Upcoming Web Conferences

Home » Events » ISSA Thought Leadership Series
ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing.
All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications.
Web Conference

The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

November 7, 2018 @ 11:00 am - 12:00 pm EST (US)

Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don’t even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.

Learn More

Web Conference

Micro-Segmentation 101

November 14, 2018 @ 11:00 am - 12:00 pm EST (US)

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

Learn More

Web Conference

2018 User Risk Report

December 12, 2018 @ 11:00 am - 12:00 pm EST (US)

We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

Learn More

Web Conference

Paving the Way to a Passwordless Future

August 21 @ 1:00 pm - 2:00 pm EDT (US)

It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

Learn More

Web Conference

TBD

December 11 @ 1:00 pm - 2:00 pm EST (US)

Details will be posted when they are available.

Web Conference

TBD

November 13 @ 1:00 pm - 2:00 pm EST (US)

Details will be posted when they are available.

Web Conference

TBD

October 16 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Web Conference

TBD

October 9 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Web Conference

TBD

September 18 @ 1:00 pm - 2:00 pm EDT (US)

Details will be posted when they are available.

Web Conference

Update on the Latest Cyber Threats and Trends

September 11 @ 1:00 pm - 2:00 pm EDT (US)

How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.

Learn More

Web Conference

Beyond the Phish – Snapshot of End User Behavior

August 14 @ 1:00 pm - 2:00 pm EDT (US)

Phishing is one of InfoSec’s longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?

Learn More

Web Conference

Passwordless Authentication

June 12 @ 1:00 pm - 2:00 pm EDT (US)

Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

Learn More

Web Conference

What is a CASB and Why Do You Need it?

May 22 @ 1:00 pm - 2:00 pm EDT (US)

CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud security failures will be the customer’s fault through 2023. So, how do you ensure that you have the right tools in place as your organization adopts more and more cloud applications?

Learn More

Web Conference

Security-as-a-Service for Small and Medium Sized Businesses

June 5 @ 1:00 pm - 2:00 pm EDT (US)

How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs? While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time-consuming. In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options

Learn More

Web Conference

Zero Trust: The Evolution of Perimeter Security

May 15 @ 1:00 pm - 2:00 pm EDT (US)

One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability. Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

Learn More

Scroll to Top