• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Information Systems Security Association Los Angeles

Los Angeles Chapter, Cybersecurity, InfoSec, CISO, Privacy, Risk

  • Home
  • About
    • About ISSA-LA
    • Our Mission
    • ISSA LA Bylaws
    • Board Members
    • Advisory Board Members
    • Contact Us
  • Events
    • Upcoming Events
    • Past Events
    • Event Archive
    • Speaker Guide
  • Security Tracks
    • Management
    • Privacy
    • Proactive
    • Reactive
    • Technical
  • Security Summits
    • Summit XII 2022
    • Summit XI 2019
    • Summit X 2018
  • Membership
  • Become a Sponsor
    • Become Monthly Meeting Sponsor
    • Become 2022 Summit Sponsor
  • Resources
    • Information Security Links
    • Keeping Kids and Families Safe Online

Privacy

January – Andy Kim

January 20, 2020 By Technology Director

January2020_SpeakerSlidesDownload

Topic: All Eyes On You: Cyber security in the Age of Innovation

Digital Transformation and Innovation are profoundly impacting the way businesses operate today. Time to market, speed, and agility are necessary requirements just to stay competitive in today’s marketplace. But, just as businesses are moving  fast into the future, cyber threats continue to multiply exponentially, challenging cyber security professionals and the businesses they support. What can cyber security professionals do given these seemingly incompatible objectives and how can they position the business for success? In this session, we’ll cover the reality of digital transformation, the impact of privacy, and the importance of the customer journey among many others topics that will position your cyber security program for success in 2020.

Speaker: Andy Kim, CISO eBusiness, Allstate

Andy is a strategic business partner to the C-Suite, implementing business vision within acceptable business risk. He is an avid technologist with the understanding that cyber security risks are fundamentally a human problem. A conclusion he has drawn from successfully implementing information security programs across heavily regulated industries including banking, investments, insurance, and healthcare for the past 18 years. Andy currently serves as the CISO for the digital brands and innovation businesses at Allstate. Andy helps insurance innovators deliver their capabilities in the cloud, while managing risk within acceptable tolerances.

Previously, Andy led the Risk Solutions group at Neustar. As Director, he supported multi-million dollar anti-fraud deals involving the internet and call center consumer channels for the top 10 financial institutions in the US. As a thought leader, he has been featured on American Banker http://pages.marketing.americanbanker.com/20180208_abp_neustar_ws_lp.html?source=client and has had published thought leadership blogs on identity and GDPR: https://www.risk.neustar/blog/authors/andy-kim

Before Neustar, Andy served as Director of Technology Risk Consulting Services at FIS (NYSE: FIS), in the Risk Information Security and Compliance business, which attained the #1 ranking in the Chartis RiskTech 100, where he was responsible for leading a team of subject matter experts that provided expert advisory and consulting services focusing on fraud, digital crime and cybersecurity to hundreds of financial services clients in the U.S.  He also led the design and product marketing of CyberForce, an innovative next generation fraud and cybersecurity anomalous activity detection solution in the U.S. and EMEA markets.  

Other positions include CISO of a large regional bank in Los Angeles, CISO supporting the CTO and CIO of a major US bank, CISO and HIPAA Security Officer at a pharmacy benefit management software company, Americas Security Officer of one of largest asset management firms, and Group IT Risk Officer to the third largest insurance company in the US.

Andy is highly regarded in the industry for his subject matter expertise and thought leadership and is a frequent speaker at industry conferences.  He also holds multiple certifications such as CGEIT, CISA, CISSP, CISM, ISSAP and ISSMP. 

Filed Under: Management, Monthly Meeting Speakers, Privacy

December – By Jaret Langston, Dale W. Callahan, and Joseph Popinski

December 15, 2019 By Technology Director

December19Download

Filed Under: ISSA Monthly Journal Articles, Privacy, Technical

November – Michael Gold

November 21, 2019 By Technology Director

Topic: California Consumer Privacy Act (CCPA)

MAG-CCPA-Slides-November-2019Download

The California Consumer Privacy Act of 2018 is the most comprehensive law of its kind ever enacted in the United States, setting forth rules for companies that buy, collect, transfer or sell consumers’ personal information. Because of the size and reach of the California economy – the 6th largest in the world – and the number of companies that may need to comply – estimated at about 500,000 worldwide – the CCPA is effectively a national, if not international, law. This program will address the salient features of the CCPA, who must comply, the new rights consumers have under the CCPA, legal exposures for violations, likely impacts of the law, and what companies should do to comply with the law.

Speaker: Michael Gold

Michael Gold is co-chair of JMBM’s Cybersecurity and Privacy Group and counsels businesses in a wide variety of matters, including data breach responses and investigations, crisis management, development of computer-based information retention systems, forensic investigations of computer systems, and computer and internet privacy matters.

Michael assists clients in developing and implementing information management and governance best practices and developing policies and compliance structures for protecting personal and company information. He counsels clients on information security and privacy law compliance issues; assists clients in developing policies and processes to comply with information security and privacy laws (including the E.U.’s General Data Protection Regulation, the California Consumer Privacy Act of 2018, and other state and industry-sectoral privacy laws in the U.S.); negotiates technology agreements relating to information security and privacy; and defends litigation and arbitrations, including class actions, arising from data breach and privacy claims.

Michael was named one of California’s “Top 20 Cyber – Artificial Intelligence Lawyers” by the Daily Journal (2018), one of the “Most Influential Lawyers: Digital Media and E-Commerce Law” by the Los Angeles Business Journal, and has been designated a “Top Rated Lawyer in Technology Law” by Martindale Hubbell. He is the author of the upcoming Bloomberg BNA portfolio Enterprise Cybersecurity Governance, and co-author of the Bloomberg BNA Portfolio Records Retention for Enterprise Knowledge Management.

