Loading…
Attending this event?

Log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, May 5
 

8:00am

Registration and Breakfast
TBD

Tuesday May 5, 2020 8:00am - 9:00am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

9:00am

1-Day Training - Application Security for Managers: How to Work With Software Developers
Managing Application Security in a Rapid Evolving Security Ecosystem

Application Security as an industry is still in its infancy. But like all healthy babies, AppSec is eating a great deal and is growing fast. This presentation will discuss some of the areas of application security that are rapidly evolving and how this evolution affects your ability as a manager to control this key area information security. From software procurement, contracts, insurance, software development activities and more, application security management touches almost every aspect of business operations. Managers need a solid understanding of both the technical and business justifications for these activities in order to be successful, and as the industry undergoes rapid change, so do the management challenges before us all.

Application security excellence requires a wide range of management involvement and activity. From managing procurement, contracts, software development activities and more, application security management touches many aspects of business operations. Managers need a solid understanding of both the technical and business justifications for these activities in order to be successful. This one day course will prepare managers to take on a wide variety of challenges in order to successfully guide your organization towards application security excellence.

Course Goals
- Understand the various stages of a secure SDLC
- Understand the types of attacks specific to application security
- Prepare managers to build contracts and procure software with application security considerations
- Build a business case for application security investment


Speakers
avatar for Jim Manico

Jim Manico

Founder, Trainer & Author, Manicode Security
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also an investor/advisor for KSOC, Nucleus Security, Signal Sciences, Secure Circle and BitDiscovery. Jim is a frequent speaker on secure software practices... Read More →


Tuesday May 5, 2020 9:00am - 5:00pm
Marion Davies Guest House Parlor

9:00am

1-Day Training - It’s not just people, it’s high performance: Build a socially conscious security program
At CISOSHARE, we have been focused on building functional cyber security programs while also addressing the livable wage gap and tackling the cyber security resource shortage. A large part of our effort is working on identifying untapped pools of talent with appropriate aptitudes, developing their base cyber security skills, and then putting them to work in security programs that are engineered and readied to maximize the value for everyone.

This session is designed for both leaders that are interested in implementing a socially conscious security program, or anyone in security that is interested in understanding how they can participate in this type of effort. This session will teach how to design or retrofit a security effort so that it enables integration of talent from these often-forgotten pathways while simultaneously aligning to best practices and creating a functional security program.

The session will begin by exploring why aptitude-based professional development works and the data associated with our research in this area thus far. We will also present some use case data on how organizations and their security programs have successfully built this type of mindset and capability into their overall program effort and some of the impact this has had on their security posture.

Next, we will describe actionable techniques for building these capabilities into your security program. This includes items such as how to build an internal mentoring program, managing HR requirements, techniques for building a teaching and development-focused culture, understanding roles and responsibilities between those that are learning, and those that must teach, getting production from these resources, as well as accountability and execution considerations.

Speakers
avatar for Mike Gentile

Mike Gentile

CEO, CISOSHARE


Tuesday May 5, 2020 9:00am - 5:00pm
Club Room

9:00am

1-Day Training - PowerShell Fundamentals
PowerShell is a required skill set for hands-on security professionals. The combination of its flexibility, extensibility, and ubiquity on modern Windows platforms makes PowerShell a go-to tool for Windows Systems Administrators. What’s useful for SysAdmins is also useful for Information Security practitioners, both in offensive and defensives roles. We’ll get hands-on with PowerShell in this class, bringing you up to basic competency as quickly as possible.

Designed for students with some programming or scripting background, we’ll get started with the how and why of PowerShell before moving on to all the basics you’ll need to know about any language. The course will then move on to core features, commands, and patterns of the language to build the fundamental skills required for more advanced topics, all while exploring the gimmies and gotchas of PowerShell.

By the end of the course, students will be able to perform common task patterns in PowerShell, as well as have the knowledge basis and tools needed to understand the majority of PowerShell code one may find in tooling and more advanced educational materials.

Covered Topics
  • The What and Why of PowerShell
  • Basic Language Syntax and Getting Help
  • Workflow – Pipelines and Filtering
  • Filesystem, File I/O and the Windows Registry
  • Scripting, Flow Control and Conditionals
  • Functions, Splatting, and Supporting Patterns and Data Types
  • Packaging Code for Execution

PrerequisitesBefore attending this workshop students must have a basic understanding of programming and/or scripting. PowerShell fundamentals will be covered, not programming fundamentals in general. Familiarity with the following in any language is required:

  • Variables and basic data structures (arrays, hash tables/dictionaries / etc…)
  • Control flow, Boolean comparisons and functions
  • Object-oriented programming (properties, methods, etc…)

Required MaterialsThis is a hands-on workshop. Students are expected to bring a functional laptop with a suitable operating system and software pre-installed.

