Membership Meeting 01-25-2023

posted in: Blog, Meetings, Uncategorized | 0

Topic: Ransomware: A Risk Management Strategy Organizations’ globally are dealing with a scourge in ransomware.  Just note the following statistics: Experts estimate that a ransomware attack will occur every 11 seconds in 2021. (Cybercrime Magazine, 2019)  and The average ransom … Continued

Membership Meeting 12-14-2022

posted in: Blog, Meetings, Uncategorized | 0

Topic: Supply Chain Security: Supplier/Contractor Relationships In Negotiated Contracts Over the past 5 years, the world has seen unprecedented interest-in and allocation-of resources toward Cyber Security in both the public and private sectors.  The Supply-Chain has been stressed to its very limits … Continued

Membership Meeting 8/24/2022

posted in: Blog, Meetings, Uncategorized | 0

The August ISSA membership meeting is sponsored by Beyond Identity Topic: Supply Chain Security: Preventing Second Hand or Counterfeit Computing Device Components Increasingly, large enterprise customers are requiring Original Design Manufacturers (ODMs) and/or Original Equipment Manufacturers (OEM) to show demonstrable … Continued

Membership Meeting 07/27/2022

posted in: Blog, Meetings, Uncategorized | 0

Topic: Chernovite’s Pipedream Gain an in-depth look at old case studies and new research across 2021 highlighting new ICS threat groups,  vulnerabilities, and insights from the field including incident response case studies of previously unreported incidents. This session will give … Continued

Membership Meeting 2022-06-22

posted in: Blog, Meetings, Uncategorized | 0

Topic: Achieving Vital Network Visibility and Proactive Threat Hunting with Network Detection and Response Enterprise networks are experiencing a deluge of highly sophisticated threats from motivated attackers. Cloud computing, remote working, and traffic encryption expand the attack surface while making … Continued

Membership Meeting 05/25/2022

posted in: Blog, Meetings, Uncategorized | 0

Topic: Achieving Vital Network Visibility and Proactive Threat Hunting with Network Detection and Response Enterprise networks are experiencing a deluge of highly sophisticated threats from motivated attackers. Cloud computing, remote working, and traffic encryption expand the attack surface while making threats … Continued