Pittsburgh Chapter

issa_pittsburgh_chapter

2017 Presentations

Paul Griggs, Assessment and Compliance Services Manager for Cadre Information Security, Security Forum presentation Pen Testing: Do’s and Don’ts

John Pollack Senior Sales Engineer for Gigamon, Security Forum presentation You can’t secure what you can’t see; key elements of an effective security visibility platform

Amy Baker, Vice President of Marketing at Wombat Security Technologies, Security Forum presentation State of the Phish 2017: Understanding End User Behaviors towards Phishing

Terry Ray, Chief Product Strategist, Imperva, Security Forum presentation Defend Against the Data Miner

Joe Mitchell, Senior Systems Engineer, BitSight, Security Forum presentation Getting Started - Managing Third Party Cyber Risk

Joe Wynn, President / Principal Consultant, Wynnsecure LLC presentation Implementing Security Management Framework: Improving Your Security Program

Dave Reis, Counsel with Clark Hill PLC, presentation Information Security Law Update

Will Morton, Sales Engineer with Gemalto, presentation Authentication Technology…think of it as Authentication 101

Thomas Pace, Technical Lead at Cylance, presentation Why Math is cool for cyber and why AI is needed to stay ahead of the cyber curve

Charles Wood, Professor at Duquesne University, presentation Steganography

Amy Baker, Vice President of Marketing at Wombat Security Technologies, presentation The Top 8 Security Risks Beyond the Phish

Dave Demase, presentation SMAC and Cloud Security

Ken Dickey, AVP – Business Development, Cadre Information Security, presentation Mapping the Future of the Dynamic Exchange of Cyber Threat Intelligence

Gary Johnson, of ISM, presentation The Value of Informed Cyber Risk Management

Mark Villinski, of Kaspersky, presentation Ramsomware: All Locked Upped and No Place to Go

2016 Presentations

Mark Villinski, Kaspersky Lab, presentation Unlock the Key to Repel Ransomware

Benjamin D. Brooks, of Secure State, for his presentation Simple Steps to Make Your Audit(s) Less Painful

Amy Baker, VP of Marketing, Wombat Security Technologies, Inc., for his presentation State of the Phish: Effectively Reducing Phishing and Malware Infections

Gary Johnson, CISSP, CISA, Director, Cyber Solution Engineering and Services ISM, for his presentation Safeguarding Corporate Data

Tom Ellis, Senior Security Engineer, Cadre Information Security, for his presentation Building The Proper CSIRT

Jeff Johnson, Blue Coat, for his presentation Securing Applications and Services

Jeff Johnson, Blue Coat, for his presentation Securing the Cloud Generation Environment

David G. Ries, Clark Hill, for his presentation Information Security Law Update 2016

2015 Presentations

Paul Robinson, of Brite Computers, for his presentation, Constructing a Security Minded Company Culture

Brett Creasy, Vice-President and Director of Digital Forensics at bit-x-bit, LLC, for his presentation Computer Forensics: An Intro toTrade Secret Theft Forensics

Mark Nafe – SE Manager Midwest/Canada & Laura Buchanan – AE Midwest, of CyberArk, for their presentation Targeted Attacks and the Privileged Pivot

Ann McIver McHoes, of McHoes & Associates, for her presentation Crafting Effective Security Messages for the C-Suite

Ryan Voloch, for his presentation Simplified SIEM Use Case Management. Example SIEM Use Case Database

Ken Smith, of Secure State, for his presentation The Anatomy of an Attack: Thinking Like an Attacker

Joe Ferrara, President and CEO, Wombat Security Technologies, for his presentation Quantifiable Cyber Risk Reduction through Changing End User Behaviors

Tom Ellis , Senior Security Engineer, Cadre Information Security, for his presentation Virtualizing threat detection

MacKenzie Mizenko & Anthony Catalano , of Secure State, for their presentation Top 5 Security Trends for 2015

Dave Ries, of Clark Hill, for his presentation Information Security Law Update 2015

Amy Baker, VP of Marketing, Wombat Security Technologies, Inc., for her presentation 5 Reasons Why Your Security Education Program isn’t Working (and how to fix it)

Doug Manger, Senior Security Engineer, Fortinet, for his presentation Creating an Advanced Threat Protection Framework


2014 Presentations

Josh Hogle, Senior Security Strategist and Solutions Architect, Imperva, for his presentation Compromised Insiders 101

