Loading…
Attending this event?
Tuesday, October 8
 

6:45pm PDT

Opening Reception
Tuesday October 8, 2024 6:45pm - 8:30pm PDT
Join us as we celebrate the opening of Summit 2024 and enjoy food, drink and networking, with spectacular views of the ocean and the sunset.
Tuesday October 8, 2024 6:45pm - 8:30pm PDT
Sand & Sea View Deck
 
Wednesday, October 9
 

8:45am PDT

Workshop and Competition - Test Your Skills
Wednesday October 9, 2024 8:45am - 2:35pm PDT
TBD
Wednesday October 9, 2024 8:45am - 2:35pm PDT
Club Room

9:00am PDT

Registration and Vendor Expo
Wednesday October 9, 2024 9:00am - 9:45am PDT
Sign in to get your badge
Wednesday October 9, 2024 9:00am - 9:45am PDT
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

9:45am PDT

Welcome Address
Wednesday October 9, 2024 9:45am - 10:00am PDT
Speakers
avatar for Richard Greenberg

Richard Greenberg

CEO/CISO, Security Advisors LLC
Richard Greenberg, CISSP is a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker.Richard brings over 30 years of management experience and has been a strategic and thought leader in IT and Information Security. His Project Management, Security Management and... Read More →
Wednesday October 9, 2024 9:45am - 10:00am PDT
Garden Terrace Room

10:10am PDT

Opening Keynote: Diana Kelley
Wednesday October 9, 2024 10:10am - 10:55am PDT
Behind the Headlines: Understanding the AI and ML Attack Landscape

Reading security news about AI can feel a little like the sky is falling; every day seems to bring some new attack. This talk provides an overview of how AI and ML work and then maps the current attack landscape to the MITRE ATLAS and OWASP LLM Top Ten. We walk through risks that have been exploited in the wild and explain why they work. With this information, defenders will understand where and how attacks can and have occurred and the effective ways organizations can protect against them.

Speakers
avatar for Diana Kelley

Diana Kelley

Chief Security Officer, Protect AI
Diana Kelley is the Chief Information Security Officer (CISO) for Protect AI. She also serves on the boards of WiCyS, The Executive Women’s Forum (EWF), InfoSec World, CyberFuture Foundation, TechTarget Security Editorial, and DevNet AI/ML. Diana was Cybersecurity Field CTO for... Read More →
Wednesday October 9, 2024 10:10am - 10:55am PDT
Garden Terrace Room

11:00am PDT

Mel Reyes
Wednesday October 9, 2024 11:00am - 11:45am PDT
Building Resilient Teams to Fill The Skills Gaps

Cultivating a robust cybersecurity workforce requires a multifaceted approach with a diverse set of skills. Organizations can invest in hiring candidates from various verticals and markets to enhance their security programs.

Additionally, bringing in fostering a culture of knowledge sharing and collaboration can bridge skills gaps and ensure a resilient cybersecurity team.

• How can we create a culture of continuous learning and knowledge sharing within our cybersecurity team?
• What training and certification programs would be most beneficial in addressing specific skills gaps within our team?
• Are there mentorship opportunities or collaborative initiatives that can help empower existing talent and enhance our overall cybersecurity workforce?
Speakers
avatar for Mel Reyes

Mel Reyes

Executive Coach
Coach Mel unifies his Puerto Rican roots, having been raised in NY, with his California lifestyle to deliver educational, incredibly entertaining, and motivating, empowering coaching sessions and speeches. His coaching journey spans nearly two decades, a testament to his deep understanding... Read More →
Wednesday October 9, 2024 11:00am - 11:45am PDT
Terrace Lounge

11:00am PDT

Enhancing Trust with Contextual Entitlements
Wednesday October 9, 2024 11:00am - 11:45am PDT
IAM and SSO platforms are static and binary – users either pass for access or they do not. "Contextual entitlements" is a concept that refers to the system access and processing rights and privileges that users, services or groups have within specific contexts or situations. These entitlements can vary based on the environment, the role of the user or group, device trust, and legal or regulatory frameworks.

In this session, participants will be able to explain the concept of contextual entitlements for cloud and on-premise access, and how it differs from traditional static and binary Identity Access Management (IAM) and Single Sign-On (SSO) platforms. They will understand how entitlements can vary based on context, and they will be able to identify and analyze the various factors that influence contextual entitlements.

Finally, participants will be able to apply the concept of contextual entitlements to real-world access management scenarios leveraging Cloud Reverse Proxy, CASB, and SASE platforms, incorporating access and data loss prevention policies to achieve contextual entitlement faculties. They will be able to design access control policies that dynamically adjust entitlements based on changing contexts, ensuring a more nuanced and secure approach to managing system access and user privileges.

