WELCOME TO THE NINTH ANNUAL
INFORMATION SECURITY SUMMIT

Presented by the Information Systems Security Association Los Angeles Chapter

 

Get ready for your 1-day Training and 1-day Summit experience

TRAINING on MAY 18th & SUMMIT on MAY 19th

Hosted at the UNIVERSAL CITY HILTON

Discount Price Ends Soon!

OVERVIEW

The ISSA-LA Information Security Summit is the premier cybersecurity event in Southern California. IT and InfoSec executives, leaders, analysts, and practitioners will be gathering May 18-19, 2017 at the Universal City Hilton to learn from the experts, exchange ideas with their peers, and enjoy conversations with the community. With expected attendance of 1000 or more, this is an event you and your company simply cannot afford to miss.

  FIGHT CYBERCRIME TOGETHER

 

The goal of the 2-day summit is to help Southern California stay safe from cybercrime by enabling the necessary collaboration between business, technical IT professionals, law enforcement, nonprofit and community leaders, government, and the information security community at large.

JACK DANIEL Leading Technology Community Activist

JACK DANIEL, Leading Technology Community Activist, Speaking at Summit 8

IRA WINKLER
President Secure Mentem

“THIS SUMMIT IS ONE OF THE LARGEST AND MOST DIVERSE CONFERENCES. IT OFFERS A SERIES OF SPEAKERS WHO WOULD NORMALLY BE KEYNOTE SPEAKERS AT OTHER EVENTS.”

  THE BEST SPEAKERS IN THE INDUSTRY

 

Every year we have some of the industry’s best speakers present the latest trends, strategies, and technologies related to information security.

DON'T MISS OUT Ask questions from the Leaders in information security

DON’T MISS OUT Ask questions from the best in information security

  EVERYONE IS INVITED

 

Registration for the event is open to anyone interested in learning more about information security: business professionals in law, healthcare, accounting, insurance and banking; technical and operational IT personnel; law enforcement professionals fighting cybercrime; faculty and students. We welcome all people of all experience levels from all industries.

  BUILD RELATIONSHIPS

 

Network with our community to gain insight, proven best practices, and cutting edge information that can guide your information security programs, help you in your careers, and benefit your company. Make a lasting impact that counts across the board.

CONNECT Collaborate with other professionals to fight cybercrime together

CONNECT Collaborate with other professionals to fight cybercrime together

RAFAL LOS
Executive advisor | Cyber security strategist – ‎Optiv Inc

“THE FOLKS THAT SHOW UP HERE ARE THE BUILDING BLOCKS OF WHAT INFORMATION SECURITY IS AT THE EXECUTIVE LEVEL”

  HOSTED BY THE PREMIER INFORMATION SECURITY ASSOCIATION

 

The Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) is the premier catalyst and information source in Los Angeles for improving the practice of information security. The Chapter provides educational programs for information security and IT professionals. The Chapter also conducts outreach programs to businesses, financial institutions, nonprofits, governmental agencies, and consumers.

 

 

Speakers

Top experts will tell you about the latest advanced technologies


Richard Stiennon
Chief Strategy Officer at Blancco Technology Group
Richard Stiennon is a security executive with 20 years experience spanning subject matters in cybersecurity, governance, risk, compliance and analytics.


Ira Winkler
President at Secure Mentem
Ira Winkler, CISSP, is President of Secure Mentem and Co-Host of the Irari Report.


Manley Feinberg
Business Leadership Expert
Manley is recognized as an award winning international keynote speaker and business leader, author, published outdoor adventure photographer and professional musician.

Bob Bigman
Cyber Security Consultant
Robert Bigman retired in 2012 from the Central Intelligence Agency (CIA), after serving a thirty year distinguished career, the last 15 as the CISO.

Valerie Thomas
Technical Support Specialist at SunBriteTV
Securicon LLC specializes in social engineering and physical penetration testing.

Bill Cheswick
Visiting scholar at University of Pennsylvania
Bill Cheswick is a computer security and networking researcher, interested in visualization, user interfaces, security and security usability.

Chenxi Wang
Board Member at Cyber Diversity Foundation
Chenxi Wang is Chief Strategy Officer of Twistlock, and the security and privacy chair of the 2016 Grace Hopper conference.