  • Windows 10, Windows Server 2012R2, or Windows Server 2016 (Virtual Machines are acceptable)
  • PowerShell Core 6.2.4. 
Available from https://github.com/PowerShell/PowerShell/releases/tag/v6.2.4

Speakers
JK

John Kennedy

John is currently a Senior Incident Response Engineer at a leading healthcare provider. He has several years of experience using scripting to solve business, technology, and operational problems. John is passionate about #devchatsecops and securing all the things.
CI

Chris Ingram

Chris has two decades of experience in various technology-based roles including those in Information Security, Systems Engineering, and Software Engineering. A long and varied history of building and breaking has fostered development of a variety of field-honed skills backed by the... Read More →


Tuesday May 5, 2020 9:00am - 5:00pm
Guest House Parlor

9:00am

2-Day Training - Advanced Defense and Tactics of Deception
No product will make us secure. Estimates are $94 Billion was spent in 2018 on cybersecurity products in the US, yet we had many data breaches. We are losing the battle, so it is time for another approach. Organizations need to begin with the foundations of defense to prepare for those determined to deploy deception and take control of your networks. Estimates are these costs will have grown to $100B in 2019. 
No matter how much “security” is put in place, the reality is we are running our data on protocols developed many years ago when the Internet was small. As a result, these protocols are based on the principle of trust.  To truly defend, protocols can be changed to frustrate and confuse an adversary. 
In this course, advanced defensive concepts are explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance. With deception, we change the network at layer 2-4, and the result of this is the attacker’s collected data is no longer valid and useless requiring the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and put the defender in control! The concepts have been deployed to Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control, and they only need to find one way in. This class will teach you how we are going to flip that model, and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks, and this course will show you how to take advantage of that.

Speakers

Tuesday May 5, 2020 9:00am - 5:00pm
Terrace Lounge

9:00am

2-Day Training - Building a Sustainable Forensics Program
Digital forensics is the preservation and analysis of digital evidence that uses scientifically accepted and validated processes. There is a range of reasons digital forensics may be used, including a breach investigation to identify how a breach occurred and what data was exposed, an investigation of user behavior, recovery from ransomware and other cyberattacks and more. Evidence is always collected, examined, and managed in a forensically sound manner that can be used in a court of law, even if law enforcement or the court system is not involved.
 
We will be covering the basic steps of the process; scope, collection, examination, analysis, and reporting. After we get that basic understanding, we will examine some tools used, both open source and commercial. There is not a single-purpose tool that fits all cases and different tools are required for things such as network, computer, email, database, mobile devices, cloud services, and memory. We will highlight some of the most popular tools, explain the pros and cons of the tools and the different types of evidence being collected, and show some working examples. We will discuss real-world examples of Forensics and Incident Response use cases and examine the most recent Malware and Ransomware attacks. We will also discuss and review some of the most challenging cases including Insider Threat, Cyberespionage and "Living off the Land". Join us for this informative yet entertaining training class.

Speakers
avatar for Mr. Jeff Tutton

Mr. Jeff Tutton

President, President Cybersecurity DFIR and Remediation Services, Intersec Worldwide
Mr. Tutton has conducted over 200 onsite security assessments, Incident Response and Remediation projects for some of the largest and most complex merchants, processors, card brands, and banks in the world and has over fifteen years’ experience in in the Regulatory and Security... Read More →


Tuesday May 5, 2020 9:00am - 5:00pm
Guest House Dining Room

9:00am

2-Day Training - Penetration Testing: A Hands-On Introduction to Hacking
Penetration testing (ethical hacking) is a critical skill to help assess the security of networks, applications, and more. In this workshop, participants will get a hands-on introduction to penetration testing following the Penetration Testing Execution Standard (PTES) developed by industry practitioners as a recognized standard for security assessments.
Participants will learn to discover a wide variety of security issues regularly found in actual enterprise security assessments. We will use industry-standard tools such as Metasploit and a variety of manual techniques to perform reconnaissance, vulnerability discovery, exploitation, and post-exploitation against critical enterprise targets such as web applications, servers, mobile devices, and workstations. In addition to learning to use industry-standard security assessment tools, students will learn the underlying concepts of security testing. For example, students will learn how to write exploits and custom penetration testing tools for enterprise assessments. Students will engage in real-world, hands-on security testing against a wide range of targets. This course will provide a solid foundation to help students engage in professional penetration testing.

