Upcoming Web Conferences

Home » ISSA Thought Leadership Series
ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing.
All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications.
Web Conference

Mid-Market Threat Intelligence

May 20 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Empowering the Modern SOC – Force Multiplying Analysts by Orchestrating Threat Intelligence

May 6 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Trends and Statistics for Mobile Phishing in the Enterprise

May 13 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Proofpoint State of the Phish 2020

April 8 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Dissecting Ransomware to Defeat Threat Actors

March 11 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Combating Business Email Compromise & Email Account Compromise

February 19 @ 1:00 pm - 2:00 pm EST (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

The Asset Management Resurgence

January 22 @ 1:00 pm - 2:00 pm EST (US)

Details will be posted when they are available.

Learn More

Proudly Sponsored By

Web Conference

Building a People-Centric Cybersecurity Strategy for Healthcare

December 4, 2019 @ 1:00 pm - 2:00 pm EST (US)

More than 99% of all targeted cyber attacks rely on users to activate them. Nowadays, threat actors are not going after an organization’s technology and infrastructure. They are going after your most valuable assets – your people and your data.

Learn More

Proudly Sponsored By

The Persistent Pernicious Myths and Hidden Truths of Cybersecurity

November 6, 2019 @ 1:00 pm - 2:00 pm EST (US)

IT implementors are made less successful due to ‘Technical Debt’. Cybersecurity suffers from ‘Myth Debt’, where the same untrue tropes are repeated and hold us back. It takes experience to recognize these myths, but worse still is they can mask the valuable truths that lie within the myth.

Learn More

Proudly Sponsored By

Web Conference

Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications

October 16, 2019 @ 1:00 pm - 2:00 pm EDT (US)

Automated bot attacks are becoming increasingly sophisticated as they learn to avoid detection and stay unidentified longer. Tune in for the live webinar on October 16 at 1:00 PM EST as Liel Strauch, a Lead Researcher at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX, highlight the top five ways to identify automated bot attacks to your website.

Learn More

Proudly Sponsored By

Web Conference

Identities are the new Security Perimeter in a Zero Trust World

September 18, 2019 @ 1:00 pm - 2:00 pm EDT (US)

In a recent Thales survey, two-thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack.

Learn More

Proudly Sponsored By

Web Conference

The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

November 7, 2018 @ 11:00 am - 12:00 pm EST (US)

Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don’t even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.

Learn More

Proudly Sponsored By

Web Conference

Micro-Segmentation 101

November 14, 2018 @ 11:00 am - 12:00 pm EST (US)

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

Learn More

Proudly Sponsored By

Web Conference

2018 User Risk Report

December 12, 2018 @ 11:00 am - 12:00 pm EST (US)

We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

Learn More

Proudly Sponsored By

Web Conference

Paving the Way to a Passwordless Future

August 21, 2019 @ 1:00 pm - 2:00 pm EDT (US)

It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

Learn More

Proudly Sponsored By

Scroll to Top