WELCOME TO THE NINTH ANNUAL
INFORMATION SECURITY SUMMIT

Presented by the Information Systems Security Association Los Angeles Chapter

 

Get ready for your 1-day Training and 1-day Summit experience

TRAINING on MAY 18th & SUMMIT on MAY 19th

Hosted at the UNIVERSAL CITY HILTON

Discount Price Ends Soon!

OVERVIEW

The ISSA-LA Information Security Summit is the premier cybersecurity event in Southern California. IT and InfoSec executives, leaders, analysts, and practitioners will be gathering May 18-19, 2017 at the Universal City Hilton to learn from the experts, exchange ideas with their peers, and enjoy conversations with the community. With expected attendance of 1000 or more, this is an event you and your company simply cannot afford to miss.

  FIGHT CYBERCRIME TOGETHER

 

The goal of the 2-day summit is to help Southern California stay safe from cybercrime by enabling the necessary collaboration between business, technical IT professionals, law enforcement, nonprofit and community leaders, government, and the information security community at large.

JACK DANIEL Leading Technology Community Activist

JACK DANIEL, Leading Technology Community Activist, Speaking at Summit 8

IRA WINKLER
President Secure Mentem

“THIS SUMMIT IS ONE OF THE LARGEST AND MOST DIVERSE CONFERENCES. IT OFFERS A SERIES OF SPEAKERS WHO WOULD NORMALLY BE KEYNOTE SPEAKERS AT OTHER EVENTS.”

  THE BEST SPEAKERS IN THE INDUSTRY

 

Every year we have some of the industry’s best speakers present the latest trends, strategies, and technologies related to information security.

DON'T MISS OUT Ask questions from the Leaders in information security

DON’T MISS OUT Ask questions from the best in information security

  EVERYONE IS INVITED

 

Registration for the event is open to anyone interested in learning more about information security: business professionals in law, healthcare, accounting, insurance and banking; technical and operational IT personnel; law enforcement professionals fighting cybercrime; faculty and students. We welcome all people of all experience levels from all industries.

  BUILD RELATIONSHIPS

 

Network with our community to gain insight, proven best practices, and cutting edge information that can guide your information security programs, help you in your careers, and benefit your company. Make a lasting impact that counts across the board.

CONNECT Collaborate with other professionals to fight cybercrime together

CONNECT Collaborate with other professionals to fight cybercrime together

RAFAL LOS
Executive advisor | Cyber security strategist – ‎Optiv Inc

“THE FOLKS THAT SHOW UP HERE ARE THE BUILDING BLOCKS OF WHAT INFORMATION SECURITY IS AT THE EXECUTIVE LEVEL”

  HOSTED BY THE PREMIER INFORMATION SECURITY ASSOCIATION

 

The Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) is the premier catalyst and information source in Los Angeles for improving the practice of information security. The Chapter provides educational programs for information security and IT professionals. The Chapter also conducts outreach programs to businesses, financial institutions, nonprofits, governmental agencies, and consumers.

 

 

Speakers

Top experts will tell you about the latest advanced technologies


Richard Stiennon
Chief Strategy Officer at Blancco Technology Group
Richard Stiennon is a security executive with 20 years experience spanning subject matters in cybersecurity, governance, risk, compliance and analytics.

Keynote Title: Scaling the Data Mountain Without Putting Privacy at Risk


Ira Winkler
President at Secure Mentem
Ira Winkler, CISSP, is President of Secure Mentem and Co-Host of the Irari Report.

Keynote Title: Fighting Sophisticated Attacks with Advanced Persistent Security


Manley Feinberg
Business Leadership Expert
Manley is recognized as an award winning international keynote speaker and business leader, author, published outdoor adventure photographer and professional musician.

Keynote Title: 7 Vertical Lessons & 1 Essential Question for Leading with Impact

Bob Bigman
Cyber Security Consultant
Robert Bigman retired in 2012 from the Central Intelligence Agency (CIA), after serving a thirty year distinguished career, the last 15 as the CISO.

Title: The Truth About Cyber Security

Valerie Thomas
Technical Support Specialist at SunBrite TV
Valerie specializes in social engineering and physical penetration testing.