Student Requirements: Basic knowledge of computer security concepts
Laptop Requirements: Any laptop with administrator access and Oracle VirtualBox installed. Virtual machine downloads will be made available 1 week before the start of the course.

Day 1: 
Introduction to penetration testing
Using automated exploitation tools
Active and passive information gathering
Vulnerability scanning and assessment
Threat modeling
Vulnerability exploitation
Password cracking
Post exploitation
Writing the pentest report
Client-side attacks
Social engineering attacks

Day 2:
Introduction to Web application testing
Wireless attacks
Mobile application testing
Mobile device testing
Internet of Things testing
Exploit development
Penetration tool development
Reverse engineering and vulnerability discovery

Speakers
avatar for Georgia Weidman

Georgia Weidman

Founder, Bulb Security
Georgia Weidman is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, and author. She is a member of the CyberWatch Center's National Visiting Committee, on the board of advisors at Cybrary, and an Adjunct Professor at UMUC and Tulane University. She... Read More →


Tuesday May 5, 2020 9:00am - 5:00pm
Garden Terrace
 
Wednesday, May 6
 

8:00am

Registration and Breakfast
TBD

Wednesday May 6, 2020 8:00am - 9:00am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

9:00am

1-Day Training - CCPA, Data Management, Policy Establishment & Operational Enforcement
This class will help you create a program that will support CCPA and regulatory success. The recommendations provided in this class will provide guidance for the main target areas that need attention when establishing any regulatory adherence program. Some example topics are; How to best establish a data governance principle that will identify appropriately impacted data, assign ownership, check for completeness, and establish preventative controls. As part of data management, detailed technical deployment options focused on CCPA will be addressed as well as eDiscovery technique pros & cons.

We will review verification principles, GRC system applicability for deployments, as well as addressing technical hurdles and considerations for DSAR and Deletion Automation, to include consumer friction versus education in consumer DSAR and deletion responses. Guidance around the benefits and limitations for linking consumer data by creating unique IDs for privacy enactment requests will also be addressed.

Recommendations will be provided on how to create spanning governance; From establishing policies to operationalizing enforceable controls. We will guide you in aligning to Regulations, and leveraging best-practice frameworks, while providing measurable growth and security targets.

Speakers
avatar for Yev Avidon

Yev Avidon

Associate Director, Enterprise Security Compliance, AT&T
Yev AvidonYev Avidon is an information privacy, security and compliance professional and a non-profit board member. Yev started his career as an IT auditor working at major players in Finance and Healthcare industries. Pursuing his career further, Yev moved to information security... Read More →
avatar for Karina Klever

Karina Klever

Founder / CEO, Klever Compliance
Karina Klever is the founder of Klever Compliance, a company whose purpose is to mature client’s governance postures. Karina started her IT career in 1989 as a computer operator. In the following 30+ years, her career culminated in executive leadership roles which reinforced that... Read More →
avatar for Mark Keelan

Mark Keelan

Senior Director Privacy, UST Global
Mark KeelanMark Keelan has over thirty-five years as an IT expert. He has worked for IBM digital analytics team, Peoplesoft as a CRM Product Manager, InterSec Worldwide forensics firm, and more.Mark has and an extensive background in ERP, CRM, cybersecurity, and privacy systems. Currently... Read More →


Wednesday May 6, 2020 9:00am - 5:00pm
Club Room

9:00am

1-Day Training - PowerShell Techniques for Security Professionals
PowerShell is a required skill set for hands-on security professionals. The combination of its flexibility, extensibility, and ubiquity on modern Windows platforms makes PowerShell a go-to tool for Windows Systems Administrators. What’s useful for SysAdmins is also useful for Information Security practitioners, both in offensive and defensives roles. We’ll get hands-on with PowerShell in this class demonstrating, explaining, and building key patterns and features used by security professionals.

Designed for students purely focused on interesting and useful techniques, we’ll go through several key topics and techniques and the importance behind them.

At the end of the course students will be familiar with several techniques and patterns useful to security professionals in both offensive and defensive roles. Students will be able to understand and modify existing tools and well as author their own.

Covered Topics
  • Advanced Filesystem Interaction
  • WebApps – REST APIs and Driving Internet Explorer
  • Reflection and Windows API Interaction
  • Process Interaction and Control
  • Active Directory Interaction

PrerequisitesBefore attending this workshop students must have a comfortable understanding of scripting with PowerShell.

