Loading Events
ISSA International Series

Security Professionals Dilemma

Home » Events » Security Professionals Dilemma

  • This event has passed so registration is closed.



Presentation Slides

Download the Presentation Slides

CPE Quiz

Click on the link to take the CPE Quiz

Date and Time

November 27, 2018 @ 12:00 pm - 2:00 pm EST

Event Category

Web Conference

Event Type

ISSA International Series


Candice Benson


Lisa O'Connell


We as security professionals are faced with a multitude of dilemmas in the performance of our duties. These dilemmas range in nature including the following questions:

  • What new technology do we need to protect against the latest threats?
  • How much security do we put into our infrastructures and yet still not be obtrusive?
  • Should we or can we hack back to stop an attack?
  • How often do we test?
  • How do we harmoniously integrate our operational processes with those of our enterprise?
  • How much time do we need to spend tracking laws and regulations?

This webinar will attempt to provide insight into these issues and others as we move forward.


Mark Kadrich – Principal, Kadrich InfoSec Consulting Services

For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years.

Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.

See Mark Kadrich‘s full profile.


Matt Mosley – Vice President of Products, Cyren

Matt Mosley is the VP of Products at Cyren, a leading email security and threat intelligence company.  Matt is a recognized security expert and thought leader with more than 25 years of experience in numerous roles as a practitioner, consultant and software executive.  Prior to joining Cyren, Matt was the VP of Products at Devo, where he lead product strategy for Devo's cyber security business, and the Director of Product Management for Symantec’s MSSP business, where he helped to launch new products and services to enhance the security of some of the world’s largest organizations. Matt has also held senior leadership roles with leading security firms including NetIQ, Internet Security Systems, Intellitactics, and Brabeion Software. As the chief security officer at early Internet pioneer DIGEX, Matt defined and implemented the security controls and best practices for the world’s first web hosting business and was a founding member of the ISP Security Consortium. Matt holds the CISSP, CISM, and CISA designations, is a regular speaker at security conferences, and taught CISSP classes for ISSA-NOVA for nearly a decade

See Matt Mosley‘s full profile.

Geoff Horne – Distinguished Engineer and Senior Manager of SMEs, Infoblox Inc.

Geoff is an Architect, Systems Analyst, and Threat Intelligence Consultant. He has been involved in the design and integration of next generation computing and communications systems for more than two decades and is currently a Distinguished Engineer and Senior Manager of SMEs for Infoblox Inc. There he is responsible for design, development, and securing of systems for large scale network intelligence infrastructures for fortune 500 companies.

Geoff draws on a diverse background that began with a Masters degree in physics, a post graduate career in research computing at the University of Sydney, digital film production including visual effects for such films as ‘The Matrix', and the Technology Director for News Corporation's News Interactive where he managed the design and development of five of Australia's top ten websites.

Geoff was then convinced to become the Senior Engineer for the InteropNet Network (eNet and iLabs) where he was responsible for the design and delivery of the world's largest state-of-the-art temporary network. He has since spent more than 15 years as World Wide Principal Architect, Professional Services Consultant, Sales Engineer, SME Manager, and part time Product Superintendent for Infoblox.

See Geoff Horne‘s full profile.

Karen Worstell – CEO, W Risk Group

Karen Worstell is as well-known as a serial Chief Information Security Officer for iconic brands across industry sectors and as a Silicon Valley technology leader. Today she is committed to helping diverse women thrive in the Tech industry through training, coaching and support with her signature online programs. Worstell is the host of the podcast MOJO Maker for Womxn in Tech, and has spoken internationally on the future of cybersecurity and the criticality of an inclusive and diverse leadership team to the innovation capacity of technical organizations.

Karen’s educational and training background includes BS degrees in Chemistry and Biology, MS in Computer Science, MA in Theology (Jewish Studies), Advanced Coaching Training and Certification through Robbins-Madanes Training, and certification as a Chaplain through ACPE. In other words, she lived the Big Tech life and learned how to professionally handle it after the fact so now she shows you everything it took her 30 years to learn

See Karen Worstell‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top