SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

News Feed Item

ISSA Los Angeles Information Security Summit X Finalizes Specialized Forums Schedule

Three very special forums will be offered: Healthcare Security and Privacy Forum, Women in Security Forum, and the CISO Forum

LOS ANGELES, April 30, 2018 /PRNewswire-PRWeb/ -- The Los Angeles Chapter of the Information Systems Security Information (ISSA-LA) is excited to offer professionals a dedicated set of forums. The Forums are a part of the exciting, yet educational, ISSA-LA Security Summit X scheduled to take place on May 2nd - May 4th at the Universal City Hilton in California. Two days of training kick things off on May 2nd and 3rd, with keynotes, sessions, and forums slated for Thursday, May 3 starting at 4PM and all day Friday, May 4th.

Out of curiosity, does a wildly-popular intergalactic movie come to mind for this day? Just checking. 'May the 4th be with you!'

Attendees can meet with their peers to discuss the challenges they face, the best practices they've employed, and the opportunities ahead of them as the cybersecurity landscape changes right under our feet. This year, the ISSA-LA Security Summit will be home to three forums: the CISO Forum, the Healthcare Security and Privacy Forum, and the Women in Security Forum.

The forums offer the following:

The CISO Forum is a special collaborative event designed specifically for CISOs and directors of information security and their direct reports to join together in discussion, bringing together leaders in information security within government and private industry for a day of collaboration, networking and presentations by leading information security professionals.

"Tired of vendor and for-profit conferences and summits? We are too. These forums are all built by Information Security Leaders with only educational talks by researchers and actual practitioners. No vendor pitches here! We hit the subjects you grapple with and share solutions from your peers," says Richard Greenberg, Summit X Chair and President of ISSA Los Angeles.

Attendees of the CISO Forum will be treated to the insights of Robert Hansen, Chairman, and CTO at Bit Discovery; Ira Winkler, President, Secure Mentum; Mark Weatherford, SVP & Chief Cybersecurity Strategist at vArmour; and Malcolm Harkins, Chief Security and Trust Officer at Cylance Inc. Attendees will have a chance to engage with a dynamic panel of CISOs moderated by Richard Greenberg, ISO at LA County Public Health. The panel includes Alex Wood, CISO at Pulte Group; Steve Pomush, VP of IT at American Homes 4 Rent; Ed Pagett, Chief Security Strategist – Secure Mindset; and Gunter Ollman, CTO, Security at Microsoft.

Additional details for this forum can be found at

The Healthcare Security and Privacy Forum brings together leaders in security, privacy and risk management within government and private industry for a day of collaboration, networking, and presentations by leading privacy and security professionals.

"Healthcare is now the primary target for hacking due to the complete set of confidential information all in one convenient location, as well as Healthcare organizations' notoriously poor record of implementing good security controls," says Richard Greenberg, President, ISSA Los Angeles.

Attendees will be treated to a special guest speaker—Yun-Kyung (Peggy) Lee, Supervisory EOS at the US Department of Health and Human Services. She will share guidance on risk assessments and what the Office of Civil Rights will be looking for if you are under investigation or expecting an audit. Peggy's opening presentation will be followed by a dynamic healthcare CISO panel: Jerry St. Tomas, CISO, Apria Healthcare; Chris W. Joerg, CISO at Cedars-Sinai; Gerard Nussbaum, Principle, Zarach Associates; and Marnie Wilking, CISO, Orion Health.

Following the panel, attendees will hear from Cynthia Stamer, Management & Regulatory Attorney at Cynthia Marcotte Stamer, and Derek Fisher, Application Security Manager with Cerner Corporation. Attendees can then engage in the closing panel comprising a great line-up of experts to discuss the important aspects of building a risk management program.