Required MaterialsThis is a hands-on workshop. Students are expected to bring a functional laptop with a suitable operating system and software pre-installed.

  • Windows 10, Windows Server 2012R2, or Windows Server 2016 (Virtual Machines are acceptable)
  • PowerShell Core 6.2.4. 
Available from https://github.com/PowerShell/PowerShell/releases/tag/v6.2.4

Speakers
JK

John Kennedy

John is currently a Senior Incident Response Engineer at a leading healthcare provider. He has several years of experience using scripting to solve business, technology, and operational problems. John is passionate about #devchatsecops and securing all the things.
CI

Chris Ingram

Chris has two decades of experience in various technology-based roles including those in Information Security, Systems Engineering, and Software Engineering. A long and varied history of building and breaking has fostered development of a variety of field-honed skills backed by the... Read More →


Wednesday May 6, 2020 9:00am - 5:00pm
Marion Davies Guest House Parlor

9:00am

2-Day Training - Advanced Defense and Tactics of Deception
No product will make us secure. Estimates are $94 Billion was spent in 2018 on cybersecurity products in the US, yet we had many data breaches. We are losing the battle, so it is time for another approach. Organizations need to begin with the foundations of defense to prepare for those determined to deploy deception and take control of your networks. Estimates are these costs will have grown to $100B in 2019. 
No matter how much “security” is put in place, the reality is we are running our data on protocols developed many years ago when the Internet was small. As a result, these protocols are based on the principle of trust.  To truly defend, protocols can be changed to frustrate and confuse an adversary. 
In this course, advanced defensive concepts are explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance. With deception, we change the network at layer 2-4, and the result of this is the attacker’s collected data is no longer valid and useless requiring the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and put the defender in control! The concepts have been deployed to Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control, and they only need to find one way in. This class will teach you how we are going to flip that model, and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks, and this course will show you how to take advantage of that.

Speakers

Wednesday May 6, 2020 9:00am - 5:00pm
Terrace Lounge

9:00am

2-Day Training - Building a Sustainable Forensics Program
Digital forensics is the preservation and analysis of digital evidence that uses scientifically accepted and validated processes. There is a range of reasons digital forensics may be used, including a breach investigation to identify how a breach occurred and what data was exposed, an investigation of user behavior, recovery from ransomware and other cyberattacks and more. Evidence is always collected, examined, and managed in a forensically sound manner that can be used in a court of law, even if law enforcement or the court system is not involved.
 
We will be covering the basic steps of the process; scope, collection, examination, analysis, and reporting. After we get that basic understanding, we will examine some tools used, both open source and commercial. There is not a single-purpose tool that fits all cases and different tools are required for things such as network, computer, email, database, mobile devices, cloud services, and memory. We will highlight some of the most popular tools, explain the pros and cons of the tools and the different types of evidence being collected, and show some working examples. We will discuss real-world examples of Forensics and Incident Response use cases and examine the most recent Malware and Ransomware attacks. We will also discuss and review some of the most challenging cases including Insider Threat, Cyberespionage and "Living off the Land". Join us for this informative yet entertaining training class.

Speakers
avatar for Mr. Jeff Tutton

Mr. Jeff Tutton

President, President Cybersecurity DFIR and Remediation Services, Intersec Worldwide
Mr. Tutton has conducted over 200 onsite security assessments, Incident Response and Remediation projects for some of the largest and most complex merchants, processors, card brands, and banks in the world and has over fifteen years’ experience in in the Regulatory and Security... Read More →


Wednesday May 6, 2020 9:00am - 5:00pm
Guest House Dining Room

9:00am

2-Day Training - Penetration Testing: A Hands-On Introduction to Hacking
Penetration testing (ethical hacking) is a critical skill to help assess the security of networks, applications, and more. In this workshop, participants will get a hands-on introduction to penetration testing following the Penetration Testing Execution Standard (PTES) developed by industry practitioners as a recognized standard for security assessments.
Participants will learn to discover a wide variety of security issues regularly found in actual enterprise security assessments. We will use industry-standard tools such as Metasploit and a variety of manual techniques to perform reconnaissance, vulnerability discovery, exploitation, and post-exploitation against critical enterprise targets such as web applications, servers, mobile devices, and workstations. In addition to learning to use industry-standard security assessment tools, students will learn the underlying concepts of security testing. For example, students will learn how to write exploits and custom penetration testing tools for enterprise assessments. Students will engage in real-world, hands-on security testing against a wide range of targets. This course will provide a solid foundation to help students engage in professional penetration testing.

