Typically, meetings occur every two Months on the fourth Tuesday.
Typically, meetings take place at Coco's in Upland, CA
March 26, 2019 6:00pm — 8:00pm
Kurt Lee, Pwnie Express on Closing the IoT Security Gap [pdf]
October 23, 2018 6:00pm — 8:00pm
Michael Tyk on Incident Response (IR) [pdf]
August 28, 2018 6:00pm — 8:00pm
Lou Rabon on Scary Stories from the Front Lines of Incident Response [pdf]
October 24, 2017 6:00pm — 8:00pm
Michael Haag on Detecting and Preventing the Adversary [pdf]
August 29, 2017 6:00pm — 8:00pm
David Hawkins, CISSP on The Cisco Midyear Cybersecurity Report [pdf]
April 25, 2017 6:00pm — 8:00pm
Tej Aulakh & Kurt Kumar on Blockchain - What does it mean for Cybersecurity? [pdf]
Speaker's Biography: Tej Aulakh, Kurt Kumar
February 21, 2017 6:00pm — 8:00pm
Charles Johnson, Alert Logic on Protecting yourself from top threats for 2017 [pdf]
November 29, 2016 6:00pm — 8:00pm
Josh Chin on Preparing for Doomsday: Incident Response Program Development [pdf]
October 27, 2016 6:00pm — 8:00pm
Matthew Schuler on Security Information and Event Managemet (SIEM) [pdf]
March 31st, 2015 6:00pm — 8:00pm
Matt Ricketts and Rohit Madhok on The Multi-Layered Approach to Threat Prevention
December 9, 2014 5:30pm — 8:30pm
Michael C. Sohn speaks at End of the Year Gala 2014
Oct 28, 2014
Postponed
Sept 30, 2014 11:00am — 2:00pm
Ron Perris on Building Resilience to Phishing Attacks
Aug 26, 2014
Postponed
July 29, 2014 6:30pm — 8:30pm
David Falkenstein on Barebones/Lightweight Web Application Hacking
May 27, 2014 6:30pm — 8:30pm
Mike Villegas on PCI 3.0
April 29, 2014 11:30 — 1:30pm
Terry Gold on Physical Security
April 1, 2014 11:30 — 1:30pm
Armando Lopez on Career Day: Ask a Recruiter
February 25, 2014 11:30 — 1:30pm
Ted Byerly on Computer Investigations
January 28, 2014 11:30 — 1:30pm
Nicholas Buchanan on Identity and Access Management
November 19, 2013 6pm — 9pm
November 2013 - End of the Year Gala
October 22, 2013 11:30am — 1:00pm
Postponed
September 24, 2013 11:30am — 1:00pm
IDMWORKS on Challenges of Managing Identities
July 23, 2013 11:30am — 1:00pm
Round-table discussion — event correlation, red-flags, and metrics
May 28, 2013 10:00am — 12:00pm
AccessData on Cerberus: Malware Triage & Analysis
March 26, 2013
Garett Grajek on Security Native Mobile Applications
November 27, 2012 —
2012 End of the Year Gala
October 30, 2012 —
Postponed
September 25, 2012 6:30pm —
Jim Sortino & Kipp Berdianski on Protecting your Infrastructure Proactively: Building the First Line of Defense
August 28, 2012 11:30am 1:30pm —
Kelly Fitzgerald on Celluloid Dreams: The Nuts and Bolts of Mobile Technology & Security
July 31, 2012 11:30am 1:30pm —
Postponed
June 26, 2012 6:30pm 8:30pm —
Cuc N. Du on Security Monitoring Processes
May 29, 2012 11:30am 1:30pm —
Debbie Christopherson on Transforming IT: Security Risk Management for the Coming Decade
April 24, 2012 11:30am 1:30pm —
Jerry Hoff on How to add security to your SDLC
March 27, 2012 6:30pm 8:30pm —
Postponed
February 28, 2012 11:30am 1:30pm —
Postponed
January 31, 2012 11:30am 1:30pm —
Genevieve Turner on Deletions, Sanctions, and the Value of Computer Forensics
November 15th, 2011 6:00-9:00pm —
Title: End of the Year Gala
October 25th, 2011 11:30-1:30pm —
Postponed to accommodate 26th Annual ISSA SoCal Security Symposium
September 27, 2011 6:30-8:30pm —
Title: Mike Beard on Critical Decision Making — Deciding How to Decide
August 30, 2011 11:30-1:30pm —
Title: Tomás Byrens on Beyond Signatures & DPI: The Next Frontier in Corporate Security
July 26, 2011 11:30-1:30pm —
Title: Chuck Riordan on Managing Risk: How to Balance Compliance While Mastering Security
June 28, 2011 6:30-8:30pm —
Title: Dean Ocampo on Moving to the Cloud without Falling off a Cliff-Cloud Security Today
May 31, 2011 11:30-1:30pm —
Title: David Nardoni and Jef Dye on Anatomy of an APT Attack
April 26th, 2011 11:30-1:30pm —
Title: Russell Densmore on Information Security and Privacy — Independent Dependence
March 29th, 2011 6:30-8:30pm —
Title: Chris Curran on A Practicing State of Cellphone Forensics
Minutes: Board Meeting (.docx)
February 22nd, 2011 11:30-1:30pm —
Title: Rick DuVall on Cloud Computing
Minutes: Board Meeting (.docx)
January, 2011 —
Minutes: Board Meeting (.docx)
November 16th, 2010 6:00-9:00pm —
Title: November Gala
October 26th, 2010 11:30-1:30pm —
Title: Postponed
Minutes: Board Meeting (.doc)
September 28th, 2010 11:30-1:30pm — Gary Pierce, Inland Empire ISSA Chapter
Title: Gary Pierce on Training our Cyber Defense: a learn by doing approach
Minutes: Meeting (.doc), Board Meeting (.doc)
August 31th, 2010 11:30-1:30pm — Brian Tokuyoshi, Symantec
Title: Brian Tokuyoshi on Too Many Encryption Keys
Minutes: Meeting (.doc)
July 27th, 2010 11:30-1:30pm — Dennis London, Orange County ISSA Chapter
Title: Dennis London on Security is a process, not a product!