Debra J. Farber
Co-Founder of Women in Security and Privacy
Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur, and Founder and CEO of Orinoco Privacy

Jim Manico
Owner of Manicode Security
Jim Manico is the VP of Security Architecture for WhiteHat Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security.


Eva Galperin
Director of Cybersecurity at the Electronic Frontier Foundation
Eva Galperin’s work is primarily focused on privacy and security for vulnerable populations around the world.

Jennifer Granick
Director of Civil Liberties
Jennifer Granick received Duo Security’s Women in Security Academic Award for her expertise in the field as well as her direction and guidance for young women in the security industry.


Liam O’Murchu
Director, Security Technology & Response group at Symantec
Liam O’Murchu is one of the world’s top computer security experts, having discovered the virus that targetted Iran’s nuclear plants.

Eric Chien
Distinguished Engineer at Symantec
Eric Chien leads a deep analysis team of engineers that investigate and reverse-engineer the latest high-impact Internet security attacks

Mark Weatherford
Chief Cybersecurity Strategist at vArmour
Mark Weatherford brings more than 20 years of security operations leadership and executive-level policy experience in some of the most important organizations in the world.


Diana Kelly
Global Executive Security Advisor to IBM Security
Diana Kelley is an internationally recognized information security expert, speaker, strategic advisor, market analyst and writer.

Malcolm Harkins
Chief Security and Trust Officer at Cylance Inc.
Previously Harkins was VP and Chief Security and Privacy Officer (CSPO) at Intel Corporation, responsible for managing the risk, controls, privacy, security and other compliance activities for Intel


Suedy Renner
Principal Management Consultant at Vast Technology Solutions Group
Suedy Renner has successfully delivered various high profile global projects and innovative solutions for Fortune 100 companies for the last 25+ years.


Mike Villegas
Vice President – K3DES
Over a span of 30 years, Mike has been a CISO for a large online retailer, partner for two “Big Four” consulting firms over a span of nine years, VP of IT risk management.


Matt Lehman
VP of Information Security at Ring.com
In his role he is responsible for security governance and operations as well as overall technology governance and leadership.


Scott Hennon
Information Security Audit & Risk Mgmt/CISO Leader
In his role, Scott provides leadership and guidance for safeguarding private sensitive information against accidental or unauthorized modification, destruction or disclosure.


Dan Meacham
Cybersecurity Leader and Boardmember
Mr. Meacham is recognized as a top contributor to the information security community through support and advisory board membership at the University of Dallas, Texas A & M University, UCLA Extensions, and VHA.


Evan Wheeler
Cybersecurity / C4ISR Software Lead
Evan Wheeler is an expert in information security and operational risk management for organizations in many critical infrastructure sectors.

Erin Richards
Director of Risk Management at Oracle Corporation
Erin Richards has been in the Oracle Cloud Services organization for the past 15 years, leading a culturally diverse global team.

.


James Brady
Area CIO at Kaiser Permanente Orange County

James Brady is the recipient of Becker’s Hospital Review 2017 List of Hospital and Health System CIOs to Know.


Brian Kreitzer
CISO at UCLA Health
Brian Kreitzer is recognized as a top expert in financial and operational analysis including SLA management to improve efficiency and save money.


Todd Freidman
Chief Information Security Officer at ResMed
Todd Freidman a seasoned leader dedicated to leveraging information security and risk management to improve business performance.

Robert Pittman
Dr. Pittman is the County of Los Angeles CISO
Dr. Robert Pittman oversees 34 major County departments with a workforce that exceeds 103,000 employees, a budget of $27.2 billion, and thirty-four line of businesses.


Chris Joerg
CISO at Cedars-Sinai
Chris Joerg is a Global Business Leader and Information Security Industry Expert with proven record for developing, running, and continually improving information security strategy, organizations and infrastructure.


Yun-kyung (Peggy) Lee
Supervisory EOS at US Department of Health and Human Services
Yun-kyung is recognized as a top expert in financial and operational analysis including SLA management to improve efficiency and save money.

.


Cynthia Stamer
Management & Regulatory Attorney at Cynthia Marcotte Stamer, P.C.
Cynthia Stamer helps businesses and government leaders manage people and processes to achieve business and operational objectives and manage legal and other risks using in-depth human resources, insurance, employee benefits, health care, corporate compliance and other legal knowledge.


