#ISSAConf
Join us October 17 - 18, 2018 at the Georgia World Congress Center in Atlanta for solution oriented, proactive and innovative sessions focused on Securing Tomorrow Today.
Every day, cyber threats become increasingly intricate and difficult to detect. No cyber security professional can become an expert on these dangers without continued efforts to educate themselves on the industry’s latest trends and technologies.
We look forward to welcoming you and over 1,000 of your colleagues and peers in Atlanta as we discuss topics ranging from incident response, to emerging technologies, to business skills for the information security professional. Join us at the 2018 ISSA International Conference and we’ll help you prepare to Secure Tomorrow Today.
Get to know some of the people who will be speaking at the 2018 ISSA International Conference (co-located with Cyber Security Atlanta).
The Chapter Leader’s Summit is open to all ISSA Chapter Board Members, Chapter Officers & Chapter Management Team Members of record at the time of registration.
Click on the link to register for the Chapter Leader's Summit.
Join us to say hello to old friends and meet new ones as we kick off the 2018 ISSA International Conference. Get your first glimpse into two days of the solution oriented, proactive and innovative sessions focused on Securing Tomorrow Today.
Click on the link to register for the Welcome Reception.
Join us for the ISSA Awards Dinner to celebrate our 2018 award receipients. It’s a perfect opportunity for networking and supporting the individuals who have made a positive impact on the Information/CyberSecurity community.
Click on the link to register for the Awards Dinner.
Please join us for the ISSA Party @ World of Coca-Cola as we close out another successful ISSA International Conference. This informal meet and greet at the iconic World of Coca-Cola is sure to be an enjoyable event to visit with everyone you have met over the past few days. Don’t miss out on your final opportunity to share the experiences you have gained at the 8th annual ISSA International Conference with all the connections you have made!
Click on the link to register for the ISSA Party @ World of Coca-Cola
Economic warfare has been practiced since almost the beginning of time through various means including blockades, trade embargoes, and freezing capital assets. The Foundation for the Defense of Democracies has defined a new kind of warfare termed Cyber-Enabled Economic Warfare (CEEW).
This panel showcases women in security and contributions to technology and innovation. We demonstrate diverse segments of the field, opportunities, and talents and skills required for future success.
Moderator: Debbie Christofferson, Information Security Consultant
Panelists: Mary Ann Davidson, Oracle, CSO; Anne Marie Colombo, Cyber Security, SAP NA CIO Office; Dr. Curtis Campbell, VP, Manager of IT Procurement and Vendor Management, Atlantic Capital Bank
The role of the Chief Security Officer has continued to evolve in complexity, but also in terms of its importance to the creation of business value.
Not too long ago, not implementing good security was just that. Sure, it may have led to the theft of your identity and ruined your credit, but today we are entering into a new world – that of the IoT (Internet of Things).
Panelists: Sandy Carielli, Director of Security Technologies at Entrust Datacard; Loren Roberts, Sr Security Advisor at HP WW Security Practice; Kathy Fithen, Managing Principal Consultant at SecureWorks Security & Risk Consulting team
An overview of the foundational nature of data security, highlight the major tenets or goals of data security, introduce the risk equation, discuss how and why so many companies so often fail at implementing the basics of data security, and explore some ways that a DoD-centric approach to data security might be implemented in the private sector.
Although technical skills are of the utmost importance, this session will help information security professionals pair their brain power with brand power to build relationships more authentically and create the credibility they need to excel.
The role of the Chief Information Security Officer has evolved significantly over the last decade. According to the 2017 State of Cyber Security study, the percentage of organizations with a CISO increased from 50% to 65% between 2016 and 2017.
Moderator: Marci McCarthy, CEO and President at T.E.N Panelists: Michelle Stewart, CISO at RentPath; Tamika Bass, Vladimir Svidesskis
Colonel Gelhardt is a retired Army Officer and war veteran. While in the Army Colonel Gelhardt was nominated and selected to work at the White House as the Chief Information Officer (CIO) equivalent for the Clinton White House from 1995 through 1999.
In this session, the presenter unveils a potential security disaster waiting to happen, its importance to the future of security for all businesses, and how even small and large organizations can work together to find cost-effective solutions to establishing critical security controls.
2018 is shaping up to be the year of watershed moments in data privacy regulations throughout the world. year of watershed moments in data privacy regulations throughout the world.
