• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Information Systems Security Association Los Angeles

Los Angeles Chapter, Cybersecurity, InfoSec, CISO, Privacy, Risk

  • Home
  • About
    • About ISSA-LA
    • Our Mission
    • ISSA LA Bylaws
    • Board Members
    • Advisory Board Members
    • Contact Us
  • Events
    • Upcoming Events
    • Past Events
    • Event Archive
    • Speaker Guide
  • Security Tracks
    • Management
    • Privacy
    • Proactive
    • Reactive
    • Technical
  • Security Summits
    • Summit XII 2022
    • Summit XI 2019
    • Summit X 2018
  • Membership
  • Become a Sponsor
    • Become Monthly Meeting Sponsor
    • Become 2022 Summit Sponsor
  • Resources
    • Information Security Links
    • Keeping Kids and Families Safe Online

Proactive

2023 January – What the FTX Scandal Reveals About Third Party Risk Evaluation – By Charles Cresson Wood

January 9, 2023 By Technology Director

feature0123Download

Filed Under: ISSA Monthly Journal Articles, Management, Proactive

2022 December – Know and Protect your typical SAP Attack Surface – By Christoph Nagy, SecurityBridge

December 20, 2022 By Technology Director

2022 December – Know and Protect your typical SAP attack surfaceDownload

Filed Under: ISSA Monthly Journal Articles, Management, Proactive

February – By Lori Cole and Kory Fear

February 18, 2020 By Technology Director

Offensive Cyber Operations Abroad – February20Download

Filed Under: ISSA Monthly Journal Articles, Management, Proactive

January – By Stephen Berk

January 20, 2020 By Technology Director

The 2019 NIST Risk Management Framework update incorporates a critical paradigm shift requiring greater C-suite involvement and oversight, bringing a formal preparation step to the process that permeates every level of the organization and requires that management drives assessment and authorization efforts going forward.

January20Download

Filed Under: ISSA Monthly Journal Articles, Management, Proactive

December – Neil Daswani

December 15, 2019 By Technology Director

Topic: The Biggest Breaches And What They Mean For The Future Of Cybersecurity Investment

This talk covers the key lessons learned and root causes from the biggest mega-breaches over the past several years, and analyzes their correlation to the over $45 billion invested in cybersecurity thus far. Based on hard data of over 4,000 cybersecurity companies that have been funded thus far, and what they have focused on to-date, some hypotheses on where future investment is required will be presented. Whether you’re interested in how your current company is positioned for the future of cybersecurity, considering a job change, or even potentially starting a cybersecurity company yourself, this talk will arm you with the information that you need about the security landscape, both on the business and technology fronts. Future trends in cybersecurity will also be discussed.

Speaker: Neil Daswani

Neil Daswani is currently an Executive-in Residence at Trinity Ventures, and is a Co-Director of the Stanford Advanced Security Certification Program. He has in the past served in a variety of research, development, teaching, and executive roles at Symantec, LifeLock, Twitter, Dasient, Google, NTT DoCoMo USA Labs, Yodlee, and Bellcore. Neil has been both a security entrepreneur having co-founded Dasient which was acquired by Twitter, and has also served as a Chief Information Security Officer at LifeLock and at Symantec’s Consumer Business Unit. His DNA is deeply rooted in security research and development, he has dozens of technical articles published in top academic and industry conferences (ACM, IEEE, USENIX, RSA, BlackHat, and OWASP), and he has been granted over a dozen U.S. patents. Neil is also co-author of “Foundations of Security: What Every Programmer Needs To Know” (http://tinyurl.com/33xs6g), He earned Ph.D. and M.S. degrees in Computer Science at Stanford University, and he holds a B.S. in Computer Science with honors with distinction from Columbia University.

Filed Under: Management, Monthly Meeting Speakers, Proactive

November – Michael Gold

November 21, 2019 By Technology Director

Topic: California Consumer Privacy Act (CCPA)

MAG-CCPA-Slides-November-2019Download

The California Consumer Privacy Act of 2018 is the most comprehensive law of its kind ever enacted in the United States, setting forth rules for companies that buy, collect, transfer or sell consumers’ personal information. Because of the size and reach of the California economy – the 6th largest in the world – and the number of companies that may need to comply – estimated at about 500,000 worldwide – the CCPA is effectively a national, if not international, law. This program will address the salient features of the CCPA, who must comply, the new rights consumers have under the CCPA, legal exposures for violations, likely impacts of the law, and what companies should do to comply with the law.

