Loading Events

« All Events

Practical Steps to Manage Current and Emerging Threats – Note the New Date!

January 20 @ 5:30 pm - 9:00 pm

Come network with your friends, have a great dinner, make new friends, and hear two great talks about Cybersecurity.

Come and network with your friends, make new friends, and hear two amazing speakers. A buffet dinner will be served and drinks will be available.

Topic One: Cybersecurity is a Forest Fire and All I Have is a Garden Hose–Practical steps to manage current and emerging threats

If you’ve ever felt like the existing scope of work for your security team is already more than you can handle, come hear why that’s not going to get better anytime soon – and why that’s ok, as we talk about effective approaches to managing risk and liability while you build sustainable work patterns for yourself and your team. We’ll talk about the promise and problem of emerging technologies, and how to help your organization think about tradeoffs (every new capability carries with it a new risk).

Speaker One: Scott Francis

Scott Francis is a Security Innovation Principal Director at Accenture, where he is part of the cloud security leadership team. He has been designing, building, operating, and securing Internet-facing services for organizations of all sizes, in industries around the world, since the 20th century. He is pathologically curious, and his focus at Accenture (and at Amazon before that) includes emerging technology and the fascinating (and unexpected) things that happen where domains overlap.

Topic Two: The Ultimate Solution to the Authentication Problem

Passwords were introduced over 60 years ago to ensure the security of accounts within controlled computing environments. However, the advent of the Internet has significantly transformed the landscape of account security, as we now must protect our accounts from billions of potential threats globally. The emergence of sophisticated malware further complicates this issue, rendering even the most complex passwords insufficient for ensuring security.

Additionally, the prevalent practice of using email addresses as a component of the authentication process poses a further risk, as these addresses are publicly accessible and effectively expose half of the login credentials. Consequently, the traditional password security model is fundamentally flawed. Attempting to enhance this model with supplementary security measures is akin to attempting to navigate a sinking ship.

Given these challenges, what is next for better authentication?

Speaker Two: Jack Bicer

With over 40 years of experience in the software industry, Bicer has served more than 20 years as a Chief Technology Officer. Throughout his career, he has successfully developed innovative products and managed various dot-coms and cybersecurity companies, establishing himself as a thought leader in the cybersecurity sector. Bicer is an Expert Witness in cybersecurity, authentication, account takeovers, and fraudulent transactions.

His inventions include:

· Multi-Factor Authentication – MFA

· Mobile Push Login/Authentication & Payments (Patent 9756042)

· QR Login/Authentication & Payments (Patent 8677116)

· Mobile Browser 1-Click Login/Authentication (Patent 9015813)

· Automatic Software Updates

· Uninstall

Bicer has been honored with cybersecurity recognition awards from both the U.S. Congress and the California State Assembly. Additionally, he has received two “Most Innovative Cybersecurity Product” awards for his work in authentication.

Because ISSA Los Angeles makes commitments to our facilities well in advance of each event, we regret that we cannot offer any refunds or credits within 48 hours of any of our events. If you cannot attend an event you can send someone in your place as long as they have your written permission.

CPEs: There will be 2 CPE credits for the meeting.

Disclaimer: ISSA-LA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISSA-LA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISSA-LA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices.

All materials used in the preparation and delivery of presentations on behalf of ISSA-LA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISSA-LA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers. Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.

Permission to be Photographed: By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISSA-LA for future promotion of ISSA-LA’s educational events on ISSA-LA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.

Venue

1003 E 4th Pl 8th floor
1003 East 4th Place, #8th floor
Los Angeles, CA 90013 United States
+ Google Map