Learning Objectives:
Understand the concept of contextual entitlements.
Analyze the factors influencing contextual entitlements.
Apply contextual entitlements in access management scenarios. Define, and then identify!
Speakers
avatar for Dan Meacham

Dan Meacham

VP Global Security & Operations, CSO / CISO, Legendary Entertainment
Dan Meacham is a respected cybersecurity expert with over 25 years of experience in the field. He is currently the Vice President of Global Security and Corporate Operations for Legendary Entertainment, a movie and television studio best known for Dune, Interstellar, Dark Knight... Read More →
Wednesday October 9, 2024 11:00am - 11:45am PDT
Sand and Sea Room

11:00am PDT

Charity Wright
Wednesday October 9, 2024 11:00am - 11:45am PDT
 Democracy is in decline for the 18th consecutive year, and many experts consider the United States a democracy at risk. As a mother, I have also considered what elections might look like when my children vote for the first time in 2028. We strive for free and fair elections but our foreign enemies want to disrupt and derail those processes, flooding our networks and media with attacks.

This apolitical presentation explores the various dimensions of cyber threats targeting elections, focusing on disinformation campaigns, ransomware attacks, and the rise of political extremism and violence. You will be empowered to protect democratic processes in an increasingly digital age and navigate a messy political information landscape.
Speakers
avatar for Charity Wright

Charity Wright

Principal Threat Intelligence Consultant, Recorded Future
Charity Wright is a Principal Threat Intelligence Consultant at Recorded Future, advising some of the largest companies in the world. Charity has nearly 20 years of experience in the intelligence field, including a career in the US Army and the National Security Agency, where she... Read More →
Wednesday October 9, 2024 11:00am - 11:45am PDT
Garden Terrace Room

11:00am PDT

Career Center
Wednesday October 9, 2024 11:00am - 5:00pm PDT
Join our expert Info Sec hiring managers for free career consultations at ISSA Summit 2024 Career Center booth, offering Resume Review, Mock Interview, Job Hunting Assistance and Career Development Advice.  Whether you’re looking for guidance on breaking into this desirable field or are a current Info Sec professional looking to kick up your career a notch, visit the Career Center to schedule a meeting or drop in on our career counselors.
Career Center will be open Thursday Oct 5, between 10am-4:45pm. Bring hard copies of your resume plus any job postings that match your current career goals and we look forward to meeting and assisting you!

Wednesday October 9, 2024 11:00am - 5:00pm PDT
Vendor Expo

11:45am PDT

Lunch and Vendor Expo
Wednesday October 9, 2024 11:45am - 1:00pm PDT
Wednesday October 9, 2024 11:45am - 1:00pm PDT
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

1:00pm PDT

Derek Melber
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
Consistency: Driving Security to Protect Against a Breach

Whether you are an SMB, Enterprise, or MSSP, you need to know what your endpoints are running. You need to know your endpoints are secured and have not drifted from running approved software. You need to know your endpoints have the proper patches for the OS, software, and even device drivers. This is only possible with solutions that are dedicated for such tasks. Let 20X Microsoft MVP Derek Melber describe the ideal scenario that every organization can create to help them establish endpoints that can withstand some of the most brutal attacks.
Speakers
avatar for Derek Melber

Derek Melber

Chief Strategist, Nanitor
Derek is the Chief Strategist at Nanitor, where he helps drive marketing, product, and sales to deliver the best Continuous Threat Exposure Management (CTEM) platform on the market. Derek has built a career out of public speaking, content creation, sales, marketing, and enterprise... Read More →
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
Sand and Sea Room

1:00pm PDT

Peter Marx
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
Speakers
PM

Peter Marx

Partner, CTO, AgileView Inc
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
Terrace Lounge

1:00pm PDT

Cynthia Stamer
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
TBD
Speakers
avatar for Cynthia Stamer

Cynthia Stamer

Attorney
Board Certified in Labor and Employment Law by the Texas Board of Legal Specialization, Cynthia MarcotteStamer is a Martindale-Hubble “AV-Preeminent (Top 1%) rated practicing attorney and management consultant,health industry, data and workforce public policy advocate, and extensively... Read More →
Wednesday October 9, 2024 1:00pm - 1:45pm PDT
Garden Terrace Room

