SYS-CON MEDIA Authors: Pat Romanski, Gary Arora, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

News Feed Item

ISSA Los Angeles Information Security Summit X Finalizes Specialized Forums Schedule

Three very special forums will be offered: Healthcare Security and Privacy Forum, Women in Security Forum, and the CISO Forum

LOS ANGELES, April 30, 2018 /PRNewswire-PRWeb/ -- The Los Angeles Chapter of the Information Systems Security Information (ISSA-LA) is excited to offer professionals a dedicated set of forums. The Forums are a part of the exciting, yet educational, ISSA-LA Security Summit X scheduled to take place on May 2nd - May 4th at the Universal City Hilton in California. Two days of training kick things off on May 2nd and 3rd, with keynotes, sessions, and forums slated for Thursday, May 3 starting at 4PM and all day Friday, May 4th.

Out of curiosity, does a wildly-popular intergalactic movie come to mind for this day? Just checking. 'May the 4th be with you!'

Attendees can meet with their peers to discuss the challenges they face, the best practices they've employed, and the opportunities ahead of them as the cybersecurity landscape changes right under our feet. This year, the ISSA-LA Security Summit will be home to three forums: the CISO Forum, the Healthcare Security and Privacy Forum, and the Women in Security Forum.

The forums offer the following:

The CISO Forum is a special collaborative event designed specifically for CISOs and directors of information security and their direct reports to join together in discussion, bringing together leaders in information security within government and private industry for a day of collaboration, networking and presentations by leading information security professionals.

"Tired of vendor and for-profit conferences and summits? We are too. These forums are all built by Information Security Leaders with only educational talks by researchers and actual practitioners. No vendor pitches here! We hit the subjects you grapple with and share solutions from your peers," says Richard Greenberg, Summit X Chair and President of ISSA Los Angeles.

Attendees of the CISO Forum will be treated to the insights of Robert Hansen, Chairman, and CTO at Bit Discovery; Ira Winkler, President, Secure Mentum; Mark Weatherford, SVP & Chief Cybersecurity Strategist at vArmour; and Malcolm Harkins, Chief Security and Trust Officer at Cylance Inc. Attendees will have a chance to engage with a dynamic panel of CISOs moderated by Richard Greenberg, ISO at LA County Public Health. The panel includes Alex Wood, CISO at Pulte Group; Steve Pomush, VP of IT at American Homes 4 Rent; Ed Pagett, Chief Security Strategist – Secure Mindset; and Gunter Ollman, CTO, Security at Microsoft.

Additional details for this forum can be found at

The Healthcare Security and Privacy Forum brings together leaders in security, privacy and risk management within government and private industry for a day of collaboration, networking, and presentations by leading privacy and security professionals.

"Healthcare is now the primary target for hacking due to the complete set of confidential information all in one convenient location, as well as Healthcare organizations' notoriously poor record of implementing good security controls," says Richard Greenberg, President, ISSA Los Angeles.

Attendees will be treated to a special guest speaker—Yun-Kyung (Peggy) Lee, Supervisory EOS at the US Department of Health and Human Services. She will share guidance on risk assessments and what the Office of Civil Rights will be looking for if you are under investigation or expecting an audit. Peggy's opening presentation will be followed by a dynamic healthcare CISO panel: Jerry St. Tomas, CISO, Apria Healthcare; Chris W. Joerg, CISO at Cedars-Sinai; Gerard Nussbaum, Principle, Zarach Associates; and Marnie Wilking, CISO, Orion Health.

Following the panel, attendees will hear from Cynthia Stamer, Management & Regulatory Attorney at Cynthia Marcotte Stamer, and Derek Fisher, Application Security Manager with Cerner Corporation. Attendees can then engage in the closing panel comprising a great line-up of experts to discuss the important aspects of building a risk management program.

