

Click here for more information and to access the recording.

 
 

Security Software Supply Chain: Is What You See What You Get?


Recorded (2-hour event):Tuesday, March 22, 2016


Click here for more information and to access the recording.


 

Mobile App Security (Angry Birds Hacked My Phone)

Recorded (2-Hour Event): Tuesday, February 23, 2016

Click here for more information and to access the recording.

 Generously sponsored by:

 

2015 Security Review & Predictions for 2016

Recorded (2-hour event): Tuesday, January 26, 2016

Click here for more information and to access the recording. 


Forensics -- Tracking the Hacker


Recorded (2-hour event): Tuesday, November 17, 2015

Click here for more information and to listen to the recording.


Big Data--Trust and Reputation, Privacy--Cyber Threat Intelligence

Recorded (2-hour event): Tuesday, October 27, 2015

Click here
for more information and to access the recording.

    
Security of IOT-- One and One Makes Zero

Recorded Live (2-hour event): Tuesday, September 22, 2015

Click here for more information and to listen to the recording.

Generously Sponsored By:

CSSLOGO.jpg


 Biometrics & Identity Technology Status Review

Recorded Live (2-hour event): Tuesday, August 25, 2015

Click here for more information and to access the recording.

 

Network Security Testing – Are There Really Different Types of Testing? 

Recorded Live (2-hour event): Tuesday, July 28, 2015

Click here for more information and to access the recording.

Generously Sponsored By:

 

Global Cybersecurity Outlook:
Legislative, Regulatory and Policy Landscapes

Recorded Live (2-hour event): Tuesday, June 23, 2015

Click here for more information and to access the recording.

 

 Breach Report: How Do You Utilize It?

Recorded Live: Tuesday, May 26, 2015

 Click here for more information and to access the recording.

 

 Open Software and Trust--Better Than Free?

Recorded Live: Tuesday, April 28, 2015

 Click here for more information and to access the recording.

Generously Sponsored By:

 

 

 

Continuous Forensic Analytics – Issues and Answers

Recorded Live: April 14, 2015

Click here for more information and to access the recording.

Generously Sponsored by:

 

 

Secure Development Life Cycle for Your Infrastructure

Recorded Live: March 18, 2015

 Click here for more information and access the recording.

Generously supported by:

 

 

What? You didn't know Computers Control you? / ICS and SCADA

Recorded Live: March 2, 2015

 Click here for more information and to access the recording.

Generously supported by:


Interested in supporting the Web Conference program?

Please contact Vendor Relations at ISSA International Headquarters.



Click here for an Attendee Quick Reference Guide to using GoToWebinar.

 


Click here for a list of Sponsored Industry Webinars.

Security Software Supply Chain: Is What You See What You Get?


2-Hour Live Event: Tuesday, March 22, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here to register and for more information.

Security Software Supply Chain: Is What You See What You Get?


2-Hour Live Event: Tuesday, March 22, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here to register and for more information.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/8/2016
December 2016 CISO Mentoring Webinar Series

12/9/2016
Financial SIG Quarterly Webinar

12/10/2016
SecureMiami

12/12/2016
Women in Security SIG Monthly Webinar




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information