In this session, learn how to navigate through complex regulatory environments and enhance policies that adapt to this ever-changing technology footprint.
Instead of chasing the cloud, this talk highlights the practical tools and strategies for red and blue teams to leverage the cloud.
Compliance regulations can be challenging to understand and implement. Many of these regulations have cybersecurity requirements that are focused on protecting critical infrastructure with aggressive timelines - and without disrupting the very business-critical systems you're trying to protect.
Aligning security risk management and compliance activities with the broader adoption of cloud technology and the exponential increase in the complexity of smart systems leveraging such cloud solutions, has been a challenging task to date. This bridges the gap between antiquated approaches to IT compliance and innovative technology solutions.
Moderator: Michaela Iorga, NIST, Senior Security Technical Lead for Cloud Computing; Co-chair of NIST Security and Forensics Working Groups
Panelists: Andrew Weiss, Docker, Lead Federal Solutions Engineer; David Waltermire, NIST, Lead, Standards and Outreach for the Security Automation Program; Brian Ruf, FedRAMP on the OSCAL Development Team
Join GreyCastle Security as we explore the lopsided, unending tournament we call cybersecurity and strategies to win on defense.
You’ll learn how Orion Health not only successfully implemented DevSecOps into solution delivery, but leveraged that success to achieve industry certification, and much more.
In this intensive session, participants will learn the approach to turning governance activities from a hygiene directive into a process of improving the overall health and strength of an organization.
Do you use third parties in your business? How do you trust but verify their security practices? Enter the world of third party audit reports (which is more like a bowl of Alphabet Soup).
This talk will present practical learnings from 6 years of research, using machines to correlate application vulnerabilities and threats; from low level packet drops and vulnerability scan results, to high level APT campaigns lasting months and targeting multiple attack surfaces.
This session will help the audience become better choice architects, designing choices in a way that take advantage of users automatic brains, thus making better and safer choices for the organization.
New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and skills shortage. Traditional security controls and response can’t possibly keep pace.
With a crushing shortage of skilled cybersecurity defenders, many CISOs have turned toward analytics in an attempt to leverage scarce resources more effectively. While this has been largely successful in detecting attacks, this approach is too slow to help mitigate the worst of the damage caused by a fast-moving threat.
Enterprises are moving more workloads to the cloud every day. While this helps speed and agility, what happens when there is an incident? How do you run your incident response process in an environment that you don’t own?
Moderator: Alex Wood
Panelists: Cameron Williams, CTO at OverWatchID; Ricardo Johnson, Sr. Director of Security, Risk and Compliance at CrowdStrike Inc; Brandon Levene; Don Walsh, Director of North American channel sales at Skybox Security
The goal of this presentation is to make IT and Security professionals aware of newly identified techniques used to get high click rates during phishing campaigns. The talk will introduce new research conducted using typosquatting, doppelganger domains, and IDN homograph attacks.
Cyber Incident is a business issue, not just a security issue. To combat this danger, you need to create a security culture for your organization, and that starts with a comprehensive plan of preparedness. To help your firm survive, the cyber range gives your team the tools they need through a completely immersive security experience that tests skills, process and leadership competence.
NSA addresses cybersecurity issues from both a defensive and offensive perspective. NSA’s Cybersecurity Operations Center (NCTOC) has one of the largest 24*7*365 footprints across the US Government as they defend over 3 million Department of Defense users across the globe.
Attendees will leave this session with new ideas that can immediately be applied to their password cracking needs ranging from recovery of password-protected documents needed for forensics, incident response, law enforcement, and legal cases to improving password compliance in large organizations.
In this presentation, we’ll discuss the different types of machines identities and where they proliferate in your network. You’ll see the role and lifecycle of machine identities, and where we’re falling short in protecting them.
In this presentation we’ll explore the anatomy of these attacks and categorize these threats to develop an updated defense-in-depth strategy for the evolving IoT wireless threat landscape.
The breadth of IoT technology is only going to continue to expand, so how do we protect all those endpoints? Most companies invest millions in protecting laptops, servers and creating a robust perimeter, and often times overlook the importance of locking down their endpoint infrastructure.
Learn how a workforce solutions provider fell prey to a debit card database attack and a healthcare provider foiled SamSam ransomware. Walkthroughs of investigations of real incidents show how the new category of Network Traffic Analysis (NTA) tools introduce new visibility and immediate detection of East-West attacks and unusual behaviors
Earlier this year an assessment was requested and conducted on a company because they could not find a rogue device on their network. The assessment was halted and a meeting ensued between HR, Legal and the assessment team. It was suggested by the team that the organization update their BYOD policy.
