• Already Registered?
Skip Navigation
(ISC)² Security Congress 2018
  • Information
    • Home
    • Location
    • Keynotes
    • Solutions Theater
    • Center Celebration
    • 2016 Sponsors
    • Student Registration
    • Session Highlights
    • Group Registration
    • Spouse Program
    • Security Congress Webinar Sessions
    • Speaker Resource Center
    • New Sessions
    • Panoply
    • 2017 Media Report
    • Instructor Summit
    • Team
    • 2017 Sponsor
    • Videos
    • Access Control 1-Day Training
    • CSA Summit
    • Experience Video
    • Track Survey
    • OWASP Top 10 Training
    • Session Blog
    • Career Center
    • 2017 AM-ISLA Judges
    • Chapter Leadership Meeting
    • Chapter Awards
    • Social Contest
    • Americas ISLA Blog
    • Bookstore Signings
    • Chapter Volunteer Resource Center
    • Escape Room
    • OWASP Top 10 -Laptop Requirements
    • CFS Blog
    • 2018 Sponsors
    • Location Survey
    • Ambassadors
    • Cyber Range Tournament
    • 2019 Escape Room

(ISC)² Security Congress 2018

 
  • Home
  • Registration & Pricing
    • Pricing Info
    • Pre-Conference Training
    • Group Pricing
    • Student Pricing
    • CPE Opportunities
    • Justification Letter
  • Events & Sessions
    • Keynotes
    • Sessions
    • CSA Summit
    • Agenda
    • ISLA Americas
    • Exclusive Events
  • Hotel & Travel
    • Hotel & Travel Information
  • Exhibits & Sponsors
    • Sponsors
    • Exhibitor Floor
    • Become a Sponsor
  • Connect
    • Videos
    • Blogs
    • Media
    • Meet the Team
    • About (ISC)2

Make sure you don't miss these sessions!

 

 

Session #3230 -Cloud Security: Securing Your Public Cloud Infrastructure 

Tuesday, September 13, 2016 1:45 PM - 3:00 PM

Increasingly, security professionals must be able to securely migrate workloads to cloud providers like AWS. However, properly securing IaaS platforms involves much more than simply migrating physical servers to virtual instances. Today's dev teams are building cloud-native applications using IaaS services and APIs into which host-based security tools and network scanners have little to no visibility. To successfully defend IaaS infrastructure, security teams need to understand the security implications of "infrastructure as code" and the importance of protecting the IaaS console and management plane. 

Speakers:
Tim Prendergast, CISSP®, CEO, Evident.io
Anthony Freed, Director of Corporate Communications, Evident.io
Dave Lewis, CISSP®, Board of Directors, (ISC)²
Adrian Sanabria, Senior Security Analyst, 451 Research

 

 

Session #2232 -Professional Development: Hiring, Building, and Retaining Top Security Talent 

Monday, September 12, 2016 1:45 PM - 3:00 PM

Recent studies show that there is a significant shortage of information security expertise in the industry today. This is becoming a significant challenge as most organizations are looking to expand their security staff in 2016. As demand for information security expertise pushes salaries higher, challenges emerge with recruiting and retaining the best people. This session will discuss the skills gap across the industry and discuss areas that managers should consider when developing their teams. We'll also cover how to creating a climate and culture that retains top talent, how to recruit new talent to build out your teams and creative ways to grow your own talent and build a pipeline of future information security gurus. 

 

Speakers:
Deidre Diamond, Founder and CEO, Cyber Security Network
David Shearer, CEO, (ISC)²
Kevin Flanagan, CISSP®, CISSP-ISSMP®, Director, North American Technical Consulting, RSA
Anne Saita, Editor in Chief, (ISC)²

 

 

Session #4232 - Mobile: Malware Activity in Mobile Networks 

Wednesday, September 14, 2016 1:45 PM - 2:45 PM

This presentation explores the malware that is currently active on the mobile network. It will leverage infection data from network-based malware detection systems deployed in mobile carriers covering more than 100 million mobile devices around the globe. It starts with a review of real-world malware statistics for mobile devices, including the infection rate, the type of malware involved and the types of devices that are infected. It then provides an in-depth analysis of specific malware infections, including details on what the malware does, its command and control infrastructure, how it is monetized, the impact on the network and user, and a demonstration of the malware involved.

Speaker:
Kevin McNamee, CISSP®, Director, Nokia

 

 

Session #4235 - People Centric Security: Your Next CISO Should be a Lawyer 

Wednesday, September 14, 2016 1:45 PM - 2:45 PM

Chief information security officers have traditionally come from the IT sector and have a technical background. Occasionally, a CISO has come from the business side, which hasn't worked very well. Every year, more laws and regulations appear that affect cybersecurity. The traditional CISO simply is not equipped to understand, let alone apply them. One solution is to hire a law firm, but these are expensive and are reactive, not proactive. This presentation suggests a better approach is to name a lawyer as CISO. Lawyers, by training, tend to consider worst-case scenarios and therefore are in a unique position to establish a preventive approach. 

Speaker:
Bruce deGrazia, CISSP®, Program Chair, University of Maryland University College


View all of the 2016 Sessions here!

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!
MSN MSN
Already Registered?

Upcoming (ISC)² Security Congress

Hong Kong • July 9-10

APAC Security Congress

Santiago, Chile • July 25-26

LATAM Security Congress

Registration & Pricing

Registration Information

CPE Opportunities

Justification Letter

Events & Sessions

Sessions

Pre-Conference Training

Agenda

Americas ISLA

Member Events

Safe and Secure Online

Hotel & Travel

Location

Hotels

International Travelers

Exhibits & Sponsors

Event Sponsors

Become a Sponsor

Downloads & Media

Videos

Blog

 

(ISC)²
Copyright © 2018. (ISC)², Inc. All Rights Reserved.

Top