Gary Hayslip
CISO, Deputy Director, – City of San Diego, CA
In November 2015, Mr. Hayslip was honored by T.E.N. Inc. and awarded the Information Security Executive – ISE® “People Choice Award for North America”

Agenda

 

 Peter Kim   8:00 – 4:00pm
TRAINING: Real World Red Team Attacks

The days of exploiting MS08-067, encoding with Shikata Ga Nai, and blindly scanning are gone.  Both Blackhat hackers and pentesters alike have shifted to using more advanced techniques to bypass AV, implement a smaller footprint to evade SIEM detection, and continually stay persistent to devastate enterprise networks.  If you are looking to take your craft to the next level, this is the primer course for you.

Written and taught by the author of “The Hacker Playbook” series, Peter Kim will take you through an immensely hands-on experience to replicate real world attacks without even running a single vulnerability scanner.  In this hands-on experience, you will take on the role of a malicious Blackhat attacker and infiltrate your way into a corporate network.  The onsite lab will emulate a real network using only modern operating systems.

 

 Kevin Cardwell   8:00 – 4:00pm
TRAINING: Essential Defense Tactics

In this hands-on training you will learn the foundation of security and defending architectures from attack. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the IT corporate networks as well as industrial control networks. You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set you will look at the best practices recommendations when it comes to reducing the attack surface. You will learn a systematic process of intrusion and malware analysis.

This intensive course will introduce an attack that completely compromises systems and networks, once you have done this you will design defensive mechanisms to either prevent the attack, or isolate it if prevention is not possible.

 

 Jim Manico   8:00 – 4:00pm
TRAINING: Web Security Attack & Defense

This training will teach both an attack and defense perspective on a wide range of web application security issues. The presenters will illustrate each specific web security vulnerabilities, demonstrate several exploitation techniques, guide students though a series of hands-on labs on how to conduct the same attack, and then demonstrate developer-centric defense methods to stop said attacks deep in code. We will also analyze several recent and devastating real world web application hacks and explain how they could have been stopped via defensive coding techniques.

 Mickael Felker   8:00 – 4:00pm
TRAINING: Information Security Management Boot Camp for IT Professionals

Information security has become part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Adding to the security management challenge, users are demanding to work from anywhere on any device.

Designed for both in-house IT staff and IT vendors, ISSA-LA’s Information Security Management Boot Camp combines practical advice with sound security management insight.

 Jason Spaltro  4:00 – 5:00pm
TALK: WOMEN IN SECURITY AND TECHNOLOGY

 

 SANS CONNECT  5:00 – 6:00pm
NETWORKING EVENT: Women’s CONNECT Event

 

 Reception  6:00 – 8:00pm
RECEPTION: SUMMIT 9 OPENING!

 

 

 at 10:20
BREAK & VENDOR EXPO

 

 Jeff Bardin  at 11:00

 

 Bob Bigman  at 12:00

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Jennifer Granick  at 2:30

 

 Eva Galperin  at 3:30

 

 at 4:20
BREAK & VENDOR EXPO

 

 at 10:20
BREAK & VENDOR EXPO

 

 Women In Security  at 11:00
WOMEN IN SECURITY PANEL

 

Chenxi Wang at 12:00

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Valerie Thomas  at 2:30

 

 Bill Cheswick  at 3:30

 

 at 4:20
BREAK & VENDOR EXPO

 

  at 10:20
BREAK & VENDOR EXPO

 

 Yun-kyung (Peggy) Lee  at 11:00
HEALTHCARE PRIVACY AND SECURITY FORUM

 

  Chris W. Joerg, Gary Gooden, Todd Freiman, Brian Kreitzer  at 12:00
HEALTHCARE CISCO PANEL

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Panel  at 1:30
 LUNCH PANEL DISCUSSION

 

 Evan Wheeler  at 2:30
HEALTHCARE PRIVACY AND SECURITY FORUM

 

 at 4:20
BREAK & VENDOR EXPO

 at 10:20
BREAK & VENDOR EXPO

 

 Jim Manico  at 11:00
SECURITY

 

Sponsor Event  at 12:00
DIAMOND SPONSOR

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Liam O’Murcha & Eric Chien  at 2:30

 