Student Requirements: Basic knowledge of computer security concepts
Laptop Requirements: Any laptop with administrator access and Oracle VirtualBox installed. Virtual machine downloads will be made available 1 week before the start of the course.

Day 1: 
Introduction to penetration testing
Using automated exploitation tools
Active and passive information gathering
Vulnerability scanning and assessment
Threat modeling
Vulnerability exploitation
Password cracking
Post exploitation
Writing the pentest report
Client-side attacks
Social engineering attacks

Day 2:
Introduction to Web application testing
Wireless attacks
Mobile application testing
Mobile device testing
Internet of Things testing
Exploit development
Penetration tool development
Reverse engineering and vulnerability discovery

Speakers
avatar for Georgia Weidman

Georgia Weidman

Founder, Bulb Security
Georgia Weidman is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, and author. She is a member of the CyberWatch Center's National Visiting Committee, on the board of advisors at Cybrary, and an Adjunct Professor at UMUC and Tulane University. She... Read More →


Wednesday May 6, 2020 9:00am - 5:00pm
Garden Terrace
 
Thursday, May 7
 

7:30am

Registration (7:30am) and Breakfast (7:45am)
Thursday May 7, 2020 7:30am - 9:00am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

9:00am

Welcome Address
TBD

Speakers
avatar for Richard Greenberg

Richard Greenberg

President, ISSA-LA


Thursday May 7, 2020 9:00am - 9:20am
Garden Terrace Room

9:20am

Diamond Sponsor Greetings
TBD

Thursday May 7, 2020 9:20am - 9:25am
Garden Terrace Room

9:20am

Diamond Sponsor Greetings
TBD

Thursday May 7, 2020 9:20am - 9:25am
Garden Terrace Room

9:30am

Opening Keynote
Speakers
avatar for Richard Clarke

Richard Clarke

Host, FUTURE STATE Podcast
Richard A. Clarke served for thirty years in national security policy roles in the US Government, first in the Pentagon, then the State Department, and finally for an unprecedented decade of continuous service for three Presidents in the White House.In the White House National Security... Read More →


Thursday May 7, 2020 9:30am - 10:20am
Garden Terrace Room

10:20am

Break
TBD

Thursday May 7, 2020 10:20am - 10:40am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

10:40am

Talk
TBD

Speakers
avatar for Ryan White

Ryan White

Assistant United States Attorney, Chief of the Cyber & Intellectual Property Crimes Section, Central District of California


Thursday May 7, 2020 10:40am - 11:30am
Sand and Sea Room

10:40am

Talk
TBD

Speakers

Thursday May 7, 2020 10:40am - 11:30am
Club Room

10:40am

Keeping the Momentum Going: The Growth of Women, Minorities and Youth in Cybersecurity
As one of the fastest-growing industries worldwide, cybersecurity is in sore need of new talent to fill its millions of open positions. Women, minorities and young people comprise a significant portion of America’s workforce, and they are increasingly becoming intrigued with starting a career in cybersecurity. Studies performed by (ISC)² show that minority representation within cybersecurity is 26%, with 62% holding a master’s degree or higher; meanwhile, female representation has risen to 24%, with 45% of those women being millennials and 52% holding post-graduate degrees. These are clear signs of progress from where the industry first started, but we need to continue propelling this momentum forward. Join Marci McCarthy as she discusses how leadership, mentorship and technology are crucial in retaining and nurturing women and minorities as well as how we can think outside the box to uncover unconventional talent in unconventional places.

Speakers

Thursday May 7, 2020 10:40am - 11:30am
Terrace Lounge

10:40am

Serverless Attack Vectors
Speakers
avatar for Teri Radichel

Teri Radichel

CEO/Principal Trainer, Researcher, Author, Consultant, 2nd Sight Lab


Thursday May 7, 2020 10:40am - 11:30am
Garden Terrace Room

10:40am

Career Summit and RaiseMe Career Workshops
Security Career Summit
ISSAis joining forces this year with the RaiseMe Team to create the Security Career Summit. This bimodal event is for established professionals who want to make the most out of the roles they are in, as well those exploring new opportunities to step up their careers. Check the schedule for our talks and clinics about career development, writing resumes, creating effective internships, and mastering interviews and negotiations.
Career Consulting
You can stop by any time during the Security Career Summit for a one-on-one consulting appointment with one of our industry veterans. Bring a hardcopy of your resume for a Career Check-up, Resume Review, Mock Interview, or Job Hunt Assist. For hiring managers we also have help with Job Posting and Candidate Evaluations.
Sponsors
The Security Career Summit provides more than just outreach to conference attendees. Tabling at our event gives your hiring personnel the opportunity to meet with candidates in private appointments and make offers in real time. If you would like to sponsor the Security Career Summit, please direct your request to Vendor_Director@issa-la.org


