Past Meetings

Forecasting Data Breaches with Dr. Thomas Lee

Tuesday, July 16, 2024 - 5:30pm

Data breaches are not as random as you might think. Building upon previous work forecasting fraud among business customers, Dr. Thomas Lee discovered something often overlooked by practitioners: insufficient staffing is a strong predictor of a data breach, and surprisingly, audit staff is just as effective at preventing a data breach as staff working in information technology.

The Era of Quantum Utility and Its Ramifications

Tuesday, April 16, 2024 - 5:00pm

Recently, IBM Quantum demonstrated error mitigation techniques using 100+ qubit processors that enabled calculations not achievable with classical computing techniques. This faculty for "quantum utility" with noisy qubits, well in advance of fully fault-tolerant quantum processors, opens the prospect of applying quantum computing to more real use cases sooner than previously considered possible. What does this shift mean in practical terms, and what ramifications might it have, including the prospects for quantum-safe cryptography?

March 2024 Chapter Meeting: ISSA-SV panel on Cybersecurity & AI

Tuesday, March 19, 2024 - 5:30pm

Mike Skurko will lead a panel on ISSA-SV panel on Cybersecurity & AI. Most of us have kicked down the barriers to cloud adoption, at scale.  Many of us may have been involved in the revolution.  The fear, uncertainty, and doubt plagued the enterprise and that FUD was perpetuated by most of the major enterprise packaged software companies.  In the end, we all won.  Responsible adoption was realized.  AI brings us all the way back to the FUD.  Fear, mystery, scale, controls, policy, compliance are all front and center.

 

February 2024 Chapter Meeting: Simple Bugs, Catastrophic Impact

Tuesday, February 20, 2024 - 5:30pm

Synopsis: Minor oversights in public-facing web applications can lead to major security disasters. This talk will highlight real-life cases where such vulnerabilities, including logic flaws, insecure direct object references (IDOR), and API security lapses, could have resulted in massive data breaches and financial losses. Through interactive hacking demos, the session will illustrate the potential for millions in losses from retail giants and sensitive data exposure, such as passport information leaks.

SV ISSA Board Member Panel - 2023 Cybersecurity in review and 2024 onwards and into the future!

Tuesday, January 16, 2024 - 5:00pm

Mike Skurko will lead a panel discussion consisting of a maximum four people with an all inclusive Q&A to get the audience talking about what they see as crucial to their success in 2024. This includes what they would like to learn and the types of topics at the Silicon Valley ISSA meetings for 2024

Event Timeline

2023 SV ISSA Winter Holiday Event

Tuesday, December 12, 2023 - 5:30pm

Holiday Greetings from the ISSA Silicon Valley Chapter Board

In warm appreciation of our association membership

we invite you to come enjoy food and drinks and network with peers at the

2023 SV-ISSA Winter Holiday Event on December 12, 2023 at 5:30 p.m.

The Oxford Kitchen & Gastropub

195 S Murphy Avenue,

Sunnyvale, CA 94086

 

Please be sure to RSVP

Space is limited

November Chapter Meeting: Cloud Dinosaur to Cloud Cheetah

Tuesday, November 28, 2023 - 5:00pm

Cloud has a value problem. Cloud’s value is perceived to come from the speed of deployment and security. Then why do cloud journeys take weeks if not months? Or generate a whole host of security and compliance issues, a leaky ship problem? Cloud security, compliance and expertise are at the heart of it. Security risks are high when cloud environments are not deployed properly. We will begin by level setting on current processes, practices and tools that address these risks. We will then discuss the potential future scenarios and practices that will move the needle on cloud security.

September 2023 ISSA Meeting: Agile Cloud Security for an Agile Cloud Strategy

Tuesday, September 19, 2023 - 5:00pm

The cloud and digital transformation have fundamentally changed the way organizations build and run business applications. Companies are running massive amounts of critical workloads while storing personal and sensitive information in their cloud-native environments, making them valuable targets for bad actors. Attackers are using stolen credentials, supply chain attacks, and other forms of advanced attacks to gain access to data and applications in the cloud.

Pages