Minutes: Meeting (.doc), Board Meeting (.doc)
June 29th, 2010 11:30-1:30pm — TBA
Title: Cloud Computing Webinar
Minutes: Board Meeting (.doc)
May 25th, 2010 6:30-8:30pm — Daniel Balnder, CEO InfoSecurityLab Inc.
Title: Daniel Blander on How to Make Seurity Awareness Work at Your Company
Minutes: Meeting (.doc), Board Meeting (.doc)
April, 27th, 2010 11:30-1:30pm — Clint Pollock, Veracode
Title: Clint Pollock on Understanding Application Backdoors
Minutes: Meeting (.doc), Board Meeting (.doc)
March, 30th, 2010 11:30-1:30pm — Ali Pabrai, CEO of ecfirst
Title: Ali Pabrai on Getting Started with ISO 27000 — The Global Information Security Standard
Minutes: Board Meeting (.doc)
February, 23th, 2010 11:30-1:30pm — Anthony Di Bello, Compliance and Cybersecurity Solutions Guidance Software, Inc.
Title: Anthony Di Bello on Regulatory compliance in the Digital Age: Managing Endpoint Risk
January, 26th, 2010 11:30-1:30pm — Livio Ricciulli, President, MetaFlows Inc.
Livio Ricciulli on An Application Service Model for Network Security Applications
Tuesday, November 24th, 2009 — Andy Spruill, Guidance Software
Andy Spruill on e-Discovery in the Trenches
Minutes: Board Meeting (.doc)
Tuesday, October 27th, 2009 — Seth Cox, Protiviti
Seth Cox on e-Discovery
Minutes: Board Meeting (.doc)
September 29th, 2009 — Rodney Kocot, Systems Control and Security Incorporated
Rodney Kocot on Audit and Security of Active Directory an Overview
Minutes: Meeting (.doc), Board Meeting (.doc)
August 25th, 2009 — Dr. Javier Torner
Dr. Javier Torner on What is Information Security Governance?
Minutes: Meeting (.doc), Board Meeting (.doc)
July 28th, 2009 — Postponed
N/A
Minutes: Board Meeting (.doc)
June 23th 2009 — Fernando Lara, Singular Security Inc.
Fernando Lara on Risk & Compliance Management ISO/IEC 27001:2005
Minutes: Meeting (.doc), Board Meeting (.doc)
May 26th 2009 — Andy Spruill, Guidance Software
Andy Spruill on The Etiquette of Being Deposed
Minutes: Board Meeting (.doc)
April 28th, 2009 — Postponed
N/A
March 24th, 2009 — Ben Denkers, Foundstone, a Division of McAfee
Penetration Testing Process
Minutes: Meeting (.doc), Board Meeting (.doc)
February 24th, 2009 — Rich Chew, Enterprise Risk Management Consultant
Compliance, Audit, Best Practice & the Road to Governance
Minutes: Meeting (.doc), Board Meeting (.doc)
January 27th, 2009 — Richard Hall, ChosenSecurity
Real World & Practical PKI Deployments
Minutes: Meeting (.doc)
December 2nd, 2008 — Brian Herzig, Partner Development for Impulse
Network Access Control — Ready for Prime Time
November 25th, 2008 — Postponed
N/A
Agreed to cancel regular December meeting.
October 26th, 2008 — Eddie Schwartz, NetWitness
How to Stop Advanced Persistent Threats from Evading Detection
September 23rd, 2008 — Postponed
N/A
August 26th, 2008 — Eddie Schwartz, NetWitness
Detection of Beacon Trojans & Advanced Data Exfiltration Techniques
July 22nd, 2008 — Postponed
N/A
June 24th, 2008 — Peter Mylonakos, RSM McGladrey, Inc
PCI: An Analysis of the Challenges & Opportunities of Compliance
May 27th, 2008 — Seth Cox, Protiviti
Incident Response & Forensic Analysis
April 22nd, 2008 — Taylor McKinley, Fortify Software
Integrating Security into the QA Group
March 25th, 2008 — Will Irace, IBM Internet Security Systems
A Framework for Addressing Data Leakage
February 26th, 2008 — Sander Temme, nCipher
Enterprise Encryption Challenges
January 22nd, 2008 — N/A
Planning Meeting/ Board Elections
© 2008 Inland Empire Chapter of ISSA