Thursday May 7, 2020 10:40am - 5:10pm
Veranda North

10:40am

CMD+CTRL Cyber Range - Security Innovation
The CMD+CTRL Cyber Range features intentionally vulnerable applications and websites that tempt players to steal money, find out their boss’s salary, purchase costly items for free, and conduct other nefarious acts. Hundreds of vulnerabilities, common to most business applications, lay waiting to be exposed.
The result? Teams that beg you for more.Teams learn how applications are attacked by actively exploiting websites, applications, and mobile apps. Hands-on means higher engagement and retention.

Thursday May 7, 2020 10:40am - 5:10pm
Guest House Parlor

11:40am

Solid State Drive Forensics: More Than Hard Drives at Ludicrous Speeds
Solid State Drives are now commonplace throughout work and personal systems. The underlying technology is vastly different compared to magnetic hard drives, yet they share common file systems and interactions with computers. In this session, we will discuss the fundamental differences between the two technologies. We will then address the concerns from a forensic preservation and analysis perspective. Finally, we will discuss the future of solid state drives and forensic analysis.


Thursday May 7, 2020 11:40am - 12:30pm
Sand and Sea Room

11:40am

Unbreaking Your Security Program - Using Outcomes As A Business Strategy
The world of cybersecurity has changed. Cybercriminals target organizations and unleash a torrent of malicious files and attacks that flood an enterprise until a breach occurs. Many businesses, both large and small, have been infiltrated exposing their organization to high risks and long-term costs. Executives are increasingly interested in the state of information security, moving cybersecurity from a backroom issue to one in the boardroom.  While some organizations have risk management programs in place, few are sufficient in changing the conversation from “fixing problems” to business outcomes and transforming the business proactively.
 
This presentation will discuss:
• Facilitating a culture that views cybersecurity as a business issue
• Assessing the effectiveness of your cybersecurity program
• Proving that cybersecurity is more than defending against attacks – but also impacts businesses positively from the top-down by aligning security strategies with business opportunities and goals

Speakers

Thursday May 7, 2020 11:40am - 12:30pm
Club Room

11:40am

You Can Stop Stupid
Currently when a user causes a loss, it is considered an awareness failing. The reality is that it is a failure of the system that allowed an action to result in loss. Applying safety and counterterrorism sciences, presenters will provide a strategy for creating an environment around users that prevents the initiation of losses, and then mitigates losses should a user make a potentially harmful action.

Pre-Requisites: While any security professional will be able to learn a great deal from this session, professionals with an experience in governance and security strategy will be able to get the most out of it.

Speakers
avatar for Ira Winkler

Ira Winkler

President, Secure Mentem


Thursday May 7, 2020 11:40am - 12:30pm
Garden Terrace Room

11:40am

Talk
TBD

Speakers

Thursday May 7, 2020 11:40am - 12:30pm
Terrace Lounge

12:30pm

Lunch and Vendor Expo
TBD

Thursday May 7, 2020 12:30pm - 2:00pm
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

1:15pm

Law Enforcement Panel
TBD

Moderators
Thursday May 7, 2020 1:15pm - 1:50pm
Sand and Sea Room

1:15pm

1:15pm

Vendor Spotlight Talk
TBD

Thursday May 7, 2020 1:15pm - 1:50pm
Terrace Lounge

1:15pm

Vendor Spotlight Talk
TBD

Thursday May 7, 2020 1:15pm - 1:50pm
Sand and Sea Room

2:00pm

PSYOPS 2020: State-Sponsored Social Media Weaponization
TBD

Speakers
avatar for Charity Wright

Charity Wright

Cyber Threat Intelligence Analyst, US Army and the National Security Agency
Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years experience at the US Army and the National Security Agency, where she translated Mandarin Chinese. Wright now focuses her attention on dark web cyber threat intelligence, cyber-criminal communication, and geopolitical... Read More →


Thursday May 7, 2020 2:00pm - 2:50pm
Sand and Sea Room

2:00pm

2:00pm

Establishing Security by Design Practices: DevSecOps and APIs
Microservices architectures (as well as the general trend to cloud computing, mobile- and rich web applications, IoT) led to proliferation of APIs (according to Akamai, 83% of web traffic is now API traffic). What used to be an internal call between application components in the world of monolithic applications of the past, is now an API call often made over public network and susceptible to attacks.