Speaker: Michael Gold

Michael Gold is co-chair of JMBM’s Cybersecurity and Privacy Group and counsels businesses in a wide variety of matters, including data breach responses and investigations, crisis management, development of computer-based information retention systems, forensic investigations of computer systems, and computer and internet privacy matters.

Michael assists clients in developing and implementing information management and governance best practices and developing policies and compliance structures for protecting personal and company information. He counsels clients on information security and privacy law compliance issues; assists clients in developing policies and processes to comply with information security and privacy laws (including the E.U.’s General Data Protection Regulation, the California Consumer Privacy Act of 2018, and other state and industry-sectoral privacy laws in the U.S.); negotiates technology agreements relating to information security and privacy; and defends litigation and arbitrations, including class actions, arising from data breach and privacy claims.

Michael was named one of California’s “Top 20 Cyber – Artificial Intelligence Lawyers” by the Daily Journal (2018), one of the “Most Influential Lawyers: Digital Media and E-Commerce Law” by the Los Angeles Business Journal, and has been designated a “Top Rated Lawyer in Technology Law” by Martindale Hubbell. He is the author of the upcoming Bloomberg BNA portfolio Enterprise Cybersecurity Governance, and co-author of the Bloomberg BNA Portfolio Records Retention for Enterprise Knowledge Management.

Filed Under: Management, Monthly Meeting Speakers, Privacy, Proactive

November – By Tony Rice

November 19, 2019 By Technology Director

Secure DevOps Before DevSecOps

November19Download

Filed Under: ISSA Monthly Journal Articles, Proactive, Technical

October – By Kevin A. Sesock

October 8, 2019 By Technology Director

Immaturity & Moral Hazard in the Cyber Insurance Market

October19Download

Filed Under: ISSA Monthly Journal Articles, Management, Proactive, Reactive

October – Art Poghosyan

October 8, 2019 By Technology Director

Topic: Closing the Cloud Security Gap with Privileged Access GovernanceDownload

Privileged access has been one of the most complex issues organizations have had to address. Breaches of privileged access can have profound impact on IT infrastructure, expose large volumes of confidential data and cause devastating consequences for the business. The rapid evolution of the public cloud technologies in the past few years has introduced even more complexity and has challenged the existing methods and tools for securing privileged access. As a result, we are witnessing an exponential increase in cloud access breaches that leave terabytes of confidential data exposed and cost businesses billions of dollars every year.
In this talk, we will review key examples of how the growing public cloud ecosystems have re-defined privileged access security requirements which, in turn, created the need for new and innovative approaches to securing privileged access. We will also review the best practices for cloud privileged access governance that are already emerging and are being adopted by the industry leading organizations. We will conclude with recommendations for security professionals to help identify their cloud privileged access exposures and define a methodical approach for addressing this critical risk in their environments.

Speaker: Art Poghosyan
Art has spent nearly two decades of his professional career in Information Security. The first 8 years of his career Art spent at Big 4 firms, serving global enterprises across many industries. In 2010, Art co-founded Advancive, a market leading brand for Identity & Access Management (IAM) consulting and solutions implementation. Art led the company’s exponential growth and eventual acquisition by Optiv Security in 2016. At Optiv, Art built and launched Optiv’s first managed IAM service offering focused on Privileged Access Management (PAM). In 2018, Art left Optiv to start his next business venture, Britive, where he is serving as the CEO. Art is a frequent industry contributor, recognized for sponsorships and speaking engagements at events such as Identiverse, RSA Charge, ISSA LA Summit, and ISACA Orange County conference. He is a regular volunteer and contributor at (ISC)2 CISSP and ISSAP certification exam development workshops.

Filed Under: Monthly Meeting Speakers, Proactive, Technical

September – Neela Jacques

September 21, 2019 By Technology Director

Topic: Sophisticated Spear Phishing
96% of attacks start with an Email. This session, Neela will focus on understanding the types of attacks you are likely receiving and the various ways you can protect your organization. A specific area of focus will be the rise in sophisticated Spear Phishing and the way we now have to rely on Machine Learning and Artificial intelligence to stay ahead of the hackers.

