Information Systems Security Association, Inland Empire Chapter

Chapter Meetings

Typically, meetings occur every two Months on the fourth Tuesday.

Typically, meetings take place at Coco's in Upland, CA

Next Meeting

Previous Meetings

2018

October 23, 2018 6:00pm — 8:00pm
Michael Tyk on Incident Response (IR) [pdf]

August 28, 2018 6:00pm — 8:00pm
Lou Rabon on Scary Stories from the Front Lines of Incident Response [pdf]

2017

October 24, 2017 6:00pm — 8:00pm
Michael Haag on Detecting and Preventing the Adversary [pdf]

August 29, 2017 6:00pm — 8:00pm
David Hawkins, CISSP on The Cisco Midyear Cybersecurity Report [pdf]

April 25, 2017 6:00pm — 8:00pm
Tej Aulakh & Kurt Kumar on Blockchain - What does it mean for Cybersecurity? [pdf]
Speaker's Biography: Tej Aulakh, Kurt Kumar

February 21, 2017 6:00pm — 8:00pm
Charles Johnson, Alert Logic on Protecting yourself from top threats for 2017 [pdf]

2016

November 29, 2016 6:00pm — 8:00pm
Josh Chin on Preparing for Doomsday: Incident Response Program Development [pdf]

October 27, 2016 6:00pm — 8:00pm
Matthew Schuler on Security Information and Event Managemet (SIEM) [pdf]

2015

March 31st, 2015 6:00pm — 8:00pm
Matt Ricketts and Rohit Madhok on The Multi-Layered Approach to Threat Prevention

2014

December 9, 2014 5:30pm — 8:30pm
Michael C. Sohn speaks at End of the Year Gala 2014

Oct 28, 2014
Postponed

Sept 30, 2014 11:00am — 2:00pm
Ron Perris on Building Resilience to Phishing Attacks

Aug 26, 2014
Postponed

July 29, 2014 6:30pm — 8:30pm
David Falkenstein on Barebones/Lightweight Web Application Hacking

May 27, 2014 6:30pm — 8:30pm
Mike Villegas on PCI 3.0

April 29, 2014 11:30 — 1:30pm
Terry Gold on Physical Security

April 1, 2014 11:30 — 1:30pm
Armando Lopez on Career Day: Ask a Recruiter

February 25, 2014 11:30 — 1:30pm
Ted Byerly on Computer Investigations

January 28, 2014 11:30 — 1:30pm
Nicholas Buchanan on Identity and Access Management

2013

November 19, 2013 6pm — 9pm
November 2013 - End of the Year Gala

October 22, 2013 11:30am — 1:00pm
Postponed

September 24, 2013 11:30am — 1:00pm
IDMWORKS on Challenges of Managing Identities

July 23, 2013 11:30am — 1:00pm
Round-table discussion — event correlation, red-flags, and metrics

May 28, 2013 10:00am — 12:00pm
AccessData on Cerberus: Malware Triage & Analysis

March 26, 2013
Garett Grajek on Security Native Mobile Applications

2012

November 27, 2012
2012 End of the Year Gala

October 30, 2012
Postponed

September 25, 2012 6:30pm
Jim Sortino & Kipp Berdianski on Protecting your Infrastructure Proactively: Building the First Line of Defense

August 28, 2012 11:30am 1:30pm
Kelly Fitzgerald on Celluloid Dreams: The Nuts and Bolts of Mobile Technology & Security

July 31, 2012 11:30am 1:30pm
Postponed

June 26, 2012 6:30pm 8:30pm
Cuc N. Du on Security Monitoring Processes

May 29, 2012 11:30am 1:30pm
Debbie Christopherson on Transforming IT: Security Risk Management for the Coming Decade

April 24, 2012 11:30am 1:30pm
Jerry Hoff on How to add security to your SDLC

March 27, 2012 6:30pm 8:30pm
Postponed

February 28, 2012 11:30am 1:30pm
Postponed

January 31, 2012 11:30am 1:30pm
Genevieve Turner on Deletions, Sanctions, and the Value of Computer Forensics

2011

November 15th, 2011 6:00-9:00pm
Title: End of the Year Gala

October 25th, 2011 11:30-1:30pm
Postponed to accommodate 26th Annual ISSA SoCal Security Symposium

September 27, 2011 6:30-8:30pm
Title: Mike Beard on Critical Decision Making — Deciding How to Decide

August 30, 2011 11:30-1:30pm
Title: Tomás Byrens on Beyond Signatures & DPI: The Next Frontier in Corporate Security

July 26, 2011 11:30-1:30pm
Title: Chuck Riordan on Managing Risk: How to Balance Compliance While Mastering Security

June 28, 2011 6:30-8:30pm
Title: Dean Ocampo on Moving to the Cloud without Falling off a Cliff-Cloud Security Today

May 31, 2011 11:30-1:30pm
Title: David Nardoni and Jef Dye on Anatomy of an APT Attack

April 26th, 2011 11:30-1:30pm
Title: Russell Densmore on Information Security and Privacy — Independent Dependence

March 29th, 2011 6:30-8:30pm
Title: Chris Curran on A Practicing State of Cellphone Forensics
Minutes: Board Meeting (.docx)