Additional details for this forum can be found at

The Role of ISSA-LA and the Information Security Summit in promoting diversity and inclusion:

The Los Angeles Chapter of ISSA has long been an ardent supporter of diversity in the field of information and cybersecurity. Our annual Security Summit events have always featured many women speakers, and each year we have presented a Women in Security panel. Our mission for our Women in Security Forum this year is to provide a focus for women in information security—through talks, panel discussions, peer mentoring, workshops, and networking opportunities.

"The field of Information Security has long been struggling with diversity, but there is now a rising tide to get women more involved," says Andrea Hoy, past ISSA International President and Founder of the Innovation Shipyard Alliance. "This Women in Security Forum should be a great gathering of the female leaders and practitioners in the field. Join me in showing the strength of women in cybersecurity."

ISSA-LA Summit X will have two concurrent sessions on May 3rd, and a full day of fantastic women speakers on May 4th.

While ISSA-LA proudly stands alongside the women in security colleagues, both the group and the Summits are all about a diverse and open community; everyone, regardless of race, gender, religion and experience level, is encouraged to attend and participate.

"There already is a shortage of qualified Cyber Security professionals to manage all of the confidential data out there, and it will just get worse," adds Greenberg, who also serves as the Security Officer at Los Angeles County Public Health. "We must be proactive and encourage all people to look to Cyber Security as a career choice. We hope to see you at Summit X!"

Additional details for this forum can be found at

Don't Miss This Opportunity to Participate

For those attending the forums and the Summit who are interested in engaging with other experts from the InfoSec and vendor community, the Summit is a great place to do so. There are several breaks available throughout the day to meet with our sponsors and your peers. It's the perfect place to make new friends and catch up with old friends.

Since ISSA-LA is all about the community, registration for the event is open to anyone interested in learning more about information security. The Information Security Summit is part of the ISSA-LA community outreach program. The goal this important program is to help our community stay safe from cybercrime by enabling the necessary collaboration between business and community leaders, technical IT professionals, and the information security community.

For more information on ISSA-LA Summit X and for registration details, please visit

Last Chance: Win a FREE Ticket to Summit X

We're excited to announce that now through the opening of Summit X, we will pick a winner every week among the people who follow us on our social media accounts. There's one week left and it's simple:

  • Follow us on Instagram or Facebook
  • Share and like our posts
  • Tag your friends
  • Watch the feed to see if you've won!

The drawing will be held at a random time during the week!

For more information about the ISSA-LA Summit X and for registration details, please visit

About the Information Systems Security Association (ISSA):

The Information Systems Security Association is a not-for-profit, international organization of information security professionals and practitioners. ISSA provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. The primary goal of ISSA is to promote management practices that will ensure availability, integrity and confidentiality of information resources. For more information or to register, please visit: Join the movement today!



More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at @DevOpsSummit at 19th Cloud Expo, Charles Kendrick, CTO at Isomorphic Software, presented a revolutionary model enabled by new technologies. Learn how business and develop...
When a company wants to develop an application, it must worry about many aspects: selecting the infrastructure, building the technical stack, defining the storage strategy, configuring networks, setting up monitoring and logging, and on top of that, the company needs to worry about high availability, flexibility, scalability, data processing, machine learning, etc. Going to the cloud infrastructure can help you solving these problems to a level, but what if we have a better way to do things. ...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
xMatters helps enterprises prevent, manage and resolve IT incidents. xMatters industry-leading Service Availability platform prevents IT issues from becoming big business problems. Large enterprises, small workgroups, and innovative DevOps teams rely on its proactive issue resolution service to maintain operational visibility and control in today's highly-fragmented IT environment. xMatters provides toolchain integrations to hundreds of IT management, security and DevOps tools. xMatters is the ...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Serverless Architecture is the new paradigm shift in cloud application development. It has potential to take the fundamental benefit of cloud platform leverage to another level. "Focus on your application code, not the infrastructure" All the leading cloud platform provide services to implement Serverless architecture : AWS Lambda, Azure Functions, Google Cloud Functions, IBM Openwhisk, Oracle Fn Project.