Past Web Conferences

Home » Past Web Conferences ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post-event quiz, to submit CPE credits for various certifications.
Web Conference

Exploring The Frontier For Maliciousness In IPv6

May 8, 2019 @ 1:00 pm - 2:00 pm EDT (US)

This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring of their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

Learn More

Web Conference

Breach Report – Review the Various Breach Reports

April 23, 2019 @ 12:00 pm - 2:00 pm EDT (US)

This session will cover the traditional breach reports as well as a new style of reports and analysis.

Learn More

Web Conference

Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React

April 17, 2019 @ 1:00 pm - 2:00 pm EDT (US)

In this session, ExtraHop CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

Learn More

Web Conference

High Assurance Digital Identity in Zero Trust Architecture

April 10, 2019 @ 1:00 pm - 2:00 pm EDT (US)

The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

Learn More

Web Conference

Threat Detection – Trends and Technology

March 26, 2019 @ 9:00 am - 10:30 am EDT (US)

The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.

Learn More

Web Conference

Your Hygiene is Showing – Improving Risk Posture

March 20, 2019 @ 11:00 am - 12:00 pm EDT (US)

Cyber hygiene is the flossing of cybersecurity — something we all know we should do but regularly ignore. While it may be more exciting to get the latest silver bullet to solve a zero-day problem, improving processes to better leverage what you already have will go further in protecting against the next cyber attack.

Learn More

Web Conference

Up Up and Away: Why The Modern SOC is Rooted in the Cloud

March 13, 2019 @ 1:00 pm - 2:00 pm EDT (US)

Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.

Learn More

Web Conference

DevOps/AppSec, The State of the World

February 26, 2019 @ 11:00 am - 1:00 pm EST (US)

Over the past few years, the focus has shifted from ‘does the code have vulnerabilities?' to issues of ‘could the code have vulnerabilities?' Of course, the later created the question – How would we know? Now, just when we thought we understood things, we realize that we are changing again. Not only is the code and its components are important, but so is the question of the development environment. This webinar will go over the state, changes, and new directions we are being faced with.

Learn More

Web Conference

10 Must-Have Features of a Modern SIEM

February 20, 2019 @ 11:00 am - 12:00 pm EST (US)

ith the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision-makers to look for when evaluating potential candidates.

Learn More

Web Conference

Adopting Zero Trust as an Enterprise Security Model

February 13, 2019 @ 11:00 am - 12:00 pm EST (US)

A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.

Learn More

Web Conference

2018 Year in Review and Predictions for 2019

January 22, 2019 @ 11:00 am - 1:00 pm EST (US)

2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

Learn More

Web Conference

Is Your Organization Ready for Automation?

January 9, 2019 @ 11:00 am - 12:00 pm EST (US)

Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout. Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

Learn More

Scroll to Top