ISSA 2019 May 14, 2019 to May 17, 2019, Prior Lake, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Richard Greenberg N/A
Keynote: #YOLO: Solving Authentication In The Age of Cloud Wendy Nather In today’s environment, people can be anywhere, using any device, accessing applications both in the ...
Law Enforcement Panel Samuel (brian) Whitman , Ryan White , Tracy Maryman The law enforcement panel consists of investigators and prosecutors whose day-to-day work involves apprehending cyber ...
Data Protection in the Public Cloud—a look at the Good, the Bad, and the Ugly Kenneth G. Hartman Customers want to ensure that they can entrust their sensitive data to public cloud providers. ...
The OWASP Top Ten Proactive Controls 2018 Jim Manico Software developers are the foundation of any application. In order to achieve secure software, developers ...
Recent Data Breach Investigations and Attack Trends Wendi Whitmore This session will share insight from recent data breach investigations and attack trends. Wendi willshare ...
Deception as a Defense: Confuse and Frustrate the Hackers Kevin Cardwell No product will make us secure, estimates are $80 Billion was spent in 2017 on ...
Enumerating the Enterprise Attack Surface Dan Cornell Many organizations have only a passing understanding of the scope of their application portfolios and ...
Solving Cybersecurity Problems with NIST Harry Merritt You may already be familiar with the National Institute of Standards and Technology (NIST) for ...
Law Enforcement Panel: LA County DA, Sheriff, and FBI Marc Beaart , Senior Investigator Mcnary , Sergeant Hish , John C. Weller The law enforcement panel consists of investigators and prosecutors whose day-to-day work involves apprehending cyber ...
Benchmarks and Cost Analysis of Cloud-Based Password Cracking Joe Luna And you may find yourself in control of a large database; in another part of ...
Lightning Talk - Exploiting Email Security Gary Landau Phishing attacks are one of the most prevalent sources of malware affecting organizations. Many reputable ...
Lightning talk: Hacking the Human Lisa Jiggetts Social Engineering (SE), aka Human Hacking can provide attack vectors against organizations and individuals alike. ...
Symantec Lunchtime Spotlight Talk: 2019 Internet Security Threat Report (ISTR): The New Threat Landscape Brian Brotschi Join Symantec for a discussion on the key findings from Symantec’s Annual Internet Security Threat ...
Why Companies Fail PCI DSS Assessments and What to Do About It Miguel O. Villegas Having performed hundreds of PCI DSS assessments as a PCI QSA (Qualified Security Assessor) and ...
From Cloud to Containers – Enhancing security practices to accommodate dynamic models Cassio Goldschmidt Securing the modern attack surface is a critical challenge. Whether it’s managing short-lived assets, assessing ...
Shifting Left: Flat Earth Theory for Software Security Jack Mannino Spoiler: The Earth is round, and the way we build infrastructure and software has fundamentally ...
Attacks on Critical Infrastructure Networks as a Component of Economic Warfare Galina Antova This talk will explore how, in the event of conflict escalation between the US and ...
Blockchain of Evidence, Let the Evidence Speak for Itself Jeff Neithercutt The US Criminal Justice system has lost the Public Trust over the last few decades ...
How Does Your Risk Management Stack Up? John Kronick This session will look at what a good risk program should cover in order to ...
Why a Manual Code Review Might Be One of the Best Investment You Can Make David Caissy Of all the topics related to application security, manual code review is probably one of ...
21st Century Security: The Human Factor Jacqueline Nelms Background:The 21st Century firewall isn’t technology...it’s people. Given that 95 percent of all security incidents ...
Liam O'Murchu Want Home? We've all seen the ads for work-from-home schemes often accompanied by a picture of a ...
Mikhael Felker N/a Public companies are required to disclose business risks before IPO and in their annual disclosures. ...
Security From the Code to the Road – Technical and Strategic Issues for Connected Vehicles Aaron Guzman With the rate of bleeding edge technology rising in the Automotive industry, vehicles are becoming ...
"No, but..." Still Doesn't Work: Security Leaders must become Business Leaders Marnie Wilking Many security professionals have chosen to evolve from "No" to "No, but..." Business partners still ...
Closing Keynote Jackie Hassett N/A
Closing Remarks Richard Greenberg N/A
Welcome Address Richard Greenberg N/A
Keynote: Opening Chenxi Wang N/A
HHS OCR HIPAA Assessments Yun-kyung (peggy) Lee Hear the latest important strategies for HIPAA enforcement from the Deputy Regional Manager at US ...
The Universe, Enterprise Risk Management and Cyber Insurance Howard Miller This ambitious presentation covers thoughts on the nature of the universe related to physics, music ...
Vulnerability Landscape 2019 – What Keeps Tripping Us Up Rahim Jina With the increasing spend in security budgets and the apparent increasing frequency of data breaches, ...
Incident Response and Forensics in Container Land Chenxi Wang , Andrea Hoy , Jessica Wilson , Katie Curran Join us as we have a conversation about digital forensics and incident response in container ...
Healthcare CISO Panel Richard Greenberg , Doug Murray , John Kronick , Stan Banash , Todd Felker What are CISOs in Healthcare worried about as their heads hit the pillow each night? ...
Beyond the Looking Glass - The integration of DevSecOps, Security Forecasting, and Artificial Intelligence Jimmy Sanders Machine learning, Artificial Intelligence, and automation are the security buzzwords of our era. However, there ...
Rogue Device Mitigation Yossi Appleboum While the industry is focused almost entirely on software protection against cyber-attacks, one of the ...
Transforming Cybersecurity in the Age of Chaos and Automation Haiyan Song It isn’t a surprise to many of us just how much data is being generated ...
ONC Releases Proposed Rule to Support Seamless and Secure Access to, Exchange of, and Use of Electronic Health Information (EHI) Cynthia Rossin The U.S. Department of Health and Human Services’ (HHS) Office of the National Coordinator for ...
Left of Boom Brian Contos The term “Left of Boom” was made popular in 2007 in reference to the U.S. ...
Continuous Security for DevOps Velocity Justin Collins The security industry initially reacted to the “DevOps” movement with dismay: developers deploying code themselves? ...
Paying It Forward: Cultivating a New Cybersecurity Workforce Wendy Nather , Jennifer Steffens , Galina Antova , Marian Merritt Women and minorities constitute half of technology users, making it only natural for current cybersecurity ...
AWS: The Netflix Layered Approach Travis Mcpeak Building a secure system is like constructing a good pizza – each individual layer adds ...
10 Lessons from the last 10 years of Incident Response; Protecting Your Network from Modern Threats Pierson Clair Research suggests that cyber crime will cost businesses over $2 trillion in 2019 and the ...
Information Security for the Traveling Executive ('Road Warrior') Roy Wilkinson Keeping data safe while outside the office is significantly harder than data secured inside your ...
Privacy in 2019 Tanya Forsheit This session will explore the rapidly evolving privacy legal landscape in the US in 2019, ...
Medical Device Security Tipping Point Adam Brand Are we close to the tipping point of an acceleration in medical device security? We ...
Making Sense of the California Consumer Privacy Act Brandon Reilly The California Consumer Privacy Act (CCPA) is the broadest and most comprehensive privacy and data ...
Peel Back the Layers of Your Enterprise Using Free and Open Source Software Doug Burks To catch modern adversaries, we need comprehensive network and host telemetry, which may be costly ...
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals Marci Mccarthy It is important for young professionals to know they can have successful and impactful careers ...
Keynote: All These Vulnerabilities, Rarely Matter Jeremiah Grossman There is a serious misalignment of interests between Application Security vulnerability assessment vendors and their ...