- This event has passed so registration is closed.
The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well, it has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
Michael F. Angelo – Chief Security Architect, Micro Focus | NetIQ
Michael F. Angelo has been in cyber security for over 3 decades. Michael has 66 granted US patents, with the majority being in the area of Cyber Security. Michael has served as a trusted security advisor and architect with a number of fortune 20 corporations. He has worked in the development of national and international standards. Currently he is an ISSA Fellow and is named on the ISSA Hall of FAME. His current day job requires him to define, track, drive and certify the Cyber Posture of software products.
Michael has presented at numerous International conferences and, in today’s world, web conferences.
Thomas Fischer – Security Advocate and Threat Researcher
Thomas has over 30 years of experience in the IT industry ranging from software development to infrastructure & network operations and architecture to settle in information security. He has an extensive security background covering roles from incident responder to security architect at fortune 500 companies, vendors and consulting organizations. He is currently security advocate and threat researcher focused on advising companies on understanding their data protection activities against malicious parties not just for external threats but also compliance instigated.
Thomas is also an active participant in the InfoSec community not only as a member but also as director of Security BSides London, ISSA UK chapter board member and speaker at events like SANS DFIR EMEA, DeepSec, Shmoocon, and various BSides events.
See Thomas Fischer‘s full profile.
Lisa Angelo – Attorney, Cyber Law & Insurance
Lisa M. Angelo is a cyber liability attorney. She works with companies of all sizes and advises clients on data privacy, cyber insurance disputes, data breach response, technology contracts, intellectual property, and other matters related to technology and cyber law.
Lisa is recognized as a Privacy Law Specialist by the International Association of Privacy Professionals. She has two internationally-recognized certifications in privacy: a Certified Information Privacy Manager and a Certified Information Privacy Professional.
Lisa is an elected council member for the State Bar of Texas Computer & Technology Section. She is the Vice-Chair of the State Bar Business Law Section’s General Practice Committee and serves on the Blockchain Committee dealing with blockchain’s application in regulated industries. Lisa is also a member of the FBI’s InfraGard Houston Chapter which is in an initiative for the private and public sectors to share information about cyber risk. Recognized for her professional achievements, Lisa was named a Texas Super Lawyers’ 2019 Rising Star. She is licensed to practice law in Texas and Colorado having earned a Juris Doctorate from South Texas College of Law and a bachelor’s in psychology from The University of Texas at Austin.
See Lisa Angelo‘s full profile.
Jason Hart – CTO, Thales Data Protection Solutions
Jason is a global award-winning cyber security expert and chief technology officer for Thales’ data protection solutions. He is a former ethical hacker with 20 years’ experience in the information security industry and has created technologies to keep organizations one step ahead of evolving cyber threats, including the world’s leading cloud-based authentication platform. He is also deeply interested in reducing and researching the risk of password theft, and is globally known for exposing a large number of major password vulnerabilities. You might even find him popping up on the BBC and CNBC, and reading his regular contributions to publications such as the Financial Times, The Guardian and Time.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.