1:50pm PDT

Supercharging Your Career by Overcoming Fear
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
Corporate culture in America is fraught with the stifling of creativity. The fear of failure is preventing many from reaching their full potential. It is time for all of us to embrace stretching the envelope and getting uncomfortable. We all have so much to offer, that will lead to innovation and better ways to solve problems, if only our culture would stop judging and beating down good ideas that just happen to fail. We will learn more from failure than success, and until we can get past that fear of failure, we will never realize our full potentials.
Speakers
avatar for Richard Greenberg

Richard Greenberg

CEO/CISO, Security Advisors LLC
Richard Greenberg, CISSP is a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker.Richard brings over 30 years of management experience and has been a strategic and thought leader in IT and Information Security. His Project Management, Security Management and... Read More →
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
Garden Terrace Room

1:50pm PDT

The Golden Age of Dystopia
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
A critical analysis of key events and trends that have led to the current state, exploring how commercialization, mass surveillance and the rise of big data analytics have contributed to the erosion of digital privacy & security.

Speakers
avatar for Christopher Callas

Christopher Callas

As the Principal at Arbure, Christopher plays a crucial role in the organization's strategic and tactical endeavors. Leveraging much experience, Christopher has been instrumental in carving a niche for Arbure in the competitive landscape of cybersecurity.Christopher holds responsibility... Read More →
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
Terrace Lounge

1:50pm PDT

Advice for Women Who Want a Career in Cybersecurity
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
The panel will discuss question such as:

  •  How did you achieve your current position, and who has been the most influential in helping you get here?
  • What has been the biggest obstacle you've faced in reaching your current role?
  • In what ways have men contributed to your journey to where you are today?
  • What is the best and worst advice you could give to another woman aspiring to enter the field of cybersecurity?
Moderators
avatar for Jeanette Lind

Jeanette Lind

Director of IT and Information Security, Unison
Ms. Lind has over 20 years of experience in Information Technology and Cyber Security. Her career path began in software development, moved into IT infrastructure, then into security compliance and risk management where she found her true calling in cybersecurity. Jeanette became... Read More →
Speakers
avatar for Rob Tennant

Rob Tennant

Senior Director/Interim CISO, CoreLogic
Rob leads the cyber security, cyber risk assessment, policy management, security incident response and security training and awareness solutions across CoreLogic.
avatar for Jackie Kalter

Jackie Kalter

Strategic Advisor
Jackie brings over 20 years of expertise in Cybersecurity and IT, where she has excelled in forging strong relationships, fostering collaborative environments and building safe communities.Previously serving as the Vice President of the ISSA OC, she currently holds the position of... Read More →
avatar for Rosalia Hajek

Rosalia Hajek

Chief Information Security Officer, Topgolf Callaway Brands
Rosalia Hajek is a senior executive in information technology who is currently serving as Chief Information Security Officer (CISO) for Topgolf Callaway (TC) Brands. She has provided cybersecurity to various public and private Fortune 500 companies across the North America, Europe... Read More →
Wednesday October 9, 2024 1:50pm - 2:35pm PDT
Sand and Sea Room

2:35pm PDT

Break and Vendor Expo
Wednesday October 9, 2024 2:35pm - 3:00pm PDT
Wednesday October 9, 2024 2:35pm - 3:00pm PDT
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

3:00pm PDT

Panel
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
TBD
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
Sand and Sea Room

3:00pm PDT

The Server Room in the Court Room: Are Regulators and Litigators the New Threat Actors?
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
The once clear-cut world of cybersecurity is now a complex maze of data breaches and privacy regulation that has caused a surge in litigation and enforcement.
 
The culprit? Data and information.
 
The Economist declared that the world’s most valuable resource is not oil but data. Data can be used for marketing and advertising, medical care, banking and finance, hospitality, product development, and anywhere business intelligence and the delivery of products and services are needed.
 
However, as businesses develop ways to monetize this data, CISOs and leaders are under tremendous pressure to protect sensitive data from misuse and theft. What data is collected, stored and secured, used, and disposed of is currently under scrutiny by regulators, governments, and litigators.
 
This presentation will explore the alarming shift from the server room to the courtroom as we face the new adversaries of the digital age - regulators and litigators. We'll delve into the challenges of litigation response in DFIR, the intricacies of e-discovery, and the current regulatory landscape. We'll also enable you with the latest strategies and skills that CISOs must adopt to survive in the courtroom. Join us for a journey through the changing legal terrain for CISOs and leadership, where the threats moved from hackers in hoodies to those in suits and ties.
Speakers
avatar for Douglas Brush

Douglas Brush

Expert Witness | ESI Court Appointed Neutral | Cyber Resilience Architect, Brush Cyber
Douglas Brush, the founder of Brush Cyber, stands out in data privacy, cybersecurity, litigation, and information governance. His unique blend of technical prowess and business acumen has earned him the respect and admiration of clients and peers.He understands that protecting data... Read More →
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
Club Room

3:00pm PDT

The Cybersecurity Mirage: Seeing Through the Illusions
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
The cybersecurity landscape is filled with illusions.

