ISSA-LA April 2021 Virtual Chapter Meeting

Breaches are Everywhere. What's a Good Security Leader to Do?  - Richard Greenberg, Advisor | CISO | CEO | Public Speaker | ISSA Distinguished Fellow and Honor Roll RSVP: https://www.eventbrite.com/e/issa-la-april-2021-monthly-virtual-meeting-tickets-133063874631 Breaches are on the news seemingly weekly, as organizations are struggling to secure their data. In this talk, Richard will share strategies to combat the […]

ISSA-LA Cinco De Mayo Happy Hour

Join us on May 5 @ 5:30 for a great networking with fellow Infosec and IT professionals. Celebrate the holiday with friends & your favorite drink. We will be using a new fun platform.

ISSA-LA and Vectra AI Blue Team Workshop

Sharpen your threat hunting skills and earn 3.5 CPE credits at this upcoming free, hands-on Blue Team training. Join your security peers to learn the skills and tactics attackers use to work their way into enterprises and gain insight into threat hunting techniques. Then put your new knowledge to the test in an interactive open […]

ISSA-LA May 2021 Meeting: The Future of Security Cloud Native and Cyber Canon

We have two talks in May:  The Future of Security Cloud Native and Resilience in Cybersecurity Careers - Finding the Best Books. RSVP: https://www.eventbrite.com/e/issa-la-may-2021-monthly-virtual-meeting-tickets-133063936817?aff=ebdssbonlinesearch The Future of Security Cloud Native Caroline Wong, Chief Strategy Officer at Cobalt, holds deep-rooted expertise in information security. She began her security career about 15 years ago, leading security teams […]

Cyberbit Ransomware Masterclass – Morning Session

Cyberbit Ransomware Master Class provides ISSA LA members with the unique opportunity to dive deep into attacker tactics in a comprehensive hands-on experience where we will slice and dice a Ransomware attack from the defender’s point of view in a hyper-realistic virtual SOC environment. Using Cyberbit’s Cyber Skills Development Platform, ISSA LA members will use […]

Cyberbit Ransomware Masterclass – Afternoon Session

Cyberbit Ransomware Master Class provides ISSA LA members with the unique opportunity to dive deep into attacker tactics in a comprehensive hands-on experience where we will slice and dice a Ransomware attack from the defender’s point of view in a hyper-realistic virtual SOC environment. Using Cyberbit’s Cyber Skills Development Platform, ISSA LA members will use […]

ISSA-LA June 2021 Mtg: Key API Governance Considerations for Digitization and Monetization

RSVP: https://www.eventbrite.com/e/issa-la-june-16-2021-monthly-virtual-meeting-tickets-133064007027   Key API Governance Considerations for Digitization and Monetization APIs have become basic building blocks for enterprises to offer various digital services. APIs not only allow enterprises to modernize their digital assets to create value chains, but they also offer various strategies to monetize their digital assets.  The focus of this session is […]

ISSA-LA July 2021 Know your Data Risks: Pragmatic Approaches to Automate Data Discovery & Classification via NextGen AI

80% of data collected today is Unstructured. Manual rule-based software platforms are expensive, error prone and require heavy maintenance. This event will provide Pragmatic Approaches to Data Discovery & Classification to reduce Data Risks.  How Deep Learning can provide automations to streamline your Data Privacy & Security Operations, allowing you to focus on your core business […]

Cyberbit Supply Chain Workshop – Morning Session

Cyberbit Supply Chain Workshop provides ISSA LA members with this unique hands-on opportunity. Cybercriminals often attempt to take advantage of trusted vendors to gain access to the internal network of a targeted organization. The most recent and most famous example is the SUNBURST attack, where an APT known as SolarStorm inserted malicious code in SolarWind’s […]

Cyberbit Supply Chain Workshop – Afternoon Session

Cyberbit Supply Chain Workshop provides ISSA LA members with this unique hands-on opportunity. Cybercriminals often attempt to take advantage of trusted vendors to gain access to the internal network of a targeted organization. The most recent and most famous example is the SUNBURST attack, where an APT known as SolarStorm inserted malicious code in SolarWind’s […]