DevOps approach unwillingly exacerbated the problem. It enabled dev teams to move faster spinning up more microservices and rapidly iterating over their releases.

This is a huge expansion of the attack surface: Gartner estimates that by 2021 exposed APIs will form a larger attack surface than UIs for 90% of web-enabled applications. And also a huge challenge, because rapid agile iterations of hundreds if not thousands of APIs within a single company makes it impossible for the security team to manually control and enforce security policies and best practices across all of them.

With the ever rising privacy and cybersecurity requirements and the potential catastrophic consequences of a breach, companies are turning to DevSecOps approach to enable automated security static analysis and security testing as part of their CI/CD pipelines.

In this session, we will discuss these trends and the practical steps of establishing security by design practices in your company.


Speakers
DS

Dmitry Sotnikov

VP, Cloud Platform, 42 Crunch


Thursday May 7, 2020 2:00pm - 2:50pm
Terrace Lounge

2:00pm

Incident Response
Speakers
avatar for Nia Samir

Nia Samir

After completing this session, participants will be able to:* Build an Incident Response Plan* Explain the six steps in an Incident Response Plan (based on SANS)* Prepare for the before, during and after of a security incident A security incident response plan is a set of instructions... Read More →


Thursday May 7, 2020 2:00pm - 2:50pm
Terrace Lounge

3:00pm

Vulnerabilities in Industrial Control Systems
It is no secret that part of the US Critical Infrastructure includes power and utility grids. Industrial Control Systems (ICS) are predominantly used to manage a myriad of unique capabilities for utilities, telecommunication grids, transportation networks and manufacturing plants.  In 2018 a Polish researcher created a tool that allowed him to scrape data from the internet and identify nearby surveillance cameras exposed to the internet. Since then, the tool has been updated several times and research updated showing how it can identify and map many of the vulnerable Industrial Control Systems in the United States. 
The focus of this discussion will be on specific vulnerabilities associated with Industrial Control Systems used in various industries. The presenter will show how significant the problem is and how it could affect 100% of the US population. Further discussion will revolve around what local, state and the federal governments are doing to address the problem. Specific ICS technologies known to be vulnerable to attacks will be highlighted as well.

Speakers
DS

Dr. Shawn Murray

COO, ISSA International
Shawn Murray is President and Chief Academic Officer at Murray Security Services and is assigned to the United States Missile Defense Agency. He is assigned as a Senior Cyber Security Professional and is an officer in the US Civil Air Patrol. His previous assignments include work... Read More →


Thursday May 7, 2020 3:00pm - 3:50pm
Sand and Sea Room

3:00pm

Is the Cloud Secure? It’s Even Easier in 2020 If You Do it Smart
Have you found yourself lost in the cloud and terrified by the fact that you don’t have controls of the infrastructure? Has your cloud journey being of fear and driven by business?
Fear not, NSC42 and Cloud Security Alliance are here to come at aid. The talk distills the knowledge of several cloud transformation and the collective minds of many CSA contributors.
We will explore the success stories and pitfalls during cloud transformations and quick tips on how to move happily and safely into the cloud.

Synopsis:
The talk will take the the audience on a journey on the cloud evolution, the recent compromisation and the need to make security everyone's responsibility.
The talk will explore major challenges in cloud transformation from an organization and security perspective with the top 8 solutions to address them.
The solution will explore:
- the shared responsibility models
- Foundation architecture
- Cloud pattern available
- Design security and security by design
- Gamification and the use of EoP in everything security
- Shift left and bringing security at the beginning of the development
- Security testing and automation
- Continuous monitoring with example in various cloud providers (GCP forsetti, Azure Security Center….)
- DEV-SEC ops and the integration of Security and Business/Architecture

The talk will also explore how the governance model for cloud transformation works and the success stories.
We will also explore the top 5 key cloud patterns (Account isolation, Firewall and access control, Logging and cascade pattern, Identity and access management, Key/secret management)

Audience Take Away:
● When starting a cloud security journey or by being already into one what shall you do and consider.
● Key security element to consider from day 1 to delivery
● automation and why is so vital to automate security vulnerability
● Cloud patterns and terraformation
● CI-CD for deployment and cloud patterns