Title: Defending The Enterprise Against Social Engineering Attacks

Bill Cheswick
Visiting scholar at University of Pennsylvania
Bill Cheswick is a computer security and networking researcher, interested in visualization, user interfaces, security and security usability.

Title: Computer security: I think we can win!

Chenxi Wang
Board Member at Cyber Diversity Foundation
Chenxi Wang is Chief Strategy Officer of Twistlock, and the security and privacy chair of the 2016 Grace Hopper conference.

Title: Digital Trust in the Era of Artificial Intelligence


Debra J. Farber
Co-Founder of Women in Security and Privacy
Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur, and Founder and CEO of Orinoco Privacy

Women in Security Panel

Jim Manico
Owner of Manicode Security
Jim Manico is the VP of Security Architecture for WhiteHat Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security.

Training: Web Security Attack & Defense

Talk Title: The OWASP Top Ten 2017


Eva Galperin
Director of Cybersecurity at the Electronic Frontier Foundation
Eva Galperin’s work is primarily focused on privacy and security for vulnerable populations around the world.

Title: When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists


Jennifer Granick
Director of Civil Liberties
Jennifer Granick received Duo Security’s Women in Security Academic Award for her expertise in the field as well as her direction and guidance for young women in the security industry.

Title: American Spies, Modern Surveillance, and You


Erik Parreira

Sr. Security Engineer at Somerset Recon

Erik Parreira is an organizer of the capture the flag competition.

Capture the Flag/Challenge Room

Eric Chien
Distinguished Engineer at Symantec
Eric Chien leads a deep analysis team of engineers that investigate and reverse-engineer the latest high-impact Internet security attacks

Title: Achiving a Total Power Blackout by Living Off the Land

Mark Weatherford
Senior Vice President and Chief Cybersecurity Strategist at vArmour
Mark Weatherford brings more than 20 years of security operations leadership and executive-level policy experience in some of the most important organizations in the world.

Title: The Internet of (Insecure) Things: We Forgot ‘The Cyber’


Diana Kelley
Global Executive Security Advisor to IBM Security
Diana Kelley is an internationally recognized information security expert, speaker, strategic advisor, market analyst and writer.

Title: Supersized Cybersecurity Groundhog Day – Insights for Preventing 2016 from Repeating

 

Malcolm Harkins
Chief Security and Trust Officer at Cylance Inc.
Previously Harkins was VP and Chief Security and Privacy Officer (CSPO) at Intel Corporation, responsible for managing the risk, controls, privacy, security and other compliance activities for Intel.

CISO Forum: CISO Panel


Suedy Renner
Principal Management Consultant at Vast Technology Solutions Group
Suedy Renner has successfully delivered various high profile global projects and innovative solutions for Fortune 100 companies for the last 25+ years.

Women in Security Panel


Mike Villegas
Vice President – K3DES
Over a span of 30 years, Mike has been a CISO for a large online retailer, partner for two “Big Four” consulting firms over a span of nine years, VP of IT risk management.

CISO Forum: Roundtable Discussion Leader


Mark Kadrich

Interim CISO for Antelope Valley Hospital

Mr. Kadrich is the author of the book “Endpoint Security”.

Healthcare Forum: Closing Panel


Scott Hennon
Information Security Audit & Risk Mgmt/CISO Leader
In his role, Scott provides leadership and guidance for safeguarding private sensitive information against accidental or unauthorized modification, destruction or disclosure.

CISO Forum: Roundtable Discussion Leader


Dan Meacham
Cybersecurity Leader and Boardmember
Mr. Meacham is recognized as a top contributor to the information security community through support and advisory board membership at the University of Dallas, Texas A & M University, UCLA Extensions, and VHA.

CISO Forum: Roundtable Discussion Leader


Evan Wheeler
Director, Information Risk Management at MUFG Union Bank
Evan Wheeler is an expert in information security and operational risk management for organizations in many critical infrastructure sectors.

Title: Overhauling Your Risk Management Program


Erin Richards
Director of Risk Management at Oracle Corporation
Erin Richards has been in the Oracle Cloud Services organization for the past 15 years, leading a culturally diverse global team.

