Past Meetings

How to Securely Perform AI Training on Clients' Data

Tuesday, October 18, 2022 - 6:00pm

October 2022 SV-ISSA hybrid in-person event- 

While AI is transforming what systems can do, it requires real data to learn from.  Whenever you ask an AI engineer how much data they need, the answer is always "all of it". 
While this is the right answer for the researcher, it isn't always the right answer for our customers. 

In this talk we will discuss real world the nature of the data risk organizations face and how confidential compute can secure AI training.

Sponsored by

Live audience recording of CISO Series Podcast featuring David Spark, Mike Johnson and Geoff Belknap

Tuesday, September 20, 2022 - 5:00pm
 
 
Live audience recording of CISO Series Podcast 
 
CISO Series
We did it before the pandemic and it's now time to do it again.
ISSA will be hosting David Spark, producer of CISO Series.

CISO Series: Delivering the most fun you’ll have in cybersecurity.

July 2022 SV-ISSA Monthly Chapter Meeting - Zero Trust, VPNs, CASB - Truth & Hype: Fully Exposed

Tuesday, July 19, 2022 - 6:00pm

July 2022 SV-ISSA in-person event: "Zero Trust, VPNs, CASB - Truth & Hype: Fully Exposed" - In this talk, Andy Oehler cuts through the hype and looks at the realities of security at the network edge. He will share some real-world anecdotes: what happened and how did IT Security handle.  What can you realistically be doing? What should you be doing? 

 

 

The changing Threat landscape and what impact it has on Ransomware

Tuesday, May 17, 2022 - 6:00pm

The Russian- Ukrainian Crisis have sparked a chain reaction of cyber events that are changing the Threat Landscape. Join this session to learn what Cyber activity Trellix has observed related to the conflict and what impact these global events had on Russian based cybercrime groups. We will dive into the leaked communications of a top tier Ransomware gang called Conti and learn about their, strategy, partnerships, and RU-government connections.  Lastly we will discuss how all of this might eventually change the future threat landscape.

Human Security Engineering: Stop Relying on the Failed Human Firewall

Tuesday, March 15, 2022 - 6:00pm

While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc., are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. This presentation is a comprehensive strategy to address the insider threat, whether it results from malicious or well-meaning insiders.

Pages