This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
July 2018 ISSA Conference

ISSA International Series: Trials & Tribulations of Social Engineering

Recorded (2 Hour Event) on Tuesday, July 24, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


We all know about social engineering and phishing; but ‘Is it as simple as sending an email or asking for a click?’ probably not. As hackers and attacks evolve, they will go from simple tricks to very sophisticated attacks. So how do we know what these attacks will be? Simply, we can’t. So how can we detect the new attacks? This session will cover the state of the attacks and the directions they are taking. Ultimately, we will discuss strategies and how we can define the science that will evolve to thwart the evolving various attacks



Pete Lindstrom, IDC

Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.
Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.
Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business,, and CSO Magazine. His columns and articles have appeared in Information Security Magazine,, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.
In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.



Ben Rothke, Senior Security Consultant, Nettitude

Ben Rothke, CISSP, CISM, CISA is a Senior Security Consultant with the Nettitude and has over 15 years of industry experience in information systems security and privacy. His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design & implementation of systems security, encryption, cryptography and security policy development.

He is a frequent speaker at industry conferences, such as RSA and MISTI, holds numerous industry certifications and is a member of ASIS, Society of Payment Security Professionals and InfraGard.

He holds the following certifications: CISM, CISA, CGEIT, CRISC, CISM, CISSP, SMSP, PCI QSA


Andrew Lewman, Laxdaela Technology

Andrew has more than 30 years of global technology experience in a variety of domains, including information security, systems administration, and data management. His interest lies in the intersection of technology and humans. He’s been a co-founder and top executive at many high-growth start-up companies, such as TechTarget, The Tor Project, Farsight Security, and now DarkOwl. He’s an adviser with military and intelligence agencies in the US and its Allies, having worked on SAFER Warfighter, MEMEX, SHARKSEER, CRISP, and others. He’s a technical adviser to the Thorn Foundation, Global Emancipation Network, and Interpol’s Crimes Against Children Initiative. He’s a speaker and frequent media contact for conferences, invited speeches, with extensive television, written, and Internet-media press experience. Publications with EMCDDA and Fordham University Press. Andrew’s most recent publication is in the European Monitoring Center for Drugs and Drug Addiction on Tor and Links with Cryptomarkets. He’s the Treasurer for Emerge, helping to stop domestic violence through counseling abusers, and Chairman of Each One Teach One, providing economic opportunity for women and girls through technology.


Paul Williams, CEO, Clarity Consulting Corporation

Paul Williams, IAM, IEM, ACE is the Chief Executive Officer of Clarity Consulting Corporation, a Houston-based business profitability & efficiency
optimization consulting firm which places heavy emphasis on effective cyber security across the enterprise. Paul is a nationally known public speaker in the information security field with experience across the breath of the cyber security field and multiple fields of technology. Paul has spoken at more than 260 conferences and seminars across the U.S. and internationally over the past 17 years, frequently as a paid keynote speaker.

Paul’s favorite speaking topics include complex employee insider threat investigations; the detection, investigation, remediation and prevention of advanced malware in enterprise networks; cyber security counter-intelligence; weapons development and defense related technologies;
software quality test engineering; and enterprise network reengineering for improved security, reliability, functionality, scalability at reduced cost of network ownership. Many of Paul’s presentations have been paid keynote addresses, and he has been featured on television and radio
programs both in the U.S. and Europe.

Additionally, Paul has been a speaker at more than 60 universities, colleges, public and private corporations and nonprofit organizations across the nation and internationally and has been featured on multiple television, radio, newspaper and magazine reports in the United States and Europe.


Roger Grimes, Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Community Search
Sign In


ISSA International Series: Legislative Aspects

ISSA Thought Leadership Series: Update on the latest cyber threats and trends

ISSA OC 34th Annual Symposium

InfoSec Nashville

ISSA International Series: New Trends in Security- Outsourcing and Other Tech

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information