Women in Security Panel

.


James Brady
Area CIO at Kaiser Permanente Orange County

James Brady is the recipient of Becker’s Hospital Review 2017 List of Hospital and Health System CIOs to Know.

Healthcare Forum: Closing Panel


Brian Kreitzer
CISO at UCLA Health
Brian Kreitzer is recognized as a top expert in financial and operational analysis including SLA management to improve efficiency and save money.

Healthcare Forum: CISO Panel


Todd Freidman
Chief Information Security Officer at ResMed
Todd Freidman a seasoned leader dedicated to leveraging information security and risk management to improve business performance.

Healthcare Forum: CISO Panel

Max Shuftan

Director of CyberTalent Solutions, SANS Institute

Max leads the CyberTalent division of the SANS Institute, directing business development and external stakeholder engagement.

SANS Connect: Women in Security and Technology Panel


Chris Joerg
CISO at Cedars-Sinai
Chris Joerg is a Global Business Leader and Information Security Industry Expert with proven record for developing, running, and continually improving information security strategy, organizations and infrastructure.

Healthcare Forum: CISO Panel


Yun-Kyung (Peggy) Lee
Deputy Regional Manager at US HHS Office for Civil Rights, Pacific Region – Los Angeles Field Office
Yun-kyung is recognized as a top expert in financial and operational analysis including SLA management to improve efficiency and save money.

Title: HIPAA, OCR, Breaches, Audits and YOU!

.


Cynthia Stamer
Management & Regulatory Attorney at Cynthia Marcotte Stamer, P.C.
Cynthia Stamer helps businesses and government leaders manage people and processes to achieve business and operational objectives and manage legal and other risks using in-depth human resources, insurance, employee benefits, health care, corporate compliance and other legal knowledge.

Healthcare Forum: Lunch Panel Discussion


Kevin Cardwell

Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses

Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK.

Training: Essential Defense Tactics 

Peter Kim

Director of Vulnerability Research – Blizzard Entertainment 

Peter Kim is well known for authoring ‘The Hacker Playbook: Practical Guide to Penetration Testing Series’ and also leads and maintains one of the largest security communities in SoCal (LETHAL).

Training: Real World Read Team Attacks

Mikhael Felker

Director of Information Security and Risk Management – Farmers Insurance 

Mikhael Felker is Informaiton Security Leader, Author of 50+ publications, Former Lecturer at USC Engineering and UCLA Extension

Training: Information Security Management Boot Camp for IT Professionals


Gary Gooden

Former CISO for Children’s Hospital Los Angeles (CHLA)

Gary Gooden has been driving the IT Security Strategy to modernize the Information security footprint within the hospital environment

Healthcare Forum: Closing Panel


Robb Reck

CISO at Ping Identity

Robb leads the Denver ISSA chapter, helps coordinate Rocky Mountain Information Security Conference, and serves on ISSA International’s CISO Advisory Council.

CISO Forum: CISO Panel


My-Ngoc Nguyen

CEO/Principal Consultant for Secured IT Solutions

My-Ngoc founded the non-profit organization CyberSafeNV to raise security awareness among Nevada residents and is currently the organization’s chairperson. 

SANS Connect: Women in Security and Technology Panel

Bruce Phillips

SVP & CISO, Williston Financial Group

Mr. Phillips has more than a decades experience in Information Security, building and executing successful strategic security programs.

CISO Forum: CISO Panel


Marcus Richerson

President of Somerset Recon

Marcus Richerson regularly hosts capture the flag hacking competitions and enjoys reverse engineering, exploit development, lockpicking, SCADA security, embedded device hacking, web hacking and mobile application hacking.

Capture the Flag/Challenge Room


Alexander Kissinger

Sr Penetration Tester at Somerset Recon

Alexander Kissinger is an organizer of the capture the flag competition.

Capture the Flag/Challenge Room


Jennifer Rathbur

Partner with Foley & Lardner LLP

Ms. Rathburn was selected for inclusion in The Best Lawyers in America© list for her work in health care law (2015 – 2017).

Healhcare Forum: Lunch Panel Discussion


Stan Banash

CISO for Children’s Hospital of Orange County (CHOC)

Mr. Banash’s approach to Information Security employs risk management resulting in a strategically oriented and fiscally responsible program.

