
Theme: Application Security - Threats, Challenges and Approaches
Date: August 4, 2014
Location: Las Vegas, NV
Applications provide the window to your organization’s most important asset: information. Recent reports suggest application security is one of the most common root causes of information security breaches. Are you aware of the most serious threats? Does your team have the tools and training to include appropriate security measures? In this forum, industry experts will help you reduce application risk by understanding not only the current threats and vulnerabilities landscape, but also risks associated with emerging technologies like embedded apps. In addition, you’ll have the chance to contribute your own expertise and learn from your colleagues through active roundtable discussions. Finally, you’ll gain insight into what business executives expect from security leaders in the current business environment. Don’t miss this opportunity to exchange expertise and network with your peers at this upcoming CISO Forum.
Register today to join us for this peer-only event. Click here for guest registration and criteria. First time qualified guests may attend at no charge.
Thank you to our August 2014 Sponsors!


Event Registration
CISO Executive Members click here to register to attend this ISSA CISO Executive Forum. Rooming reservations can be made at the host hotel, as described below.
CISO Guests click here for Membership Criteria and Guest Registration Details.
Agenda
8:00 a.m. - 9:00 a.m. | Registration and Breakfast |
---|
9:00 a.m. - 9:15 a.m. | Opening Comments and Welcome Address Kevin Rigney and Marnie Wilking, Las Vegas 2014 CISO Forum Co-chairs
|
---|
9:15 a.m. - 10:15a.m. | Jim Manico - Secure Coding Instructor and Author at Manicode Security
Top 10 Web Defenses We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective as attacks on prominent, well-protected websites occur daily. Most organizations world-wide have something in common: they have had websites compromised in some way. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques needed for low-risk, high-security web applications. Presentation slides |
---|
10:15 a.m. - 10:45 a.m. | Networking Break-Sponsor Pavilion |
---|
10:45 a.m. - 12:00 p.m. | "Application Security" - Executive Roundtables - Discussion Break into groups of your peers for brainstorming sessions. Highlights from each table will be openly discussed with the full group at the end of the roundtables.
|
---|
12:00 p.m. - 1:15 p.m. | Networking Lunch |
---|
1:15 p.m. - 2:15 p.m. | "Application Security" - Executive Roundtables - Presentations Break into groups of your peers for brainstorming sessions. Highlights from each table will be openly discussed with the full group at the end of the roundtables. |
---|
2:15 p.m. - 2:45 p.m. | Networking Break-Sponsor Pavilion |
---|
2:45 p.m. - 3:45 p.m. | Araceli Gomes- Security Advisor, Verizon
Verizon Data Breach Investigation Report Presentation slides
|
---|
3:45 p.m. - 4:15 p.m. | Networking Break-Sponsor Pavilion |
---|
4:15 p.m. - 4:30 p.m. | Sponsor Prize Drawing |
---|
4:30 p.m. - 5:30 p.m. | Jeff Snyder - President, SecurityRecruiter.com
A 360 Degree View of Security Leadership The CISO role has evolved from simply being the smartest person in the room to becoming a full-fledged member of the executive team, and the expectations for the role have evolved, as well. Jeff has talked with and listened to business leaders and industry experts, and knows what the business expects from a security leader and what the security leader’s peers and subordinates have suggested they expect in a leader they’re willing to follow. Based on significant research, Jeff will share what makes a well-rounded leader desirable to follow, to collaborate with and to take seriously at the “C” suite level.
|
---|
5:30 p.m. - 8:30 p.m. | Stuart McClure - CEO/President, Founder at Cylance, Inc. Closing Reception
Application security in the very cyber fabric Embedded systems surround us invisibly every day. From traffic lights and Bluetooth headsets, to substation relays and nuclear power plants, the world of embedded applications is immense (many estimate well over 1 billion devices online today). So what happens when applications are built on these devices insecurely? Fun for the hacker. Pain for you and I.
|
---|
*Please note: all times and speakers are subject to change.
Venue:
Paris Las Vegas Hotel and Casino, Versailles Ballroom
3655 S Las Vegas Blvd.
Las Vegas, NV 89109
Transportation Options
Click here to access a list of shuttles to and from the McCarran International Airport
Click here for driving directions to the Paris Las Vegas Hotel and Casino
Questions? Please contact Leah Retting at ISSA International Headquarters: 1 866 349 5818 extension 4082.