Contact Us   |   Print Page   |   Sign In   |   Register
October 2013

Cyber Weaponization

Recorded Live: October 22, 2013
Start Time:
9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here for presentation slides.
Click here to view the recorded web conference.

Generously supported by:

Web Conference Overview:

What makes a piece of software a cyber weapon? Companies and governments are buying exploit code to test their own systems and controls or to use against their enemies. What makes this software a cyber weapon and where do we go from here? Will the sale of exploit code be regulated or prohibited for certain buyers? How do we protect our businesses from these exploits when they are being sold privately to the richest bidder? Join us as we explore this debate and discuss what we can do to protect ourselves and our organizations.


Dave Aitel
Founder and CEO, Immunity, Inc.

Dave Aitel has always been at the forefront of the cybersecurity space, leading innovations in research and development. Recruited by the NSA at the age of 18, Dave served six years as a security scientist before moving on to work as a consultant for @stake. His co-authoring of "The Hacker's Handbook” along with the founding of his widely read "Daily Dave” mailing list helped make Dave a key member of the cybersecurity industry.

Dave has keynoted at BlackHat and Defcon and spoken at various conferences all over the world. With the launch of Immunity Inc. in 2002 Dave switched gears from Linux and Unix systems to Windows, working on his exploit-writing skills to make CANVAS one of the most well recognized penetration testing softwares in the industry. Dave put together a world-renowned team who now advise customers ranging from major financial institutions to Fortune/Global 500s and government agencies.

Most recently Dave was named one of "The 15 Most Influential People in Security” by eWeek Magazine and has become a regular on Fox News and CNN bringing his expertise in the field to the masses.

George Kurtz
President, CEO and Co-Founder, CrowdStrike

George Kurtz, President/CEO and co-founder of CrowdStrike, former CEO/Founder, Foundstone, and former executive vice president and worldwide CTO of McAfee is an internationally recognized security expert, author, entrepreneur and speaker.

He has almost 20 years of experience in the security space and has helped hundreds of organizations and governments around the world tackle the most demanding security problems.

He has also been quoted or featured in many major publications, media outlets and television programs, including CNN, Fox News, ABC World News, Associated Press, USA Today, Wall Street Journal, The Washington Post, Time, ComputerWorld, eWeek, CNET and others.

Kurtz holds a Bachelor of Science degree from Seton Hall University. He also holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified Public Accountant (CPA). Kurtz also authored the best-selling security book of all time, "Hacking Exposed: Network Security Secrets & Solutions."

In addition, Kurtz was recently granted patent numbers 7,152,105 and 7,543,056 - "System and method for network vulnerability detection and reporting."

Arian Evans

Vice President of Product Strategy, WhiteHat Security

Arian Evans is a 14-year veteran of the software-security industry, with deep expertise in information security, financial-services software development, and systems architecture.

As VP of Product Strategy he is responsible for ensuring WhiteHat testing technology stays ahead of both the bad guys and new technology. In this role he draws on his previous seven years experience at WhiteHat Security as VP of Operations, where he was responsible for service-delivery and building the company¹s acclaimed Threat Research Center and R&D teams, customer support; and expanding the company¹s flagship Sentinel platform from 130 to more than 20,000 applications under assessment.

In his career, Evans has created several pioneering methodologies for dynamic testing of Web applications, source code review, and database configuration and analysis. He has also worked on global projects for the Center for Internet Security, NIST, the U.S. FBI, the U.S. Secret Service, and incident-response/forensics for many large commercial organizations.

Evans is a frequent speaker at industry conferences including Black Hat and OWASP and has researched and published zero-day attack-techniques, and vulnerabilities in widely-deployed products from vendors such as Cisco and Nokia.

Jorge Orchilles - South Florida, USA Chapter
ISSA Web Conference Committee, Session Moderator

Jorge Orchilles is a member of the ISSA Web Conference Committee and author of Microsoft Windows 7 Administrator’s Reference. He holds a Master’s of Science in Management Information Systems from Florida International University. Currently, he is the Infrastructure Vulnerability Assessment and Penetration Testing team Manager at a Fortune 20 financial institution, and serves as the President of the South Florida ISSA Chapter.

Community Search
Sign In


ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

Member Reception Party at RSA Conference 2019

ISSA Thought Leadership Series: Up Up and Away: Why The Modern SOC is Rooted in the Cloud

2019 South Florida ISSA Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information