ISSAinternationalcon 2014 Oct. 22, 2014 to Oct. 23, 2014, orlando,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Address Necessary Skills for Cyber Security Professionals Admiral Rogers N/A
The Truth About Securing Networks and Systems Robert Bigman Why is it that after spending millions of dollars on various computer security technologies, the ...
Building the Next Generation of Cyber Defenders: Cross-Training Wounded Warriors to help Protect and Defend the Nation's Information Systems Jim Wiggins Today’s cyber attacks are continuing to become more technically astute and effective. Gone are the ...
Pushing the Envelope on Data-Driven Security Awareness Mark Chapman This session explores established and cutting-edge methods to help you take your social engineering simulation ...
Looking To Build A Secure Enterprise Mobile Application? Here's How! Mushegh Hakhinian Mobile applications need to allow people convenient access, but also enable them to maintain organizational ...
The Many Facets of a Data Breach: Practical Case Studies for Incident Response, Remediationand Legal Disclosures. Jason N. Smolanoff This presentation will provide practical examples, case summaries and actionable takeaways designed to assist the ...
Automating Threat Intelligence Elvis Hovor , Shimon Modi , Stephen Schall There is a lot of interest being generated in the security community around threat intelligence. ...
The Evolving Threat Landscape — Microsoft Security Intelligence Report Matthew Littleton Threats have changed in dramatic and unexpected ways over the past year as attackers continue ...
Threats & Response: Updates, Forensics, Law Enforcement, eDiscovery Jon Clay Approximately four years ago, Trend Micro’s Forward Threat Research (FTR) team began investigating the people ...
Developing a Defensible eDiscovery / Forensics Program for any Organization J. Michael Butler eDiscovery and Computer forensic capabilities are crucial in our litigious society. Is your organization prepared ...
Mobile Application Penetration Testing: Windows Phone 8 Jorge Orchilles Believe it or not, Windows Phone 8 (WP8) is gaining popularity, which means we are ...
The Biggest Risk You Face May be Yourself – Addressing Insider Risks Christopher Pierson , James T. Shreve Although most of our resources and attention is focused on defending information and systems from ...
Security is for Suckers Ryan Castle Description: In this session, Castle will discuss how cyber attacks have continued to evolve and ...
Defense Wins Championships - Practices for Developing Effective Cyber Defense Professionals Brad Wilkerson Offensive security classes and instruction, often referenced as Ethical Hacking or Penetration Testing, are popular ...
How to Fight an APT attack - Identifying and Responding to a visit from China John Henderson , Ron Pelletier , Jeff Foresman This presentation is an actual case study of an advanced attack that originated from China ...
Security in the Era of the Digital Polis Christopher Adelman Whereas the analog polis clearly defines between public and private life, the Digital Polis merges ...
How To Make A Security Awareness Program… FAIL! Winn Schwartau Are you ready for a wake-up call? How about two? 1. Security Awareness Programs are ...
Badges, Bombers and Barbarians: 7 New Tactics for Arming Corporate Citizens Reg Harnish While some security pundits evangelize the failures of security awareness training and corporate budgets wasted ...
Computer Forensics and Incident Response in the Cloud Stephen Coty As most security professionals know, effective incident response plans include physical access to servers, and ...
Death to Passwords - Changing the Nature of Online Authentication John Haggard Historically, strong two factor hardware authentication has been too costly and complicated to scale to ...
How to Hack a Bank - ISSA Financial SIG Presentation Tom Schauer , Andy Robbins This talk will show the top three vectors a team uses to successfully breach banking ...
Keynote Address Security Researcher, Security Besmircher: Security for Organizations in aworld of bug bounties and random security researchers Kevin Johnson From Weev to Microsoft's Bug Bounty, organizations have to understand how their organization deals with ...
The Confluence of Data Security Challenges Brian Marshall Sophisticated cybercrimes and advanced persistent threats are occurring at an incredible rate. Aided by new ...
Architecture Of Global Surveillance Raj Goel Snowden, Anonymous, NSA, FBI, GCHQ, Boeing, China, Cisco, ATT, Verizon, Google, Facebook, GM, Ford, Apple, ...
Beyond Sandboxing Livio Ricciulli Trends in mobility, peer to peer protocols, and virtualization are dissolving our defense perimeter. Without ...
Continuous Authentication Protects From Physical Attacks on Mobile Terminals Ben Ayed , Scott Jenkins The current standard method for validating a user’s identity for authentication on a mobile information ...
Why Enterprise Cyber Security Isn't Working -- and a New Approach Peter B. Lamontagne Despite billions spent on cyber security, enterprise breaches costing millions are occurring on a daily ...
2014 Year of the Mega Breach – Fight Back with a Layered Defense Katheryne Pelak From Spam to Heartbleed and everything in between – protecting your business is well past ...
"Get Plumb Maddog Mean." What Josey Wales Taught about Responding to Attacks Joseph Patrick Schorr In our current threat environment it is not a matter of "if" but "when", we'll ...
How to Get from Security Analyst to CISO: Developing Your Career Path Strategy Tim Virtue So you want to be a CISO. Do you know how to get there? What ...
The Human Firewall: Maintaining Your Guise As A Social Engineer Tim Roberts , Brent White As Penetration Testers, we are often employed to perform social engineering, phishing and red team ...
Threat Update Panel Discussion Lucas Zaichkowsky , Garrett Felix , Paul Alvarez , Michael F. Angelo , Dodi Glenn , Cris Thomas N/A
How to Protect Your Company's Valuable Trade Secrets Frederick Scholl Today US companies loose close to $300 B annually in trade secret theft. Information technology ...
Insider Insights Marci Mccarthy When Information Security first appeared on organizational charts, IT technicians found themselves in an unexpected ...
Why Teaching Information Security In College Is Important Roy Wattanasin This talk will give a brief introduction and unique perspective in to the world of ...
David and Goliath: Protecting yourself from state sponsored hackers Chris Camejo Forgot the politics, state sponsored attacks and espionage are and will continue to be conducted ...
Syrian Electronic Army: Their Methods and Your Responses Samantha Manke Having helped parties respond to Syrian Electronic Army (SEA) attacks, our organization learned about who ...