Past Web Conferences
Home » ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post-event quiz, to submit CPE credits for various certifications.Legislative Aspects
August 27, 2019 @ 12:00 pm - 2:00 pm EDT (US)
Paving the Way to a Passwordless Future
August 21, 2019 @ 1:00 pm - 2:00 pm EDT (US)
It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.
[web_conference]
Beyond the Phish – Snapshot of End User Behavior
August 14, 2019 @ 1:00 pm - 2:00 pm EDT (US)
Phishing is one of InfoSec's longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?
Privacy – GDPR a Year Later
June 25, 2019 @ 12:00 pm - 2:00 pm EDT (US)
The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
Passwordless Authentication
June 12, 2019 @ 1:00 pm - 2:00 pm EDT (US)
Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.
Security-as-a-Service for Small and Medium Sized Businesses
June 5, 2019 @ 1:00 pm - 2:00 pm EDT (US)
How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs? While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time-consuming. In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options
Breach Response – Humans in Security
May 28, 2019 @ 12:00 pm - 2:00 pm EDT (US)
At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.
What is a CASB and Why Do You Need it?
May 22, 2019 @ 1:00 pm - 2:00 pm EDT (US)
CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud security failures will be the customer’s fault through 2023. So, how do you ensure that you have the right tools in place as your organization adopts more and more cloud applications?
Zero Trust: The Evolution of Perimeter Security
May 15, 2019 @ 1:00 pm - 2:00 pm EDT (US)
One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability. Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.
Exploring The Frontier For Maliciousness In IPv6
May 8, 2019 @ 1:00 pm - 2:00 pm EDT (US)
This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring of their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.
Breach Report – Review the Various Breach Reports
April 23, 2019 @ 12:00 pm - 2:00 pm EDT (US)
This session will cover the traditional breach reports as well as a new style of reports and analysis.
Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
April 17, 2019 @ 1:00 pm - 2:00 pm EDT (US)
In this session, ExtraHop CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.