Filed Under: Management, Monthly Meeting Speakers, Privacy, Proactive

August – Dr. Paulo Shakarian

September 4, 2019 By Technology Director

Topic: Artificial Intelligence Research for Forecasting Exploit Usage
Vulnerability disclosure rates are at an all-time high – averaging over 1,000 per month in 2019 – more than twice as much as in 2016. But while disclosure rates have remained at this high level, hackers still only exploit a small fraction ranging from 2%-3% by most studies. Ironically, the fact that exploited vulnerabilities make up such a small portion mean that this a particularly challenging machine learning problem. In this talk will review a series of peer-reviewed research papers that were produced under U.S. government grant funding that have investigated this problem. Through a combination of machine learning, graph theory, and data mining (from sources including social media, deepweb, open web, and Tor sites), these approaches provided promising results. These techniques leveraged an understanding of not only the content of hacker discussions, but also the underlying social structure of these communities as well as technical information about the vulnerabilities themselves. This, in-turn, enabled successful forecasting of exploits before they become available – providing a 20-fold improvement in terms of precision. This talk not only reviews the peer reviewed research, but also gives insight into how machine learning can be used to address cybersecurity problems and provides examples of exploit usage successfully predicted ahead of time.

Filed Under: Management, Monthly Meeting Speakers, Privacy, Proactive, Reactive, Technical

July – By Clara Andress and Jason Andress

July 7, 2019 By Technology Director

Filed Under: ISSA Monthly Journal Articles, Privacy, Technical

June – By Paige M. Boshell

July 7, 2019 By Technology Director

Filed Under: ISSA Monthly Journal Articles, Management, Privacy, Proactive

Primary Sidebar

Want to Get Notified of Future Events? Join Our Mailing List

Email Subscription

Follow ISSA LA

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Listen to ISSA-LA President Richard Greenberg Being Interviewed by Ron Burgundy (Will Ferrell)

Thanks to Our Educational Sponsor

ISSA Education Foundation

ISSA Los Angeles Follow

Information Systems Security Association Los Angeles Chapter

issala
issala ISSA Los Angeles @issala ·
23h

Come and network with your friends, make new friends TOMORROW! Join Adriana Sanford, J.D., Dual LL.M. presenting: The Changing and Fragmenting Global Privacy Landscape on Feb 8 @ 5:30 pm in Santa Monica!
Register here: https://issala.org/event/the-changing-and-fragmenting-global-privacy-landscape-restructuring-from-the-corporate-board-level-down-to-avoid-hefty-fines-and-possible-criminal-penalties/

Reply on Twitter 1623016268180905987 Retweet on Twitter 1623016268180905987 1 Like on Twitter 1623016268180905987 1 Twitter 1623016268180905987
issala ISSA Los Angeles @issala ·
2 Feb

Come and network with your friends, make new friends. Join Adriana Sanford, J.D., Dual LL.M. presenting: The Changing and Fragmenting Global Privacy Landscape on Feb 8 @ 5:30 pm in Santa Monica!
Register here: https://issala.org/event/the-changing-and-fragmenting-global-privacy-landscape-restructuring-from-the-corporate-board-level-down-to-avoid-hefty-fines-and-possible-criminal-penalties/

Reply on Twitter 1621193464749899776 Retweet on Twitter 1621193464749899776 6 Like on Twitter 1621193464749899776 4 Twitter 1621193464749899776
issala ISSA Los Angeles @issala ·
16 Jan

“They left the front, side, and back doors open.”—Zach Edwards, independent privacy and security researcher, referring to the LAPD and their use of a leaky app called SweepWizard in coordinating raids (Wired) https://www.wired.com/story/sweepwizard-police-raids-data-exposure/?utm_campaign=itb&utm_medium=newsletter&utm_source=morning_brew

Reply on Twitter 1615106785324539929 Retweet on Twitter 1615106785324539929 Like on Twitter 1615106785324539929 1 Twitter 1615106785324539929
issala ISSA Los Angeles @issala ·
14 Jan

How and when LastPass reported a breach that affected 33 million customers raises concerns about the limits and effectiveness of US notification laws. https://www.cyberscoop.com/lastpass-breach-notification-privacy/

Reply on Twitter 1614069086866079746 Retweet on Twitter 1614069086866079746 Like on Twitter 1614069086866079746 1 Twitter 1614069086866079746
issala ISSA Los Angeles @issala ·
13 Jan

Google Keyword-Search Warrants Questioned by Colorado Lawyers https://www.bloomberg.com/news/articles/2023-01-12/google-keyword-search-warrants-questioned-by-colorado-lawyers?mod=djemCybersecruityPro&tpl=cy

Reply on Twitter 1613989483027828737 Retweet on Twitter 1613989483027828737 Like on Twitter 1613989483027828737 1 Twitter 1613989483027828737
issala ISSA Los Angeles @issala ·
13 Jan

Tesla Returns as Pwn2Own Hacker Takeover Target https://www.securityweek.com/tesla-returns-pwn2own-hacker-takeover-target?mod=djemCybersecruityPro&tpl=cy

Reply on Twitter 1613929037407174657 Retweet on Twitter 1613929037407174657 Like on Twitter 1613929037407174657 1 Twitter 1613929037407174657
Load More

Website Sponsors

Harassment Free Environment

ISSA-LA is dedicated to providing a harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion, or political affiliation. We have a zero tolerance policy for harassment in any form. Violations by any registered attendee or participant at any ISSA-LA events may result in expulsion and possible ban from future ISSA-LA events.


© Copyright 2022 ISSA LA · All Rights Reserved · Privacy Policy · Terms of Use