Additional details for this forum can be found at

The Role of ISSA-LA and the Information Security Summit in promoting diversity and inclusion:

The Los Angeles Chapter of ISSA has long been an ardent supporter of diversity in the field of information and cybersecurity. Our annual Security Summit events have always featured many women speakers, and each year we have presented a Women in Security panel. Our mission for our Women in Security Forum this year is to provide a focus for women in information security—through talks, panel discussions, peer mentoring, workshops, and networking opportunities.

"The field of Information Security has long been struggling with diversity, but there is now a rising tide to get women more involved," says Andrea Hoy, past ISSA International President and Founder of the Innovation Shipyard Alliance. "This Women in Security Forum should be a great gathering of the female leaders and practitioners in the field. Join me in showing the strength of women in cybersecurity."

ISSA-LA Summit X will have two concurrent sessions on May 3rd, and a full day of fantastic women speakers on May 4th.

While ISSA-LA proudly stands alongside the women in security colleagues, both the group and the Summits are all about a diverse and open community; everyone, regardless of race, gender, religion and experience level, is encouraged to attend and participate.

"There already is a shortage of qualified Cyber Security professionals to manage all of the confidential data out there, and it will just get worse," adds Greenberg, who also serves as the Security Officer at Los Angeles County Public Health. "We must be proactive and encourage all people to look to Cyber Security as a career choice. We hope to see you at Summit X!"

Additional details for this forum can be found at

Don't Miss This Opportunity to Participate

For those attending the forums and the Summit who are interested in engaging with other experts from the InfoSec and vendor community, the Summit is a great place to do so. There are several breaks available throughout the day to meet with our sponsors and your peers. It's the perfect place to make new friends and catch up with old friends.

Since ISSA-LA is all about the community, registration for the event is open to anyone interested in learning more about information security. The Information Security Summit is part of the ISSA-LA community outreach program. The goal this important program is to help our community stay safe from cybercrime by enabling the necessary collaboration between business and community leaders, technical IT professionals, and the information security community.

For more information on ISSA-LA Summit X and for registration details, please visit

Last Chance: Win a FREE Ticket to Summit X

We're excited to announce that now through the opening of Summit X, we will pick a winner every week among the people who follow us on our social media accounts. There's one week left and it's simple:

  • Follow us on Instagram or Facebook
  • Share and like our posts
  • Tag your friends
  • Watch the feed to see if you've won!

The drawing will be held at a random time during the week!

For more information about the ISSA-LA Summit X and for registration details, please visit

About the Information Systems Security Association (ISSA):

The Information Systems Security Association is a not-for-profit, international organization of information security professionals and practitioners. ISSA provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. The primary goal of ISSA is to promote management practices that will ensure availability, integrity and confidentiality of information resources. For more information or to register, please visit: Join the movement today!



More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions.
Keeping an application running at scale can be a daunting task. When do you need to add more capacity? Larger databases? Additional servers? These questions get harder as the complexity of your application grows. Microservice based architectures and cloud-based dynamic infrastructures are technologies that help you keep your application running with high availability, even during times of extreme scaling. But real cloud success, at scale, requires much more than a basic lift-and-shift migrati...
David Friend is the co-founder and CEO of Wasabi, the hot cloud storage company that delivers fast, low-cost, and reliable cloud storage. Prior to Wasabi, David co-founded Carbonite, one of the world's leading cloud backup companies. A successful tech entrepreneur for more than 30 years, David got his start at ARP Instruments, a manufacturer of synthesizers for rock bands, where he worked with leading musicians of the day like Stevie Wonder, Pete Townsend of The Who, and Led Zeppelin. David has ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Addteq is a leader in providing business solutions to Enterprise clients. Addteq has been in the business for more than 10 years. Through the use of DevOps automation, Addteq strives on creating innovative solutions to solve business processes. Clients depend on Addteq to modernize the software delivery process by providing Atlassian solutions, create custom add-ons, conduct training, offer hosting, perform DevOps services, and provide overall support services.
Contino is a global technical consultancy that helps highly-regulated enterprises transform faster, modernizing their way of working through DevOps and cloud computing. They focus on building capability and assisting our clients to in-source strategic technology capability so they get to market quickly and build their own innovation engine.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...