Healhcare Forum: CISO Panel


Deane J. Delaney

Worldwide Talent Manager for IBM Security

Diane Delaney established and now oversees an enterprise-wide talent program to attract, recruit, hire and on-board diverse early professionals with cybersecurity skills.

SANS Connect: Women in Security and Technology Panel


Shea McHugh

Information Technology Professional

Shea McHugh successfully completed three SANS advanced, technical training courses and industry-leading GIAC certifications over an 8-month period: GSEC, GCIH, and GWAPT. 

SANS Connect: Women in Security and Technology Panel


Gary Hayslip

CISO for Webroot

As CISO, his mission includes creating a “risk aware” culture that places high value on securing and protecting customer information entrusted to Webroot

CISO Forum: CISO Panel

ISSA LA Summit Committee

Richard Greenberg

ISSA-LA President/Summit Chair

Yev Avidon

ISSA-LA Vice President

Gary Landau

ISSA-LA Treasurer

Edmond Momartin

ISSA-LA Secretary

Alyssa Mason

ISSA-LA Summit Director 

Sascha Schleumer

ISSA-LA Program Director

Sean Martin

ISSA-LA Marketing Director

Dave Wettenstein

ISSA-LA Education Director

Joel Simangan

ISSA-LA Summit Vendor Director

Chris Daskalos

ISSA-LA Summit Technology Director

Agenda

 

 Peter Kim   8:00 – 4:00pm
TRAINING: Real World Red Team Attacks

The days of exploiting MS08-067, encoding with Shikata Ga Nai, and blindly scanning are gone.  Both Blackhat hackers and pentesters alike have shifted to using more advanced techniques to bypass AV, implement a smaller footprint to evade SIEM detection, and continually stay persistent to devastate enterprise networks.  If you are looking to take your craft to the next level, this is the primer course for you.

Written and taught by the author of “The Hacker Playbook” series, Peter Kim will take you through an immensely hands-on experience to replicate real world attacks without even running a single vulnerability scanner.  In this hands-on experience, you will take on the role of a malicious Blackhat attacker and infiltrate your way into a corporate network.  The onsite lab will emulate a real network using only modern operating systems.
 Kevin Cardwell   8:00 – 4:00pm
TRAINING: Essential Defense Tactics

In this hands-on training you will learn the foundation of security and defending architectures from attack. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the IT corporate networks as well as industrial control networks. You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set you will look at the best practices recommendations when it comes to reducing the attack surface. You will learn a systematic process of intrusion and malware analysis.

This intensive course will introduce an attack that completely compromises systems and networks, once you have done this you will design defensive mechanisms to either prevent the attack, or isolate it if prevention is not possible.

 

 Jim Manico   9:00 – 4:00pm
TRAINING: Web Security Attack & Defense

This training will teach both an attack and defense perspective on a wide range of web application security issues. The presenters will illustrate each specific web security vulnerabilities, demonstrate several exploitation techniques, guide students through a series of hands-on labs on how to conduct the same attack, and then demonstrate developer-centric defense methods to stop said attacks deep in code. We will also analyze several recent and devastating real world web application hacks and explain how they could have been stopped via defensive coding techniques.

 Mickael Felker   8:00 – 4:00pm
TRAINING: Information Security Management Boot Camp for IT Professionals

Information security has become part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Adding to the security management challenge, users are demanding to work from anywhere on any device.

Designed for both in-house IT staff and IT vendors, ISSA-LA’s Information Security Management Boot Camp combines practical advice with sound security management insight.

 Kevin Cardwell  4:00 – 5:00pm
TALK: Solid Defense Strategies

In this session, I will discuss essential defensive strategies you can deploy and protect from the majority of the attacks that are in the news. I will show quick win that you can deploy that will make you organization more difficult to attack. The session will conclude with a demonstration of how to setup segmentation and isolation to protect your networks.

