ISSA-LA May 2020 Virtual Chapter Meeting
AppSec in the Time of Remote Working: A Panel Discussion Join us May 20, 2020, at 11:45am PST for a 90 minute virtual lunch conversation with our distinguished panel of […]
Information Systems Security Association Los Angeles
Los Angeles Chapter, Cybersecurity, InfoSec, CISO, Privacy, Risk
AppSec in the Time of Remote Working: A Panel Discussion Join us May 20, 2020, at 11:45am PST for a 90 minute virtual lunch conversation with our distinguished panel of […]
Panel Discussion: Working with the Board of Directors Board of Directors represent shareholders and stakeholders interests and ensure that the company's management acts on their behalf. However, how do we […]
Topic: Hack The Vote! One person, one vote… that’s what we keep telling ourselves, although let’s be honest that really isn’t how it works, at least in the US because […]
Topic: Those who do not learn history are doomed to repeat it. When frustrated we may ask ourselves "where are we going and why are we in this handbasket?", but […]
Panel: Inclusion Before Diversity For far too long, the conversation of diversity and inclusion has lacked definition. Many believe the terms are synonymous, but they are not. Diversity is simply […]
Join us as we welcome an old friend, Ira Winkler President of Secure Mentem, as he discusses key concepts from his new book, "You CAN Stop Stupid: Stopping Losses from […]
Hiring in the age of a pandemic from 3 different perspectives: agency recruiter, internal recruiter & hiring manager. Moderator: Kris Rides - CEO at Tiro Security Kris has been […]
You do not want to miss this important panel discussion on the new legal privacy rules passes in 2021. Are you prepared? California passed California Proposition 24, the California Privacy […]
It has certainly been a year filled with trials and tribulations! It will soon be over! Come join the Southern California Cybersecurity Community and say "Good Bye" and "Good Riddance" […]
We'll navigate through uncharted security territory by analyzing the attack lifecycle in the cloud and dissecting a real-world attack. The same technology that makes the cloud dynamic can have the […]