 Eric Chien & Liam O’Murcha  at 2:30

 

 

 Sponsor Event  at 3:30
DIAMOND SPONSOR

 

 at 4:20
BREAK & VENDOR EXPO

 at 10:20
BREAK & VENDOR EXPO

 

 Mark Weatherford  at 11:00
WELCOME ADDRESS BY MARK WEATHERFORD

 

 Diana Kelley  at 12:00
 

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 CISO Lunch  at 1:40
ROUNDTABLE DISCUSSION

 

 Breakout Presentations  at 2:30
ROUNDTABLE DISCUSSION PRESENTATIONS

 

 Robert Pittman & Malcolm Harkins  at 3:30
CISO PANEL

 

 at 4:20
BREAK & VENDOR EXPO

 

 at 11:00
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

 at 7:30
REGISTRATION, BREAKFAST, AND VENDOR EXPO

 

 Welcome Address  at 8:15
WELCOME ADDRESS

 

 Keynote  at 8:30
OPENING KEYNOTE WITH IRA WINKLER

 

 Sponsor Event  at 9:20
DIAMOND SPONSORS GREETINGS

 

 Keynote  at 9:30
KEYNOTE WITH MANLEY FEINBERG

 

 at 10:20
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

 Sponsor Event  at 5:00
PLATINUM SPONSORS GREETINGS

 

 Richard Stiennon  at 5:10

 

 Reception  at 6:00
COCKTAIL RECEPTION AND RAFFLE PRIZES

 Registration  at 7:30am to 6:00pm
REGISTRATION, BREAKFAST & VENDOR EXPO

 

Summit Pricing

Discount Price will end soon!

DISCOUNT
GENERAL ADMISSION

$125 /DAY

    May 19th Only

    Summit Day

    Hear from our great lineup of speakers

    Sales End – April 30th!

    May 1st – May 19th – $175

    May 19th – $299

i Venue information

555 Universal Hollywood Dr, Universal City, CA 91608

 

Reservations

Guests can call the Hilton Reservations Department directly at 818-623-1434; they just need to refer to group code ISSA when booking their room.

Group rate of $199 plus tax is available until the group cut-off date of April 26th, or until the room block fills up.

The Hilton Reservation Dept can assist attendees with specific room types and extending their stay, based upon availability.

Airport Transfer Options:

The Universal Hilton is accessible by car, Super-shuttle and taxi from both LAX and Burbank airports.

Parking at the Universal Hilton

Parking with validation is $12 for self parking and $20 for valet.

 

SPONSORS

Diamond Sponsors

Emerald Sponsors

Gold Sponsors

CISO Lunch Forum

 

 

23
SPEAKERS

The best minds in information security

48
HOURS

Packed with information from multiple disciplines

5
CONCURRENT SESSIONS

Room to host all the diverse topics

 

 

 

 

FAQ

Frequently Asked Questions for Summit 9

Yes, Thursday, May 18th 2017 – seating is limited.
7:30 am – 6:30 pm on Friday, May 19th
Hilton Los Angeles/Universal City
555 Universal Hollywood Dr, Universal City, CA 91608
(818) 506-2500
Parking with validation is $12 for self parking and $20 for valet, payable upon exit to the Hilton Hotel garage (cash and major credit cards accepted).
The Summit will take place in Sierra Ballrooms and Sierra Foyer Registration – Vendor Expo – Sierra Foyer and Sierra Circle Keynotes – Both Opening and Closing – Sierra Ballrooms Sessions throughout the day – including Tracks and Forums will take place in Meeting Rooms
CTF (Capture The Flag competition), Lock-picking, with prizes awarded at the Cocktail Party
Summit Training takes place and four all day sessions are offered Learn more and register – classroom seating is limited.
8 for attending the full Summit day on May 19th
8 for attending the full Training day on May 18th
Be sure and include your CISSP # when you register
FREE WiFi will be available for all registered summit attendees
ISSA – LA Chapter has regular monthly meetings with awesome presentations – JOIN US

Didn’t find the answer to your question? Ask a Question.

Loading

Summit Information

Questions comments or concerns? We want to hear from you!

 

Join the group on LinkedIn
555 Universal Hollywood Dr., Universal City
admin@issa-la.org
(213) 536-1414

Back to Top