In warm appreciation of our members, the Silicon Valley ISSA Chapter invites you to our annual Winter Holiday Party.
This is a member-preferred event, meaning SV-ISSA Members are given priority registration and exclusive access to this special gathering. Non-members are welcome to register but will be reviewed on a case-by-case basis, with no guaranteed entry.
Configuring software can be a complex and often misunderstood task. After working with numerous organizations and an array of technology stacks, one thing is clear: Configuring is hard—not only because server software is intricate, but also due to the various configuration formats and the often confusing locations where these configurations reside.
With over 3 billion active devices this year, Android dominates the global mobile market with a 70.69% market share. But with this widespread usage comes an increasing number of vulnerabilities. In this event, we will dive deep into the world of Android app and firmware exploits and showcase live demonstrations of a few key exploits.
Data breaches are not as random as you might think. Building upon previous work forecasting fraud among business customers, Dr. Thomas Lee discovered something often overlooked by practitioners: insufficient staffing is a strong predictor of a data breach, and surprisingly, audit staff is just as effective at preventing a data breach as staff working in information technology.
Join us for our June chapter meeting featuring Brian Laing, a renowned cybersecurity expert, who will provide critical insights into navigating the new cybersecurity landscape in 2024. This event promises to be an eye-opening session on the emerging threats and strategies for the current year.
Recently, IBM Quantum demonstrated error mitigation techniques using 100+ qubit processors that enabled calculations not achievable with classical computing techniques. This faculty for "quantum utility" with noisy qubits, well in advance of fully fault-tolerant quantum processors, opens the prospect of applying quantum computing to more real use cases sooner than previously considered possible. What does this shift mean in practical terms, and what ramifications might it have, including the prospects for quantum-safe cryptography?
Mike Skurko will lead a panel on ISSA-SV panel on Cybersecurity & AI. Most of us have kicked down the barriers to cloud adoption, at scale. Many of us may have been involved in the revolution. The fear, uncertainty, and doubt plagued the enterprise and that FUD was perpetuated by most of the major enterprise packaged software companies. In the end, we all won. Responsible adoption was realized. AI brings us all the way back to the FUD. Fear, mystery, scale, controls, policy, compliance are all front and center.
Synopsis: Minor oversights in public-facing web applications can lead to major security disasters. This talk will highlight real-life cases where such vulnerabilities, including logic flaws, insecure direct object references (IDOR), and API security lapses, could have resulted in massive data breaches and financial losses. Through interactive hacking demos, the session will illustrate the potential for millions in losses from retail giants and sensitive data exposure, such as passport information leaks.
Mike Skurko will lead a panel discussion consisting of a maximum four people with an all inclusive Q&A to get the audience talking about what they see as crucial to their success in 2024. This includes what they would like to learn and the types of topics at the Silicon Valley ISSA meetings for 2024