This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
November 2017 ISSA Web Conference

Secondary Costs of Intrusions

Recorded (2 Hour Event) on Tuesday, November 28, 2017

Click here to view the recording.
Click here for the presentation.

Click here to take the CPE quiz.


Data breaches are costly affairs. Beyond the impact of lost customers, regulatory fines and remediation, there are a multitude of additional costs to businesses. From notification costs to legal fees to public relations mending, the totals add up quickly, with the average cost of a breach in 2016 estimated to be over $7 million. In this web conference we will examine various secondary intrusion costs and provide expert advice on how to reduce your risk exposure.


Michael Angelo, Chief Security Architect, Micro Focus | NetIQ

Michael is well known in the security community for his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards, working on corporate policies, national and international legislation, multi-national regulatory issues, and participation in numerous international and national advisory councils. He has been a featured speaker at numerous national and international security conferences including RSA, ISSA, and InfoSec. Currently, he chairs the ISSA International Webinar Committee and is a technology contributor to the U.S. Department of Commerce Information Systems Technical Advisory Council. Michael currently holds 60 U.S. patents, is a former Sigma-Xi distinguished lecturer and is the recipient of the Trusted Computing Platform Alliance (TCPA) lifetime achievement award. In 2011 he was the ISSA Security Professional of the Year, is named on the ISSA Hall of Fame, and is an ISSA Fellow


Rebecca Herold is CEO & Founder (2004) of Rebecca Herold & Associates, LLC, aka The Privacy Professor(R); and President & Co-Founder (2014) of SIMBUS360

Rebecca has over 25 years of IT, info sec, privacy & security experience; is CEO & Founder (2004) of Rebecca Herold & Associates, LLC, aka The Privacy Professor(R); and President & Co-Founder (2014) of SIMBUS360. Rebecca is also an entrepreneur, author and Adjunct Professor for the Norwich University Master of Science in Information Assurance Program. Rebecca has led the NIST Smart Grid privacy group since June 2009 and has been an officer for the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group since June 2015. Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has written 19 books to date, chapters in many books and hundreds of articles.

Karen Worstell, Founder and Managing Principal of W Risk Group LLC

Karen served as Chief Information Security Officer (CISO) at Microsoft Corporation where she was responsible for securing Microsoft's

information assets worldwide. She joined Microsoft in early 2005, and led policy development and deployment, IT governance, system security analysis and engineering, assessment and compliance, investigations, and the Security Center of Excellence. She has 20 years of information security experience spans the government classified and commercial sectors. Before that, she was the VP of IT Risk Management and CISO for AT&T Wireless (now Cingular) and prior to AT&T Wireless she led the Security practice for SRI Consulting and its spin-off, Atomic Tangerine, where she served as President and Chief Executive Officer of AtomicTangerine, Inc. She also served in senior information security roles at Bank of America, Boeing Defense and Space, Boeing Research and Technology, and Union Carbide Corporation, as well as one term on the Computer Systems Security and Privacy Advisory Board of the U.S. Department of Commerce. Karen tweets at @karenworstell, and blogs at  Her newest publication is "Your Amazing Itty Bitty® Personal Data Protection Book: 15 Keys to Minimize Your Exposure to Cybercrime Using These Essential Steps” soon to be available on Amazon


Community Search
Sign In


ISSA : Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications

ISSA Los Angeles Monthly Meeting Oct 2019

ISSA International Series: Attack of the BotNets- Internet of Terror loT

The Persistent Pernicious Myths and Hidden Truths of Cybersecurity

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information