Panelists: My-Ngoc Nguyen, Diane Delaney, Shea McHugh, Andrea Hoy, Max Shuftan  5:00 – 6:00pm
SANS CONNECT: WOMEN IN SECURITY AND TECHNOLOGY PANEL

 

 Reception  6:00 – 9:00pm
SUMMIT 9 OPENING RECEPTION! – “Join your friends under the stars…”

 

 

Summit Day – 05.19.2017

 at 7:30
REGISTRATION, BREAKFAST, AND VENDOR EXPO

 

  Richard Greenberg, Summit Chair  at 8:15
WELCOME ADDRESS

 

 Keynote: FIGHTING SOPHISTICATED ATTACKS WITH ADVANCED PERSISTENT SECURITY  at 8:30
OPENING KEYNOTE WITH IRA WINKLER

 

 Sponsor Event: enSilo   at 9:20
DIAMOND SPONSOR GREETING WITH ROY KATMOR

 

 Keynote: 7 VERTICAL LESSONS & 1 ESSENTIAL QUESTION FOR LEADING WITH IMPACT  at 9:30
KEYNOTE WITH MANLEY FEINBERG

 

 at 10:20
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

 Sponsor Event  at 5:00
PLATINUM SPONSORS GREETINGS

 

 KEYNOTE: SCALING THE DATA MOUNTAIN WITHOUT PUTTING PRIVACY AT RISK   at 5:10
CLOSING KEYNOTE WITH RICHARD STIENNON

 

 Reception  at 6:00
COCKTAIL RECEPTION AND RAFFLE PRIZES

 at 10:20
BREAK & VENDOR EXPO

 

 Panelists: Dave Babcock, Warren Kato  at 11:00
LAW ENFORCEMENT PANEL 

 

 Bob Bigman  at 12:00

THE TRUTH ABOUT CYBER SECURITY

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Jennifer Granick  at 2:30

AMERICAN SPIES, MODERN SURVEILLANCE, AND YOU.

 Eva Galperin  at 3:30

WHEN GOVERMENTS ATTACK: MALWARE TARGETING ACTIVISTS, LAWYERS, AND JOURNALISTS

 at 4:20
BREAK & VENDOR EXPO

 

 at 10:20
BREAK & VENDOR EXPO

 

Panelists: Suedy Renner, Chenxi Wang, Debra Farber, Jennifer Granick, Erin Richards  at 11:00
WOMEN IN SECURITY PANEL

 

Chenxi Wang at 12:00
DIGITAL TRUST IN THE ERA OF ARTIFICIAL INTELLIGENCE

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Valerie Thomas  at 2:30
DEFENDING THE ENTERPRISE AGAINST SOCIAL ENGINEERING ATTACKS

 

 Bill Cheswick  at 3:30
COMPUTER SECURITY: I THINK WE CAN WIN!

 

 at 4:20
BREAK & VENDOR EXPO

 

  at 10:20
BREAK & VENDOR EXPO

 

 Yun-kyung (Peggy) Lee, Office of Civil Rights  at 11:00
HIPAA, OCR, BREACHES, AUDITS AND YOU!

 

  Panelists: Richard GreenbergChris W. Joerg, Stan Banash, Todd Friedman, Brian Kreitzer  at 12:00
HEALTHCARE CISO PANEL

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Panelists: Cynthia Stamer, and Jennifer Rathburn at 1:30
 LUNCH PANEL DISCUSSION ON PRIVACY AND SECURITY

 

 Evan Wheeler  at 2:30
OVERHAULING YOUR RISK MANAGEMENT PROGRAM

 

  Panelists: James Brady, Mark Kadrish, Gary Gooden  at 3:30
PANEL: WHAT INITIATIVES ARE ON THE HORIZON IN HEALTHCARE, AND HOW CAN WE SECURE THEM?

