Contact Us   |   Print Page   |   Sign In   |   Join Now
March 2018 ISSA Web Conference

ISSA International Series: Blockchain and other Mythical Technology

Recorded (2 Hour Event) on Tuesday, March 27, 2018

Click here to view the recording.
Click here
for the presentation.
Click here to take the CPE quiz.


We will be examining blockchain technology and its proliferation in our data security architectures. Our speakers will discuss their experiences with BC technology, how it’s working today, plans for taking advantage of it in the future, and possible technical issues that may affect its long term efficacy.


Mark Kadrich, Principal, Kadrich InfoSec Consulting Services


For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years.
Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.



Pete Lindstrom, VP, Security Strategies, IDC

Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.

Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.

Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business,, and CSO Magazine. His columns and articles have appeared in Information Security Magazine,, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.

In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.



James Grundvig, COO and Cofounder,  Myntum Ltd.

James is COO and cofounder of Myntum Ltd., a blockchain-based digital vault company, launching its ICO in spring 2018. He is a published author and an investigative journalist having published in the Huff Post, Financial Times FDI magazine, among other media outlets. James has 25 years of project management experience.

Peter Linder, Blockchain Consultant and Developer

Peter earned his computer engineering degree at MIT.

For two decades he designed CPU and memory chips, chipsets, and motherboards. After moving into security, he earned his CISSP in 2008 and served as chapter president of the ISSA South Texas chapter. In 2015 Peter transitioned full time into his current role as a blockchain technology consultant and developer.

Peter can be reached at

Brian Russell, Chief Engineer at Leidos

Brian Russell is a Chief Engineer focused on Cyber Security Solutions for Leidos ( where he has led efforts to develop cryptographic key management systems and performed security engineering for connected vehicles, unmanned aerial systems (e.g., drones) and critical infrastructure.  Brian is the Chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, co-author of the book Practical Internet of Things Security and an adjunct professor at the University of San Diego (USD). He leads Leidos' efforts to build an assured blockchain solution. 

Community Search
Sign In


ISSA International Series: Breach Response - Humans in Security

ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses

ISSA International Series: Passwordless Authentication

ISSA International Series: Privacy - GDPR a Year Later

ISSA International Series: Security Standards Organizations - The good, the bad, and the ugly?

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information