Contact Us   |   Print Page   |   Sign In   |   Join Now
Raleigh ISSA Chapter Meeting September 5, 2019
Tell a Friend About This EventTell a Friend
Raleigh ISSA  Chapter Meeting September 5, 2019

Back-2-basics (5:15pm) The main presentation (7:15pm) Sponsor will be Qualys

9/5/2019
When: 9/5/2019
5:15 PM
Where: RTP Headquarters/Conference Center
12 Davis Drive
Research Triangle Park, North Carolina  27709
United States
Contact:


Online registration is closed.
« Go to Upcoming Event List  

Raleigh ISSA THURSDAY September 5, 2019 Chapter Meeting

 

Sponsor 

  

AGENDA

5:15 – 6:00pm Career Services (Conference Room 1)

5:15 – 6:00pm Back-to-Basics (Main Room) Christy Kushner – “Google Dorking”

6:00 – 6:45 pm Dinner Eastcut sandwiches / Drink / Socializing (Lobby)

6:00 – 8:00 STORM CTF – TEASER https://stormctf.ninja/ctf/events/infosecon-2019

7:00 - 7:15pm Board Updates (Main Room)

7:15 – 8:30pm Main Presentation (Main Room)  Jimmy Graham - “Optimizing the Patch Management Process

 

B2B

 

5:15PM

Topic:“Google Dorking”

Presenter:  Christy Kushner


Main Presentation 

7:15PM-8:30PM

 Topic:Optimizing the Patch Management Process

 

Speaker:

 

Jimmy Graham

Senior Director of Product Management

Bio:

Jimmy Graham, Senior Director of Product Management at Qualys, has been deeply involved in information security and vulnerability management for 15 years, in both higher education and corporate environments. He has managed teams covering firewalls, SIEM, IDS, application security, vulnerability management, penetration testing, governance, and compliance.


 


Community Search
Sign In


Calendar

9/24/2019
ISSA International Series: New Trends in Security- Outsourcing and Other Tech

10/9/2019
ISSA Thought Leadership Series: 7 Deadly Sins of Insiders: Why They Become Threats & How to Defend

10/16/2019
ISSA : Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications

10/22/2019
ISSA International Series: Attack of the BotNets- Internet of Terror loT

11/6/2019
The Persistent Pernicious Myths and Hidden Truths of Cybersecurity




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information
This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.