Past Web ConferencesHome » ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post-event quiz, to submit CPE credits for various certifications.
The Asset Management Resurgence
January 22, 2020 @ 1:00 pm - 2:00 pm EST (US)
Software-Defined Segmentation – Challenges of Accelerated Enterprise
December 11, 2019 @ 1:00 pm - 2:00 pm EST (US)
Building a People-Centric Cybersecurity Strategy for Healthcare
December 4, 2019 @ 1:00 pm - 2:00 pm EST (US)
More than 99% of all targeted cyber attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets – your people and your data.
Attack of the BotNets – Internet of Terror loT
October 22, 2019 @ 12:00 pm - 2:00 pm EDT (US)
Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?
Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications
October 16, 2019 @ 1:00 pm - 2:00 pm EDT (US)
Automated bot attacks are becoming increasingly sophisticated as they learn to avoid detection and stay unidentified longer. Tune in for the live webinar on October 16 at 1:00 PM EST as Liel Strauch, a Lead Researcher at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX, highlight the top five ways to identify automated bot attacks to your website.
The 7 Deadly Sins of Insiders and how to Defend
October 9, 2019 @ 1:00 pm - 2:00 pm EDT (US)
In this panel webinar, ObserveIT’s Head of Security, Chris Bush, will interview two experts on the topic of the risk from insider threats. We will illuminate the seven common motives — also known as the seven deadly sins — that influence insider threats and share best practices for defending against them. We will explore what makes insider threats so different from traditional external threats.
New Trends in Security Outsourcing and Other Tech
September 24, 2019 @ 12:00 pm - 2:00 pm EDT (US)
As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
Identities are the new Security Perimeter in a Zero Trust World
September 18, 2019 @ 1:00 pm - 2:00 pm EDT (US)
In a recent Thales survey, two-thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack.
Update on the Latest Cyber Threats and Trends
September 11, 2019 @ 1:00 pm - 2:00 pm EDT (US)
How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.
Paving the Way to a Passwordless Future
August 21, 2019 @ 1:00 pm - 2:00 pm EDT (US)
It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.