Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA International Web Conferences


 

ISSA International Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of ISSA members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA International Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here if you are interested in sponsoring an ISSA International Web Conference

Click here for On-Demand ISSA Web Conferences 
2017 Webinar Schedule

January - 2016 Security Review and Predictions for 2017


2-Hour Live Event: Tuesday, January 24th, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here for more information and to register.


Generously sponsored by



HP: Reinvent Security


Overview:

Once again we bring on a panel of experts to provide insight and make predictions for the 2017 InfoSec challenges. 2016 was a monumental year in cyber security, with major news stories surfacing nearly every month. From email hacking impacting the United States political world to the October DNS attacks and the ongoing rise of Ransomware and IoT concerns, “Cyber” is huge right now. How will this growing spotlight on security translate in terms of media and regulatory attention? And what kinds of threats will dominate the 2017 landscape? Join us, make notes, and then check back in a year to see how we did!
  

February - Cyber Residual Risk


2-Hour Live Event: Tuesday, February 28, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

How do you analyze your environment and calculate Cyber Residual Risk. Once you are done, you of course want to close up that last bit of exposure with Cyber Insurance. Yet when you get the bill and it doesn’t seem to make sense. The cost almost outweighs the projected risk. Then the worst happens and you need to file a claim, and … it is denied. First, how do you calculate your residual cyber risk, and once you do, how does an organization get proper cyber insurance.
  

March - Internet of Things


2-Hour Live Event: Tuesday, March 28, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

IoT – Is a radical game changer. As more devices get defined, deployed, and hacked we are only just beginning the conversations around privacy and security. Of course with these conversations come regulations and legislation, but the real question is what's in store and how will it be implemented. Who is responsible when your fridge orders 200 pizzas or gets turned off in defrost mode while you are away? Was the October 2016 DDoS attack that primarily used IoT devices as intrusion vectors a glimpse of things to come or a wakeup call that will be heeded? Projecting into the future, how will things look in the regulatory world given the new reality of a massive Internet of Things landscape?
  
Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

1/19/2017
ISSA Pre-Professional Virtual Meet-Up: Future Challenges: Are You Ready?

1/24/2017
International Web Conference - 2016 Review and 2017 Predictions

2/9/2017
CISO Mentoring Webinar Series: What It Takes to be a CISO in 2017

2/11/2017 » 2/12/2017
ISSA CISO Executive Forum - Feb. 2017, San Francisco, CA

2/13/2017 » 2/17/2017
RSA® Conference 2017




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information