Tom Ellis, Senior Security Engineer, Cadre Information Security, for his presentation Intrusion Prevention

Kevin Flanagan, CISSP, CISA Director, North American Technical Consulting RSA, The Security Division of EMC, for his presentation Intelligence Driven Security and the Top 15 IoCs

Ken Swain, of Sophos, for his presentation Today's Threat Landscape

Ken Smith, of Secure Site, for his presentation ISSA Mobile Security

David G. Ries, of Clark Hill | Thorp Reed, for his presentation Information Security Law Update 2014

Neil Roxburgh, of Imperva, for his presentation CMS Hacking 101


2012-2013 Presentations

Shane Harsch, Senior Solutions Principal of RSA, for his presentation Next Generation Security Operations

Matt Neely and Brett Kimmell, from SecureState, ISSA Security Forum 2013 presentation Cash is King: Who's Wearing your Crown?"

Joe Ferrara, President and CEO from Wombat Security Technologies, Inc., for his presentation Social Engineering & How to Counteract Advanced Attacks

Adam Hogan, SE from Sourcefire, for his presentation Taking Control of Advanced Threats

Mike Betti, SE for Tripwire on his presentation Security Configuration Management – One Of Your Most Critical Security Controls

Andrea Swaney, Regional Sales Director - East MokaFive, presentation BYO 'WORST' Practices: How to #fail at BYO

Bernd Leger, Vice President of Marketing for Rapid7, presentation on Speed with Control – How to speed up your BYOD without skidding off the track

Robert Eggebrecht - President and CEO, of BEW Global, October presentation Optimize Your Data Loss Prevention & Email & Web Gateway Investment for Bottom Line Result


2011-2012 Presentations

Judi Ellis, Dollar Bank, December presentation Regulatory Compliance and You

Dave Ries, of Thorp Reed & Armstrong, March presentation Information Security Law Update 2012

Brandon Kinght, of SecureState' April presentation Attacking and Defending Apple iOS Devices in the Enterprise


2010-2011 Presentations

Dan Molina, of Kaspersky, September presentation Seven Things Your IT Department is Doing to Enable Cybercrime

Anthony Vicinelly, of Application Security Inc., October presentation Anatomy of a Data Base Attack

Jason Hong, Wombat Security, February presentation Teaching Johnny Not to Fall for Phish

Dave Ries, of Thorp Reed & Armstrong, March presentation Information Security Law Update 2011


2009-2010 Presentations

Gary Mullen, of Kaspersky, February presentation Scareware

Dave Ries's March meeting presentation Information Security LawUpdate 2010

Matt Neely, of SecureState, May meeting presentation on Using Free Tools to Test Web Applications


2008-2009 Presentations

Dave Ries's March meeting presentation Current Issues in Information Security Law

Ryan Olson's April meeting presention Current Trends and Future Cyber Security Disruptors

Matt Neeley's May meeting presentation Assessing Wireless Security Using Open Source Tools

2007-2008 Presentations

September's presentation by Robert Perciaccante, of Cisco " The Evolution of Defense in Depth".

October's presentation by Terence Spies, of Voltage Security Inc. " Encryption and Key Management - falling through the cracks".

January's presentation by Sasha Romanosky "Do Data Breach Disclosure Laws Reduce Identity Theft?"


2006-2007 Presentations

April's presenation by S.S.A. Bill Shore on Handling of Digital Evidence

March's presentation by David Ries Esq., of Thorp Reed and Armstron, LLP on Security Breaches and Security Law

January's presentation by Sasha Romanosky on Managing and Auditing IT Vulnerabilities

November's presentation by Steve Moscarelli and Asim Ahmed, of Port Authority Technologies on Information Leak Prevention

October's presentation by Paul Green, of G2, on Security Automation.

September's presentation by Buck Watia, of VeriSign, on "Recent Security Trends and Mitigation Tactics in Today’s Vulnerability and Threat Environment "


2005-2006 Presentations

April's presentation by Chris Ries, of VigilantMinds, on Windows Rootkits

March's presentation by Carl Herberger, of SunGard Security, on Turning Your Information Security Program into a Competitive Advantage

Feburary's meeting meeting Sasha Romanosky's presentation on Common Vulnerability Scoring System (CVSS) To get a copy of the CVSS blank score card

October's meeting Matt Tolbert's, of the University of Pittsburgh, PowerPoint presentation on Intrusion Detection and Incident Response in a Large IT Environment