Moderator: Dr. Shawn Murray, Principal Scientist at the US Missile Defense Agency and is a Director on the International Board for ISSA International
Panelists: Tal Guest, Principal Product Manager at Bomgar; Larry Homuth, Director of Sales for SecurityIQ; Juan Asenjo, Ph.D., CISSP, Senior Manager for Solutions Marketing at Thales eSecurity; Akshay Bondre
The Internet of Things (IoT) is exploding and increasingly becoming a part of our everyday lives. Home appliances and thermostats that are Internet-aware are only a couple of popular examples of how consumers are being impacted by this amazing new trend.
In this presentation, we will analyze and expose vulnerabilities in a medical ingestible camera device and propose solutions for better securing these types of devices.
In this session, led by one of the authors of the SMM, we will discuss the work done to date and provide an overview of the structure, purpose, usage and extensibility of the model.
This will be a discussion of the emerging Blockchain technology and it's use to verify evidence from the moment it is collected to the final presentation in court.
Orchestration and automation (O&A) are hot topics in 2018 but are challenging to implement with success in an organization. O&A often reveals gaps in people, process, and technology that must first be addressed before it is architected and developed.
Imagine you are King or Queen for a day. How would you employ the time and talent of computer hackers? Whom would you target, with what type of malware, and for what purpose? Where would you set technical, legal, and ethical constraints?
As we continue to secure our environments external attackers continue to be successful. This is true even with new developments and enhancements to our infrastructure’s security. The subsequent analysis and deployment of changes to our internal and generic Security Development Lifecycle (SDLC) don’t seem to even slow them down.
This year's event is a co-location with Cyber Security//Atlanta at the Georgia World Congress Center.
Click on the button below to reserve your room at The Westin Peachtree Plaza, the preferred lodging for ISSA attendees. Reservations are available until August 31, 2018 or until the room block sells out, whichever comes first. Space is limited.
Click on the link for a copy of the hotel shuttle schedule.
In order to receive the ISSA negotiated rate, all reservation must be made through the ISSA online registration link/button on this page or by calling the hotel directly. Do not make any reservations through another organization, or through an alternative method as we will be unable to assist you with any issues that may arise. Only use the official ISSA website to register for our event and to book your hotel stay.
If you have any questions or concerns, please reach out to ISSA Member Services directly. We take the privacy of our members very seriously. ISSA will never release your contact information to a third party housing vendor.
ISSA Members
Dates | Rate USD |
Jun 1 - Jul 20 | $249 |
Jul 21 - Aug 23 | $299 |
Aug 24 - Sep 3 | $399 |
Sep 4 - Oct 16 | $499 |
Please be sure to register using your ISSA member email address to receive the member rate.
If your organization is tax exempt, please contact memberservices@issa.org before registering.
Non-Members
Dates | Rate USD |
Jun 1 - Jul 20 | $449 |
Jul 21 - Aug 23 | $529 |
Aug 24 - Sep 3 | $629 |
Sep 4 - Oct 16 | $679 |
Want to register at the member rate? Click on the link to join ISSA for just $95 (plus chapter dues).
If your organization is tax exempt, please contact memberservices@issa.org before registering.
Students
Dates | Rate USD |
Jun 1 - Jul 20 | $249 |
Jul 21 - Aug 23 | $249 |
Aug 24 - Sep 3 | $249 |
Sep 4 - Oct 16 | $249 |
Student Members please click on the button to contact ISSA Member Services to process your registration.
If your organization is tax exempt, please contact memberservices@issa.org before registering.
Volunteers
Dates | Rate USD |
Jun 1 - Jul 20 | $199 |
Jul 21 - Aug 23 | $199 |
Aug 24 - Sep 3 | $199 |
Sep 4 - Oct 16 | $199 |
Volunteers please click on the button to contact ISSA Member Services to process your registration (note: you must sign up for at least one volunteer shift).
If your organization is tax exempt, please contact memberservices@issa.org before registering.
Group Discounts
Staff can assist you with your group registration of 10 or more attendees. Please click on the link to contact Eileen Sciarra for for more information.
Click on the link to contact Sean Bakke for sponsorship options and exclusive branding opportunities.
Copyright 2018 ISSA International | All Rights Reserved.