February 22nd, 2011 11:30-1:30pm
Title: Rick DuVall on Cloud Computing
Minutes: Board Meeting (.docx)

January, 2011
Minutes: Board Meeting (.docx)

2010

November 16th, 2010 6:00-9:00pm
Title: November Gala

October 26th, 2010 11:30-1:30pm
Title: Postponed
Minutes: Board Meeting (.doc)

September 28th, 2010 11:30-1:30pm — Gary Pierce, Inland Empire ISSA Chapter
Title: Gary Pierce on Training our Cyber Defense: a learn by doing approach
Minutes: Meeting (.doc), Board Meeting (.doc)

August 31th, 2010 11:30-1:30pm — Brian Tokuyoshi, Symantec
Title: Brian Tokuyoshi on Too Many Encryption Keys
Minutes: Meeting (.doc)

July 27th, 2010 11:30-1:30pm — Dennis London, Orange County ISSA Chapter
Title: Dennis London on Security is a process, not a product!
Minutes: Meeting (.doc), Board Meeting (.doc)

June 29th, 2010 11:30-1:30pm — TBA
Title: Cloud Computing Webinar
Minutes: Board Meeting (.doc)

May 25th, 2010 6:30-8:30pm — Daniel Balnder, CEO InfoSecurityLab Inc.
Title: Daniel Blander on How to Make Seurity Awareness Work at Your Company
Minutes: Meeting (.doc), Board Meeting (.doc)

April, 27th, 2010 11:30-1:30pm — Clint Pollock, Veracode
Title: Clint Pollock on Understanding Application Backdoors
Minutes: Meeting (.doc), Board Meeting (.doc)

March, 30th, 2010 11:30-1:30pm — Ali Pabrai, CEO of ecfirst
Title: Ali Pabrai on Getting Started with ISO 27000 — The Global Information Security Standard
Minutes: Board Meeting (.doc)

February, 23th, 2010 11:30-1:30pm — Anthony Di Bello, Compliance and Cybersecurity Solutions Guidance Software, Inc.
Title: Anthony Di Bello on Regulatory compliance in the Digital Age: Managing Endpoint Risk

January, 26th, 2010 11:30-1:30pm — Livio Ricciulli, President, MetaFlows Inc.
Livio Ricciulli on An Application Service Model for Network Security Applications

2009

Tuesday, November 24th, 2009 — Andy Spruill, Guidance Software
Andy Spruill on e-Discovery in the Trenches
Minutes: Board Meeting (.doc)

Tuesday, October 27th, 2009 — Seth Cox, Protiviti
Seth Cox on e-Discovery
Minutes: Board Meeting (.doc)

September 29th, 2009 — Rodney Kocot, Systems Control and Security Incorporated
Rodney Kocot on Audit and Security of Active Directory an Overview
Minutes: Meeting (.doc), Board Meeting (.doc)

August 25th, 2009 — Dr. Javier Torner
Dr. Javier Torner on What is Information Security Governance?
Minutes: Meeting (.doc), Board Meeting (.doc)

July 28th, 2009 — Postponed
N/A
Minutes: Board Meeting (.doc)

June 23th 2009 — Fernando Lara, Singular Security Inc.
Fernando Lara on Risk & Compliance Management ISO/IEC 27001:2005
Minutes: Meeting (.doc), Board Meeting (.doc)

May 26th 2009 — Andy Spruill, Guidance Software
Andy Spruill on The Etiquette of Being Deposed
Minutes: Board Meeting (.doc)

April 28th, 2009 — Postponed
N/A

March 24th, 2009 — Ben Denkers, Foundstone, a Division of McAfee
Penetration Testing Process
Minutes: Meeting (.doc), Board Meeting (.doc)

February 24th, 2009 — Rich Chew, Enterprise Risk Management Consultant
Compliance, Audit, Best Practice & the Road to Governance
Minutes: Meeting (.doc), Board Meeting (.doc)

January 27th, 2009 — Richard Hall, ChosenSecurity
Real World & Practical PKI Deployments
Minutes: Meeting (.doc)

2008

December 2nd, 2008 — Brian Herzig, Partner Development for Impulse
Network Access Control — Ready for Prime Time

November 25th, 2008 — Postponed
N/A
Agreed to cancel regular December meeting.

October 26th, 2008 — Eddie Schwartz, NetWitness
How to Stop Advanced Persistent Threats from Evading Detection

September 23rd, 2008 — Postponed
N/A

August 26th, 2008 — Eddie Schwartz, NetWitness
Detection of Beacon Trojans & Advanced Data Exfiltration Techniques

July 22nd, 2008 — Postponed
N/A

June 24th, 2008 — Peter Mylonakos, RSM McGladrey, Inc
PCI: An Analysis of the Challenges & Opportunities of Compliance

May 27th, 2008 — Seth Cox, Protiviti
Incident Response & Forensic Analysis

April 22nd, 2008 — Taylor McKinley, Fortify Software
Integrating Security into the QA Group

March 25th, 2008 — Will Irace, IBM Internet Security Systems
A Framework for Addressing Data Leakage

February 26th, 2008 — Sander Temme, nCipher
Enterprise Encryption Challenges

January 22nd, 2008 — N/A
Planning Meeting/ Board Elections

© 2008 Inland Empire Chapter of ISSA