Loading Events
Chapter Event

North Texas ISSA Cyber Security Conference

Home » Events » North Texas ISSA Cyber Security Conference

  • This event has passed so registration is closed.

Details

Date and Time

November 6, 2020 @ 8:00 am - 5:00 pm CST

Event Category

Chapter Event

Registration Link

Register for This Event »

Organizer

North Texas ISSA

Contact

Lisa O'Connell

Venue

Virtual

The North Texas Chapter of ISSA and the Collin College Student Chapter of North Texas ISSA are pleased to present our eight Cyber Security Conference on November 6, 2020 virtually in an online format this year. This annual, all-day event is full of great content presented by information security professionals and includes a host of panels and hands-on training opportunities. Attendees who take part in all conference activities can earn CPE credits. Last year over 650 attendees from the Dallas/Fort-Worth area and beyond came together to learn, share knowledge, and support a great cause. All proceeds for the NTXISSA CSC8 benefit the Collin College CyberSecurity Scholarship Fund to encourage and support the next generation of security professionals.

Track One – Cloud, Application, and IoT Security

Increasingly, our data is moving into systems we cannot directly control. It flows through “someone else’s server” in the cloud, PaaS and SaaS offerings, and proprietary (often closed-access) devices that sit in our homes and quietly but continuously report on our activity to the cloud. How can we secure the cloud? How can we find weaknesses in applications? And how can we better understand, poke at, and harden the internet of things that permeate our daily lives?

Track Two – Digital Forensics & Incident Response

Cybersecurity professionals must have the tools, techniques, and procedures needed to recognize and respond to threats. Not only are containment, eradication, and recovery essential to incident response, drawing the right conclusions and preserving evidence to stand up in court can define your career.

Track Three – Red Team & Blue Team Tools

Awareness of and proficiency with the right tools for the job is vital for both finding new vulnerabilities and mitigating and defending against red team threat actors that would exploit them. Come share and learn about the tools in the utility belt of offensive penetration testers and blue team defenders that help find and reduce risks to sensitive information.

Track Four – Growing Your Career in Cybersecurity

Whether you’re thinking about starting a degree or certificate program or just landed your first role, cybersecurity is a dynamic career that changes quickly and is a rapidly growing field. Find out how to stand out, speak up, and prioritize what is essential to achieve your personal and career growth goals.

Track Five – Building Highly Effective Security Programs (Executive Track)

As security gains prominence and influence in the boardroom, it is critical for security leaders to know how to speak the language of business, prioritize, and level up their programs continuously. From developing security strategies and building security awareness to implementing a metrics-based approach to security program management, leaders in the field discuss how they succeed in delivering sustainable and effective programs.

Scroll to Top