Loading Events

« All Events

  • This event has passed.

ISSA-LA July Dinner Meeting

July 15, 2015 @ 6:15 pm - 8:30 pm

Location: Luminarias
3500 Ramona Boulevard, Monterey Park, CA 91754
(323) 268-4177

Topic: Practical Guide to Assessing Password Alternatives
In the majority of high profile breaches, attackers use methods that exploit password-based credentials. These range from the point of which an attacker can gain entry as a normal user to later elevating privileged user accounts. While identity has been proven to be the link between entitlements, permissions and trust, the corporate environment still relies heavily on passwords to interrogate users and devices that request access.
A limited number of options have existed for years. However they were initially only focused on protecting the network perimeter while increasingly such perimeter are either disappearing or being redefined to wherever people or devices request access to data. (3rd parties, cloud, BYOD, IoT, etc.). Additionally, the security paradigm has changed from “keeping everyone out” to assuming that attackers will get in and security programs must build control elements that are more effective.
The current state of security breaches reflect that exploiting trust models concerning identity credentials is a common denominator of many attacks and as a result should be a focus area for security programs to improve resilience and reduce risk. The vendor market has responded with an almost infinite number of choices that represent different levels of complexity, uses, advantages and drawbacks.
Identity industry veterans, Jerome Becquart and Terry Gold will provide a unique viewpoints of strong identity evolution practices spanning one-time passwords in the 90’s, through their time developing and deploying the first large scale government identity program (Department of defense Common Access Card, “CAC”) to modern-day landscape of choices; ranging from sms, biometrics, PKI and smart cards. Becquart and Gold will review the difference between them, the protection they offer but also a behind the scenes look at what is most realistic in the face of recent threats in terms of effectiveness, compatibility, usability, cost and resource demand that each require. Real-world examples and best practice for approaching projects along with key business case elements with plenty of time for Q&A.

Speakers: Jerome Becquart and Terry Gold
Jerome Becquart leads Axiad IDS’s business operations and corporate marketing team. He has over 20 years of experience in the development and implementation of Identity and Access Management technologies, including 15 years at ActivIdentity. Jerome’s management experience includes roles in engineering, professional services, product marketing, and executive management. After the acquisition of ActivIdentity by HID Global in 2010, Jerome served as General Manager of the HID Identity Assurance business unit. He has also chaired the Global Platform Government Task Force for 3 years, and served on the Board.

Terry Gold is a subject matter expert in digital identity management, authentication, and access control in both physical and information-based environments. For the last ten years, he has been dedicated to developing strategies for some of the largest companies in the world in their planning and execution of PKI, smart cards, token, and RFID initiatives and related security effectiveness.

Sponsor: Trend Micro
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security.
Trend Micro security fits the needs of our customers and partners. Our solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. We deliver top-ranked client-server, network, and cloud-based protection that stops new threats faster, detects breaches better, and protects data in physical, virtual, and cloud environments. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world. www.trendmicro.com

Sponsor: CloudPassage
CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility. www.cloudpassage.com

Register early online before the Monday prior to the the event, and get a discount!
ISSA-LA Members & Members of other ISSA chapters, OWASP, ISC2, CSA & Students: $30
Non-Members: $40


July 15, 2015
6:15 pm - 8:30 pm
Event Category:


3500 West Ramona Boulevard
Monterey Park, CA 91754 United States
+ Google Map