 

 at 4:20
BREAK & VENDOR EXPO

 at 10:20
BREAK & VENDOR EXPO

 

 Eric Chien  at 11:00
ACHIEVING A TOTAL POWER BLACKOUT BY LIVING OFF THE LAND

 

Sponsor Event: Roy Katmor  at 12:00
DIAMOND SPONSOR: enSilo

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Andea Hoy  at 2:10
ISSA INTERNATIONAL – UPDATE

 

 Jim Manico  at 2:30
OWASP TOP TEN FOR 2017

 

 Sponsor Event  at 3:30
DIAMOND SPONSOR

 

 at 4:20
BREAK & VENDOR EXPO

 at 10:20
BREAK & VENDOR EXPO

 

 Mark Weatherford  at 11:00
WELCOME ADDRESS: THE INTERNET OF (INSECURE)THINGS: WE FORGOT ‘THE CYBER’

 

 Diana Kelley  at 12:00
 SUPERSIZED CYBERSECURITY GROUNDHOG DAY – INSIGHTS FOR PREVENTING 2016 FROM REPEATING

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 CISO Lunch  at 1:40
CISO ROUNDTABLE DISCUSSIONS

 

 Presentors: Dan Meacham, Mike Villegas, David K Son, Scott Hennon  at 2:30
ROUNDTABLE DISCUSSION PRESENTATIONS

 

 Panelists: Richard GreenbergMalcolm Harkins, Gary HayslipBruce Phillips and Robb Reck  at 3:30
CISO CLOSING PANEL

 

 at 4:20
BREAK & VENDOR EXPO

 

 

 Presented by Marcus Richerson, Alex Kissinger, Erik Parreira  9:00– 4:00pm

CAPTURE THE FLAG/CHALLENGE ROOM

Our friends from Somerset Recon and AttackIQ prepared all day program!!!!

 at 11:00
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

 Registration and Vendor Expo  at 7:30am to 6:00pm
REGISTRATION & VENDOR EXPO

 

Summit Pricing

Discount Price will end soon!

Need help to convince your Boss, click –> Convince Your Boss letter

DISCOUNT
GENERAL ADMISSION

$125 /DAY

    May 19th Only

    Summit Day

    Hear from our great lineup of speakers

    Sales End – April 30th!

    May 1st – May 19th – $175

    May 19th – $299

The Universal City Hilton

555 Universal Hollywood Dr, Universal City, CA 91608

 

Reservations

Guests can call the Hilton Reservations Department directly at 818-623-1434; they just need to refer to group code ISSA when booking their room.

Group rate of $199 plus tax is available until the group cut-off date of April 26th, or until the room block fills up.

The Hilton Reservation Dept can assist attendees with specific room types and extending their stay, based upon availability.

Airport Transfer Options:

The Universal Hilton is accessible by car, Super-shuttle and taxi from both LAX and Burbank airports.

Parking at the Universal Hilton

Parking with validation is $12 for self parking and $20 for valet.

 

SPONSORS

Diamond Sponsors

Emerald Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

CISO Lunch Forum

 

 

34
SPEAKERS

The best minds in information security

48
HOURS

Packed with information from multiple disciplines

5
CONCURRENT SESSIONS

Room to host all the diverse topics

 

 

 

 

FAQ

Frequently Asked Questions for Summit 9

Yes, Thursday, May 18th 2017 – seating is limited.
7:30 am – 6:30 pm on Friday, May 19th
Hilton Los Angeles/Universal City
555 Universal Hollywood Dr, Universal City, CA 91608
(818) 506-2500
Parking with validation is $12 for self parking and $20 for valet, payable upon exit to the Hilton Hotel garage (cash and major credit cards accepted).
The Summit will take place in Sierra Ballrooms and Sierra Foyer Registration – Vendor Expo – Sierra Foyer and Sierra Circle Keynotes – Both Opening and Closing – Sierra Ballrooms Sessions throughout the day – including Tracks and Forums will take place in Meeting Rooms
CTF (Capture The Flag competition), Lock-picking, with prizes awarded at the Cocktail Party
Summit Training takes place and four all day sessions are offered Learn more and register – classroom seating is limited.
8 for attending the full Summit day on May 19th
8 for attending the full Training day on May 18th
Be sure and include your CISSP # when you register
FREE WiFi will be available for all registered summit attendees
ISSA – LA Chapter has regular monthly meetings with awesome presentations – JOIN US

Didn’t find the answer to your question? Ask a Question.

Loading

Summit Information

Questions comments or concerns? We want to hear from you!

 

Join the group on LinkedIn
555 Universal Hollywood Dr., Universal City
admin@issa-la.org
(213) 536-1414

Back to Top