Contact Us   |   Print Page   |   Sign In   |   Join Now
July 2015

Network Security Testing --
Are There Really Different Types of Testing?

Click here to view the live recording of the July 28, 2015.
Click here
to view the slide deck.
Click here
for CPE Quiz.

Sponsored by:

Attend this webinar to learn about the different kinds of security testing efforts that are commonly conducted in enterprise networks. This webinar will also cover the benefits of security resilience and associated testing for enterprises.


Jorge Orchilles
Vice President, Sough Florida ISSA
Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads the Advanced Penetration Testing & Vulnerability Assessment Quality Control teams in a large financial institution and serves as Vice President of the Information Systems Security Association South Florida Chapter.


Eric Raisters
Eric was most recently the Manager of Secure Software Development at Attachmate Corporation and has more than 18 years of testing and development experience with Attachmate’s security products. He has worked with all Attachmate product teams to collaboratively incorporate secure development practices into their software development methodologies through educating the development teams on all aspects of SDLC. He also initiated and coordinated Attachmate’s vulnerability management and publication team and processes. Eric previously worked as a geophysicist on the oil industry and has degrees in geology and oceanography.

Donald Shin
Sr. Technical Business Development Manager, IXIA

Since 2013, Donald has marketed Ixia’s solutions for the exciting and ever-evolving network security and enterprise IT industry. Our security team's goal is to enable enterprise's to build secure and optimized networks by leveraging proven methods of validating network and application designs through high-fidelity testing. Donald is a creative, strategic thinker with honed execution skills for complex lifecycle product management. His extremely diverse work experience provides a unique view into all elements of marketing including: hardware engineer, software engineer, FAE. Donald's areas of expertise include: market needs analysis and roadmap creation, lead cross-functional teams including partner program and ecosystem development, public speaking, and negotiation skills.

John Kindervag
Vice President, Principal Analyst serving Security & Risk Professionals at Forrester Research

John is a 25-year veteran of the high-tech world. He holds numerous industry certifications, including CISSP, CEH, QSA, and CCNA. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine,, and John has spoken at many security conferences and events, including ToorCon, ShmoCon, and InfoSec World. He has a Bachelor of Arts degree in communications from the University of Iowa.

Ira Winkler
President, Secure Mentem, CISSP

Ira Winkler, CISSP, is President of Secure Mentem. He is considered one of the world’s most influential security professionals, and has been named a "Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically "broke into” some of the largest companies in the World and investigated crimes against them, telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assist organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, the 2013 CSO Compass Award, as well as several other prestigious industry awards. 

Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved on to support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.

Community Search
Sign In


ISSA International Series: Breach Response - Humans in Security

ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses

ISSA International Series: Passwordless Authentication

ISSA International Series: Privacy - GDPR a Year Later

ISSA International Series: Security Standards Organizations - The good, the bad, and the ugly?

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information