Traditional defenses focus on building ever-higher walls, but attackers are constantly innovating ways to bypass them. This talk explores the concept of the "Cybersecurity Mirage," where seemingly robust defenses offer a false sense of security; moreover, companies continue to spend billions of dollars chasing something that is not attainable. So many worry about the Advanced Persistent Threat (APT), but they need to start with the Basic Persistent Threat. We need a paradigm shift and accept that the way we have been doing security is flawed and broken and to continue this way is the true definition of insanity.

Join me as I show empirical evidence of simple ways to confuse and frustrate attackers once they have broken through the existing flawed security solutions and embark on the path of Proactive Resilience. We will accomplish this with simple and easy to do network tricks that for some reason have been forgotten! It is time to remember them again!
Speakers
avatar for Kevin Cardwell

Kevin Cardwell

President, Cyber2Labs
Kevin Cardwell spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. He was team lead for the delivery of one... Read More →
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
Terrace Lounge

3:00pm PDT

Executive Security Focuses for 2025
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
Join this stellar group of Female Leaders as they discuss the important issues to watch out for in the coming year.
Speakers
avatar for Renana Friedlich-Barsky

Renana Friedlich-Barsky

Senior Director, Global Head of Cyber Threat Management, Paypal
Renana Friedlich is the Senior Director of Cyber Threat Management at PayPal, leading a global team of 120 security professionals. Renana has over 19 years of public and private sector cybersecurity experience, earning a reputation for delivering innovative cybersecurity solutions... Read More →
avatar for Tracy Wilkison

Tracy Wilkison

Senior Managing Director, FTI Consulting
Ms. Wilkison has more than 20 years of cybersecurity, national security, litigation, and consulting experience. She advises clients on their most complicated cybersecurity and data privacy challenges, from readiness and gap assessments to regulation, enforcement, incident response... Read More →
avatar for Karina Klever

Karina Klever

CEO/CISO, Klever Compliance
Karina Klever has spent more than 35 years in technology, starting in 1989 as a computer operator. After programming and decades of project/program managing, compliance took a larger focus starting in the early 2000s. Karina would go on to establish a national audit program office... Read More →
avatar for Genevieve McGinty

Genevieve McGinty

Security Services Manager
Ms. McGinty has been in the Information Technology and Cyber Security industry for over 20 years. She is currently working for the City of Irvine, in a contract capacity, as a Security Services Manager. She is responsible for leading a team of cyber analysts and a MSSP focusing on... Read More →
avatar for Amy Chaney

Amy Chaney

Senior Executive Risk Officer & Technology Transformational Change Leader, Huntington Bank
Amy Chaney is a financial services technology executive, with over 25+ years of experience. Amy’s career spansenterprise technology transformations, risk management, cybersecurity, cloud, IAM, and emerging technologies.Her expertise in firmwide risk strategies, accelerated execution... Read More →
Wednesday October 9, 2024 3:00pm - 3:45pm PDT
Garden Terrace Room

3:50pm PDT

Cybersecurity Leadership Panel
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Come hear the experiences and advice of a panel of Cybersecurity Leaders, as they share their insights on important topics that keep them up at night.
Moderators
avatar for Richard Greenberg

Richard Greenberg

CEO/CISO, Security Advisors LLC
Richard Greenberg, CISSP is a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker.Richard brings over 30 years of management experience and has been a strategic and thought leader in IT and Information Security. His Project Management, Security Management and... Read More →
Speakers
avatar for Ed Frye

Ed Frye

Head of Security, Luminary Cloud
Edward is a 4-time CISO, currently serving as the Head of Security at Luminary Cloud where he is responsible for Security and Compliance. Edward is an information security leader with over 25 years of experience establishing cross-functional, practical security approaches that fit... Read More →
avatar for Howard Miller

Howard Miller

CIO, UCLA Anderson School of Management
Howard Miller is currently the Chief Information Officer at UCLA Anderson School of Management. Prior to UCLA, Howard was Acting CIO/CISO at Columbia Business School.Howard is an accomplished IT executive with expertise in the design, development, and deployment of technical strategy... Read More →
avatar for Gary Gooden

Gary Gooden

Deputy CIO, Ventura County
Deputy CIO, Ventura CountyMr. Gooden has over 35 years of experience in information technology infrastructure and operations, application development, cybersecurity, program and project management and business intelligence across local government, aerospace, healthcare, life sciences... Read More →
avatar for Sandra Lambert

