ISSA 2015 June 4, 2015 to June 4, 2015, Los Angeles,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Welcome Address | Richard Greenberg , Stan Stahl | N/A | |
Opening Keynote: INFOSEC: Fighting our way to a better tomorrow | Dave Kennedy | It seems that businesses are truly struggling with how to handle the threats we face ... | |
Keynote | Chris Calvert , Brad Saathoff | N/A | |
Executive Forum: Information Security Management - Key Strategies and Tactics | Stan Stahl | Dr. Stan Stahl will set the stage for this Forum, including a brief overview of ... | |
Understanding What Software is Made Of: The Implications of Vulnerable Components in IoT | Mikko Varpiola | N/A | |
Cyber Risk Leadership – From the Backroom to the Boardroom: What everyone needs to know to survive | Malcolm Harkins | The biggest vulnerability we face today and in the future is the misperception of risk. ... | |
When Mobile Forensics and Computer Forensics Collide | Rob Schroader | He's a PC gamer, she's an iPhone addict. He likes to steal identities online. She ... | |
When the Bad Guys Win | Kevin Ripa | How frustrating is it when another pedophile skates on a possession charge? How many times ... | |
Guidance of the Process used in Breach Investigations | Megan Yelorda | In this presentation, the topic of what constitutes a breach will be discussed, as well ... | |
Building a Secure Network at Scale | Matthew Prince | N/A | |
Solid Defense Strategies | Kevin Cardwell | In this talk, Kevin will look at the essential defensive strategies that have to be ... | |
HTTPS Best Practices | Jim Manico | HTTPS/SSL/TLS has been under fire for years. FREAK, POODLE, BEAST, CRIME, problems with the weakness ... | |
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources | John B. Dickson | N/A | |
Raw Data Carving | Kevin Ripa | You have used all of the utilities in EnCase, FTK, and other programs to carve ... | |
Forensic Analysis of sUAS aka Drones | David Kovar | N/A | |
Everything You Know is Wrong! | David M. Perry | Most people agree that the weakest point in network and data security is the end ... | |
Cellular Network Attacks - What the Latest SS7 Vulnerabilities Mean for Businesses & Individuals | Aaron Turner | Most organizations take for granted the integrity of the public telephone system. Surely, someone, somewhere ... | |
Next Generation Firewalls - Top 8 Revisited | Miguel O. Villegas | Recent security breaches of some of the largest and seemingly more secure environments beg the ... | |
Executive Forum Luncheon and Presentation | Joseph Esposito | N/A | |
Update from the ISSA Int'l Board | Ira Winkler , Araceli Treu Gomes , Andrea Hoy | N/A | |
Unexplored Attack Vectors: The attacks you're not securing against, yet | Samy Kamkar | N/A | |
Losing Battles, Winning Wars -- Frustrating Adversaries Through Threat Intelligence | Dmitri Alperovitch , Rafal wh1t3rabbit Los | When it comes to intrusions and breaches, most companies take a short-game view. This means ... | |
What makes SQLite database seem like a hard drive? | Yuri Gubanov | Forensic investigation of SQLite databases has become extremely important. SQLite is everywhere: on desktops and ... | |
Digital Evidence Preservation and Monitoring of Social Networking Sites | Julie Lewis | According to Nielsen, internet users continue to spend more time with social media sites than ... | |
Security Awareness | Ira Winkler | N/A | |
A Vision for the Future of Analytical Detection | Chris Calvert | Chris will delve into the modern day challenge of detecting bad guys and explain some ... | |
Securing Application Development in 2015 | Jerry Hoff | Many companies lack formalized security activities before, during and after development. Other companies have made ... | |
Grow Up CISOs | Eric W. Cowperthwaite | Thank goodness I have met my PCI requirements and patched all those vulnerabilities with a ... | |
Panel: Women in Security | Araceli Treu Gomes , Debbie Christofferson , Julie Cullivan , Lori Harmon , Jean Pawluk | N/A | |
Panel: Best Practices for Strengthening Your Defenses | Cynthia Marcotte Stamer , Bryn Mow , Peter Renner , Suedy Renner , Michelle "elle" Ross | N/A | |
Never Fight a Land War in Cyberspace | Marcus J. Ranum | The idea that cyberspace is a new domain of warfare seems attractive but only if ... | |
What is a Breach? … Exploited Weaknesses within Your Infrastructure | Jason Dablow | Industry agnostic breaches have become the reality of the threat landscape. The bastions that we ... | |
Closing Remarks | Richard Greenberg | N/A | |
Training Session A: Secure Coding Boot Camp | Jim Manico | The major cause of web insecurity is insecure software development practices. Attendees will earn 8 ... | |
Training Session B: Information Security Management Boot Camp for IT Professionals | Mikhael Felker , Edward Pagett | In this Boot Camp, our expert team of information security instructors will cover such topics ... |