Speaker: Neela Jacques
Neela Jacques joined Barracuda Networks in 2018, bringing more than 20 years’ experience of bringing innovative enterprise software products to market. Neela has global responsibility for all aspects of Go-to-Market for Barracuda’s complete portfolio of award-winning, cloud enabled security products. Prior to Barracuda, Neela was Executive Director of the OpenDaylight project and VP at the Linux Foundation. There, Neela led a community of thousands of developers around the world to drive innovations in SDN and NFV with a developer-driven open source platform. He oversaw and provided guidance for all aspects of the project, from governance and technology to community and marketing. Prior to that, Neela was part of the core VMware team that took virtualization from a niche development and testing product to ubiquitous use. He developed and took to market the company’s Software-Defined Data Center (SDDC) vision and strategy. Neela also founded and launched VMware’s first cloud computing initiative in 2007.

Filed Under: Management, Monthly Meeting Speakers, Proactive, Technical

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

Want to Get Notified of Future Events? Join Our Mailing List

Email Subscription

Follow ISSA LA

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Listen to ISSA-LA President Richard Greenberg Being Interviewed by Ron Burgundy (Will Ferrell)

Thanks to Our Educational Sponsor

ISSA Education Foundation

ISSA Los Angeles Follow

Information Systems Security Association Los Angeles Chapter

issala
issala ISSA Los Angeles @issala ·
19h

Come and network with your friends, make new friends TOMORROW! Join Adriana Sanford, J.D., Dual LL.M. presenting: The Changing and Fragmenting Global Privacy Landscape on Feb 8 @ 5:30 pm in Santa Monica!
Register here: https://issala.org/event/the-changing-and-fragmenting-global-privacy-landscape-restructuring-from-the-corporate-board-level-down-to-avoid-hefty-fines-and-possible-criminal-penalties/

Reply on Twitter 1623016268180905987 Retweet on Twitter 1623016268180905987 1 Like on Twitter 1623016268180905987 1 Twitter 1623016268180905987
issala ISSA Los Angeles @issala ·
2 Feb

Come and network with your friends, make new friends. Join Adriana Sanford, J.D., Dual LL.M. presenting: The Changing and Fragmenting Global Privacy Landscape on Feb 8 @ 5:30 pm in Santa Monica!
Register here: https://issala.org/event/the-changing-and-fragmenting-global-privacy-landscape-restructuring-from-the-corporate-board-level-down-to-avoid-hefty-fines-and-possible-criminal-penalties/

Reply on Twitter 1621193464749899776 Retweet on Twitter 1621193464749899776 6 Like on Twitter 1621193464749899776 4 Twitter 1621193464749899776
issala ISSA Los Angeles @issala ·
16 Jan

“They left the front, side, and back doors open.”—Zach Edwards, independent privacy and security researcher, referring to the LAPD and their use of a leaky app called SweepWizard in coordinating raids (Wired) https://www.wired.com/story/sweepwizard-police-raids-data-exposure/?utm_campaign=itb&utm_medium=newsletter&utm_source=morning_brew

Reply on Twitter 1615106785324539929 Retweet on Twitter 1615106785324539929 Like on Twitter 1615106785324539929 1 Twitter 1615106785324539929
issala ISSA Los Angeles @issala ·
14 Jan

How and when LastPass reported a breach that affected 33 million customers raises concerns about the limits and effectiveness of US notification laws. https://www.cyberscoop.com/lastpass-breach-notification-privacy/

Reply on Twitter 1614069086866079746 Retweet on Twitter 1614069086866079746 Like on Twitter 1614069086866079746 1 Twitter 1614069086866079746
issala ISSA Los Angeles @issala ·
13 Jan

Google Keyword-Search Warrants Questioned by Colorado Lawyers https://www.bloomberg.com/news/articles/2023-01-12/google-keyword-search-warrants-questioned-by-colorado-lawyers?mod=djemCybersecruityPro&tpl=cy

Reply on Twitter 1613989483027828737 Retweet on Twitter 1613989483027828737 Like on Twitter 1613989483027828737 1 Twitter 1613989483027828737
issala ISSA Los Angeles @issala ·
13 Jan

Tesla Returns as Pwn2Own Hacker Takeover Target https://www.securityweek.com/tesla-returns-pwn2own-hacker-takeover-target?mod=djemCybersecruityPro&tpl=cy

Reply on Twitter 1613929037407174657 Retweet on Twitter 1613929037407174657 Like on Twitter 1613929037407174657 1 Twitter 1613929037407174657
Load More

Website Sponsors

Harassment Free Environment

ISSA-LA is dedicated to providing a harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion, or political affiliation. We have a zero tolerance policy for harassment in any form. Violations by any registered attendee or participant at any ISSA-LA events may result in expulsion and possible ban from future ISSA-LA events.


© Copyright 2022 ISSA LA · All Rights Reserved · Privacy Policy · Terms of Use