Information System Security Association - Los Angeles Chapter
The Los Angeles Information Security Forum brings together experienced IT and information security practitioners for confidential information sharing on the industry’s most important issues, technologies, and trends. The two-day Forum includes keynote addresses, technical and strategic roundtable discussions led by IANS’ Faculty, networking events, and the opportunity to learn about new technologies. Why Attend Gain tangible, real world insights on best practices and lessons learned directly from your peers Stay current with emerging technologies and early-stage deployments Connect with the…Find out more »
Please join us for our annual Holiday Party!
Let’s gather to celebrate another successful year for ISSA-LA at our final meeting of 2013. Network. Lunch. Raffles & more! Sponsor: Founded in 2006, Boston-based Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect organizations against financial fraud, data exploit and exfiltration and data breaches.Hundreds of organizations and millions of end users rely on Trusteer to protect their web applications, computers and mobile devices from online…
Network with your OWASP peers as we celebrate the holidays and the end of a great year for our Los Angeles Chapter. Free food and drinks. Thanks to our sponsor:
Cigital, Inc. is the world’s leading software security services and solutions company. Cigital helps public and private organizations launch and mature software security initiatives, as well as design, build, test, and maintain secure software through a combination of expert consultants, innovative technologies, and effective training built on over…
Hacker Techniques, Exploits & Incident Handling (Los Angeles, CA | Wed Jan 22 – Wed Mar 26, 2014) If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. By helping you…Find out more »