September 2017
Sponsor: ForeScout Speaker: Tony Velada Title: The Internet of Things is not Coming. It is here! Abstract: Discover What Your Peers Think about the State of IoT Security.The Internet of Things (IoT) is rapidly expanding the attack …
Sponsor: ForeScout Speaker: Tony Velada Title: The Internet of Things is not Coming. It is here! Abstract: Discover What Your Peers Think about the State of IoT Security.The Internet of Things (IoT) is rapidly expanding the attack …
April 2017 The 15th Annual Boise ISSA conference is upon us. Please visit conference.boiseissa.org to register, review the agenda, and read about the speakers. We look forward to seeing you Thursday April 27th!! Register
February 2017 Sponsor: ASG Speaker: Jeff Hooper, Systems Engineer at Gemalto (formerly SafeNet) Topic: Digital Certificates and Key Management. He will cover new laws requiring key management, give examples of specific breaches and how the solutions …
Sponsor: Boise ISSA Moderator: Vince Skinner and Fuli Chavez Topic: Overcoming the difficulties of implementing effective protections Register Lunch is $15 for non members, cash or check only.
December 2016 Sponsor: Boise ISSA Moderator: Vince Skinner, VP of Security, D.A. Davidson & Boise ISSA President Topic: Round Table Discussion. Topics to include: malware protections, incident response, penetration testing, Senior Management Support, and other related …
Sponsor: Tanium Topic: Know your environment better than your adversary Presenter: Jesse Harris, Director of Technical Account Management Summary: Assumption of breach. We are existing in a world where the adversary is significantly better equipped than most …
Sponsors: RSA & Datashield Topic: Exposing the Terracotta VPN – Anatomy of an Advanced Campaign Summary: In August 2015, RSA uncovered details of a massive malware-supported VPN network being used as a launch platform for …
April 2016 The 14th Annual Boise ISSA conference is upon us. Please visit conference.boiseissa.org to register, review the agenda, and read about the speakers. We look forward to seeing you Thursday April 28th!! Register
Topic: Fifty Shades of Risks Summary: In a day and age when advanced threats and active countermeasures are all the rage, topics such as a risk management may seem boring and pedestrian. However, a mature risk …
Topic: Continuous Monitoring to decrease your Mean-Time-To-Detect and Mean-Time-To-Respond Summary: In this presentation I will address why a prevention-centric approach is insufficient and how and why continuous (machine based analytics) monitoring is essential to decreasing an …
Topic: Last Call for Attackers – You Don’t Have to Go Home, But You Can’t Stay Here Summary: It’s no secret that most targeted organizations are compromised for months or years before they discover for themselves, …
Topic: Splunking for Endpoint Security Summary: The front line in cybersecurity is the endpoint (and users). In this talk I will be discussing methods often used as attack vectors and how to detect them using Splunk. …