Past Web Conferences

Home » Past Web Conferences
ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing.
All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post-event quiz, to submit CPE credits for various certifications.
Web Conference

Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications

October 16 @ 1:00 pm - 2:00 pm EDT (US)

Automated bot attacks are becoming increasingly sophisticated as they learn to avoid detection and stay unidentified longer. Tune in for the live webinar on October 16 at 1:00 PM EST as Liel Strauch, a Lead Researcher at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX, highlight the top five ways to identify automated bot attacks to your website.

Learn More

Web Conference

The 7 Deadly Sins of Insiders and how to Defend

October 9 @ 1:00 pm - 2:00 pm EDT (US)

In this panel webinar, ObserveIT’s Head of Security, Chris Bush, will interview two experts on the topic of the risk from insider threats. We will illuminate the seven common motives — also known as the seven deadly sins — that influence insider threats and share best practices for defending against them. We will explore what makes insider threats so different from traditional external threats.

Learn More

Web Conference

New Trends in Security Outsourcing and Other Tech

September 24 @ 12:00 pm - 2:00 pm EDT (US)

As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?

Learn More

Web Conference

Identities are the new Security Perimeter in a Zero Trust World

September 18 @ 1:00 pm - 2:00 pm EDT (US)

In a recent Thales survey, two-thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack.

Learn More

Web Conference

Update on the Latest Cyber Threats and Trends

September 11 @ 1:00 pm - 2:00 pm EDT (US)

How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.

Learn More

Web Conference

Legislative Aspects

August 27 @ 12:00 pm - 2:00 pm EDT (US)

Learn More

Web Conference

Paving the Way to a Passwordless Future

August 21 @ 1:00 pm - 2:00 pm EDT (US)

It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

Learn More

[web_conference]
Web Conference

Beyond the Phish – Snapshot of End User Behavior

August 14 @ 1:00 pm - 2:00 pm EDT (US)

Phishing is one of InfoSec's longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?

Learn More

Web Conference

Privacy – GDPR a Year Later

June 25 @ 12:00 pm - 2:00 pm EDT (US)

The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?

Learn More

Web Conference

Passwordless Authentication

June 12 @ 1:00 pm - 2:00 pm EDT (US)

Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

Learn More

Web Conference

Security-as-a-Service for Small and Medium Sized Businesses

June 5 @ 1:00 pm - 2:00 pm EDT (US)

How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs? While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time-consuming. In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options

Learn More

Web Conference

Breach Response – Humans in Security

May 28 @ 12:00 pm - 2:00 pm EDT (US)

At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.

Learn More

Scroll to Top