This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
October 2019 ISSA Web Conference

 


 

 

            

 

Recorded (120-min Event) on Tuesday, October 22, 2019

Click here to view the recording.
Click here for the presentation.


Overview:

Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?

 

 

Moderator:

Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

 

For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years.

Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.


Speakers:

Ryan Leirvik, Principal, Cybersecurity Management Solutions Practice, GRIMM

Ryan leads the Cybersecurity Management Solutions practice at GRIMM. Ryan has spent the better part of two decades enhancing information security programs at the world's largest institutions. He helps clients identify and solve complex security issues facing their organization. He holds a Bachelor of Science from Purdue University, a Master of Information Technology from Virginia Polytechnic and State University (Virginia Tech) and a Master of Business Administration from Case Western Reserve University. He is on the Security and Risk Analysis Advisory Board at Penn State, and has contributed to the following publications: Originals: How Non-Conformists Move the World (VIKING); and, Beyond Cybersecurity: Protecting Your Digital Business (WILEY).

Don Shin, Lead DDoS Defender Advocate, A10 Networks

Don is A10 Networks' lead DDoS defender advocate. Before A10, Don work in a variety of roles in R&D, product management, and marketing focused on network, application, and cloud security. He is passionate about helping customers improve their security posture and frequently speaks at security conferences.


David Merritt, VP, Applied Cognitive Solutions


David Merritt is Vice President of Applied Cognitive Solutions (ACS), a Houston-based IT firm specializing in digital forensics, data recovery, and eDiscovery/technology consulting. The firm is licensed as an Investigation Company by the Private Security Board of the Texas Department of Public Safety.

David is responsible for business development and strategic planning, as well as service provision, and has participated in numerous computer forensic projects. His first noteworthy case was working with the FBI on the Teresa Rodriguez case in 1994.

An active participant in professional associations, David is currently President of the Texas Gulf Coast Chapter of the High Technology Crime Investigation Association (HTCIA). He is also a member of the Information Systems Audit and Control Association (ISACA), the Information Systems Security Association (ISSA) where he has served on the Board of the South Texas Chapter, (ISC)², and the Rice Business Network. He has made presentations on computer forensics and technology to many of these organizations, as well as at conferences.

David has completed the Guidance Software EnCase Intermediate Analysis and Reporting Course, EnCase Advanced Computer Forensics Course, AccessData BootCamp with FTK, and the Intense School Live Online Computer Forensics Course. He studied mechanical engineering and economics at Rice University.

David’s first vehicle was a go kart he assembled when he was 10 years old from a lawn mower engine and a used chassis he rebuilt. He has been fascinated with how vehicles work ever since. The recent incorporation of extensive computer technology in consumer automobiles has allowed him to combine his two biggest interests, cars and computers.


 
 
 
 

Copyright © 2023 ISSA International | All Rights Reserved