ISSA 2015 June 4, 2015 to June 4, 2015, Los Angeles,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Address Richard Greenberg , Stan Stahl N/A
Opening Keynote: INFOSEC: Fighting our way to a better tomorrow Dave Kennedy It seems that businesses are truly struggling with how to handle the threats we face ...
Keynote Chris Calvert , Brad Saathoff N/A
Executive Forum: Information Security Management - Key Strategies and Tactics Stan Stahl Dr. Stan Stahl will set the stage for this Forum, including a brief overview of ...
Understanding What Software is Made Of: The Implications of Vulnerable Components in IoT Mikko Varpiola N/A
Cyber Risk Leadership – From the Backroom to the Boardroom: What everyone needs to know to survive Malcolm Harkins The biggest vulnerability we face today and in the future is the misperception of risk. ...
When Mobile Forensics and Computer Forensics Collide Rob Schroader He's a PC gamer, she's an iPhone addict. He likes to steal identities online. She ...
When the Bad Guys Win Kevin Ripa How frustrating is it when another pedophile skates on a possession charge? How many times ...
Guidance of the Process used in Breach Investigations Megan Yelorda In this presentation, the topic of what constitutes a breach will be discussed, as well ...
Building a Secure Network at Scale Matthew Prince N/A
Solid Defense Strategies Kevin Cardwell In this talk, Kevin will look at the essential defensive strategies that have to be ...
HTTPS Best Practices Jim Manico HTTPS/SSL/TLS has been under fire for years. FREAK, POODLE, BEAST, CRIME, problems with the weakness ...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources John B. Dickson N/A
Raw Data Carving Kevin Ripa You have used all of the utilities in EnCase, FTK, and other programs to carve ...
Forensic Analysis of sUAS aka Drones David Kovar N/A
Everything You Know is Wrong! David M. Perry Most people agree that the weakest point in network and data security is the end ...
Cellular Network Attacks - What the Latest SS7 Vulnerabilities Mean for Businesses & Individuals Aaron Turner Most organizations take for granted the integrity of the public telephone system. Surely, someone, somewhere ...
Next Generation Firewalls - Top 8 Revisited Miguel O. Villegas Recent security breaches of some of the largest and seemingly more secure environments beg the ...
Executive Forum Luncheon and Presentation Joseph Esposito N/A
Update from the ISSA Int'l Board Ira Winkler , Araceli Treu Gomes , Andrea Hoy N/A
Unexplored Attack Vectors: The attacks you're not securing against, yet Samy Kamkar N/A
Losing Battles, Winning Wars -- Frustrating Adversaries Through Threat Intelligence Rafal wh1t3rabbit Los , Dmitri Alperovitch When it comes to intrusions and breaches, most companies take a short-game view. This means ...
What makes SQLite database seem like a hard drive? Yuri Gubanov Forensic investigation of SQLite databases has become extremely important. SQLite is everywhere: on desktops and ...
Digital Evidence Preservation and Monitoring of Social Networking Sites Julie Lewis According to Nielsen, internet users continue to spend more time with social media sites than ...
Security Awareness Ira Winkler N/A
A Vision for the Future of Analytical Detection Chris Calvert Chris will delve into the modern day challenge of detecting bad guys and explain some ...
Securing Application Development in 2015 Jerry Hoff Many companies lack formalized security activities before, during and after development. Other companies have made ...
Grow Up CISOs Eric W. Cowperthwaite Thank goodness I have met my PCI requirements and patched all those vulnerabilities with a ...
Panel: Women in Security Araceli Treu Gomes , Debbie Christofferson , Julie Cullivan , Lori Harmon , Jean Pawluk N/A
Panel: Best Practices for Strengthening Your Defenses Cynthia Marcotte Stamer , Bryn Mow , Peter Renner , Suedy Renner , Michelle "elle" Ross N/A
Never Fight a Land War in Cyberspace Marcus J. Ranum The idea that cyberspace is a new domain of warfare seems attractive but only if ...
What is a Breach? … Exploited Weaknesses within Your Infrastructure Jason Dablow Industry agnostic breaches have become the reality of the threat landscape. The bastions that we ...
Closing Remarks Richard Greenberg N/A
Training Session A: Secure Coding Boot Camp Jim Manico The major cause of web insecurity is insecure software development practices. Attendees will earn 8 ...
Training Session B: Information Security Management Boot Camp for IT Professionals Mikhael Felker , Edward Pagett In this Boot Camp, our expert team of information security instructors will cover such topics ...