Sandra Lambert

CEO, Lambert & Associates
Sandra Lambert is the CEO of Lambert & Associates, located in Los Angeles (http://www.lambert-associates.com), where she specializes in cybersecurity & business continuity consulting, with an international clientele. She is an internationally published author & lecturer on information systems security. Prior to full-time consulting, she completed a 5-year assignment at Citibank as Vice Pres... Read More →
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Garden Terrace Room

3:50pm PDT

Law Enforcement Panel
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Join us as we hear from our Law Enforcement agencies on the latest cyber threats and some of the strategies we can use to counter them. They will also share some fascinating war stories to keep us all enthralled.
Moderators
avatar for Ketrin Adam

Ketrin Adam

Special Agent InfraGard / Private Sector Coordinator, FBI – Los Angeles Office
Ketrin Adam is a FBI Special Agent and the Private Sector Coordinator for the FBI’s InfraGard program. She recently returned from FBI Headquarters as a Supervisory Special Agent in the FBI's Public Corruption Unit (PCU). In this role, she focused on providing public corruption program... Read More →
Speakers
avatar for Veronica Mitchell

Veronica Mitchell

Supervisory Cybersecurity Advisor, DHS/CISA
Ms. Veronica Mitchell currently serves as the Supervisor Cybersecurity Advisor for the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Region 9. In this role, she oversees the CISA Region 9 cybersecurity efforts in Los Angeles, Orange... Read More →
avatar for Marcelle Valenzuela

Marcelle Valenzuela

Special Agent - Counterintelligence Strategic Partnership (CISP), FBI
avatar for Angelica Lee

Angelica Lee

Special Agent - Cyberhood Watch (CHW), FBI
avatar for Edward Lee

Edward Lee

Intel Analyst - CHW, FBI
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Sand and Sea Room

3:50pm PDT

Talk
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
TBD
Speakers
DS

Dennis Sheppard

Cyber Security Business Partner, Raytheon Technologies
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Terrace Lounge

3:50pm PDT

Talk
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
TBD
Wednesday October 9, 2024 3:50pm - 4:35pm PDT
Club Room

4:35pm PDT

Break and Vendor Expo
Wednesday October 9, 2024 4:35pm - 5:00pm PDT
Wednesday October 9, 2024 4:35pm - 5:00pm PDT
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

5:00pm PDT

CISO Series Podcast recording with David Spark
Wednesday October 9, 2024 5:00pm - 5:45pm PDT
Live recording of CISO Series Podcast
We're back! David Spark and his CISO guests return to the ISSA LA Summit for a third year to record an episode of their popular show; the show that launched the CISO Series media network. We'll have insightful discussion about security leadership, hiring, dealing with cyber threats, and we'll answer your cyber questions. Plus, we'll play games such as "What's Worse?!" and "What Is Dave's Mom Talking About?" Guaranteed fun!

Guests, Sasha Pereira, Head of Infrastructure, Security and Operations, WASH
Cyrus Tibbs, CISO, PennyMac

Speakers
avatar for Sasha Pereira

Sasha Pereira

Head of Infrastructure, Security and Operations, Wash Multifamily Laundry Systems
Sasha has twenty four years of experience in building stellar teams in Infrastructure and Security. She heads up Information Security, Network Operations & Infrastructure at Wash Multifamily Laundry Systems. Sasha serves as a board member on several CISO communities in Southern California... Read More →
avatar for Cyrus Tibbs

Cyrus Tibbs

CISO, PennyMac
Cyrus Tibbs is the CISO of PennyMac and has worked in cybersecurity and cloud infrastructure for 25+ years. He led enterprise engineering for City National Bank spearheading their adoption of cloud computing. He also was the principal cybersecurity enterprise architect for Southern... Read More →
avatar for David Spark

David Spark

Founder and executive producer of the CISO Series
David Spark (@dspark) is the founder and executive producer of the CISO Series, a media network for cybersecurity professionals. He also co-hosts many of our shows. Spark is a veteran tech journalist that’s appeared in many media outlets such as eWEEK, Wired News, Forbes, PCWorld, Clearchannel, and TechTV (formerly ZDTV). Spark is the author of "Three Fee... Read More →
Wednesday October 9, 2024 5:00pm - 5:45pm PDT
Sand and Sea Room

5:45pm PDT

Closing Remarks and Raffle Prize Drawings
Wednesday October 9, 2024 5:45pm - 6:00pm PDT
You could leave with prizes and gift cards, so stick around.
Wednesday October 9, 2024 5:45pm - 6:00pm PDT
Sand and Sea Room
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.