Speakers
avatar for Francesco Cipollone

Francesco Cipollone

Acting Virtual CISO, ELEXON
I’m Francesco, a Chief Information Security Officer (CISO) and cybersecurity advisor who specialises in strategy and cloud security. Fuelled with passion, curiosity and dissatisfaction for the status quo, I believe in protecting the cyberspace one the company at the time and creating a safer, more con... Read More →


Thursday May 7, 2020 3:00pm - 3:50pm
Club Room

3:00pm

Panel: Potential Pitfalls of the CCPA Exemptions: Ensuring Reasonable Security Measures
Panel: Potential Pitfalls of the CCPA Exemptions: Ensuring Reasonable Security Measures

Speakers
avatar for W. Reece Hirsch

W. Reece Hirsch

W. Reece Hirsch counsels clients on healthcare regulatory and transactional matters and co-heads the firm’s privacy and cybersecurity practice. Representing healthcare organizations such as hospitals, health plans, insurers, physician organizations, healthcare information technology... Read More →
avatar for Cole Manaster

Cole Manaster

Senior Associate, Cyber Risk Practice, Kroll
Cole Manaster is a Senior Associate with Kroll's Cyber Risk practice, based in the San Francisco office, and a founding member of the firm’s Malware Analysis Team. Since joining Kroll in 2018, Cole has played a key role in digital forensics and incident response engagements for clients across many industry sectors. His investigative experie... Read More →
avatar for Keith Novak

Keith Novak

Associate Managing Director, Cyber Risk Practice, Kroll
Keith Novak is an associate managing director with the Cyber Risk practice of Kroll, a division of Duff & Phelps, based in the New York office. Keith has worked in the information technology field for more than 25 years, and is an accomplished manager and practitioner with extensive... Read More →
avatar for Jonathan Fairtlough

Jonathan Fairtlough

Managing Director, Cyber Risk Practice, Kroll
Jonathan Fairtlough is a managing director with Kroll's Cyber Risk practice, based in the Los Angeles office, from where he also leads client cyber engagements in Canada and throughout the Asia Pacific region. Jonathan joined Kroll after a distinguished career with the Los Angeles County District Attorney’s Office, where he served as both a prosecutor and Co-Founder of the Office’s High Technology Division. At Kroll, Jonathan leads teams th... Read More →


Thursday May 7, 2020 3:00pm - 3:50pm
Garden Terrace Room

3:00pm

Talk
TBD

Speakers

Thursday May 7, 2020 3:00pm - 3:50pm
Terrace Lounge

3:50pm

Break and Vendor Expo
TBD

Thursday May 7, 2020 3:50pm - 4:20pm
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

4:20pm

Law Enforcement Panel
Moderators
avatar for MK Palmore

MK Palmore

VP, Field CSO (Americas), Palo Alto Networks
MK Palmore serves as VP, Field CSO (Americas) for Palo Alto Networks. MK serves as a leader within INSIGHT by Palo Alto Networks. The INSIGHT team provides strategic advisory services related to digital transformation and cybersecurity enterprise roadmap development and implementation... Read More →

Speakers

Thursday May 7, 2020 4:20pm - 5:10pm
Sand and Sea Room

4:20pm

Re-engineering the Cyber Security Process
TBD

Speakers
avatar for Mehrdad Sharbaf

Mehrdad Sharbaf

Founder, Sharbaf & Associates
Dr. Mehrdad Sharbaf has more than 20 years’ experience in industry, and academic focusing on system security integration, system security engineering, and information security. Dr. Sharbaf is an adjunct professor at CSUDH, LMU, and CSUN. Founder of Sharbaf & Associates firm, specializing... Read More →


Thursday May 7, 2020 4:20pm - 5:10pm
Club Room

4:20pm

How an Attacker Audits your Software Systems
Many organizations leverage modern technologies to transform their business. However, security implications are often misunderstood, creating significant organizational risk. Poorly configured servers, 3rd-party software, and continuous release cycles put additional pressure on already stressed cross-functional teams. Hackers no longer just exploit vulnerabilities in code - faulty cloud deployments, weak database structures, and business logic problems are easy targets. This presentation demonstrates how attackers compromise the modern enterprise. For each attack vector, mitigation and audit practices will be discussed.

WARNING: software will be harmed during this presentation. Viewer discretion advised.

Speakers
avatar for Joe Basirico

Joe Basirico

Head of the Engineering Team, Security Innovation
Joe leverages his experience as a development lead, trainer, researcher, and test engineer to head up the engineering team at Security Innovation. His deep knowledge of application security risk, coupled with his hands-on experience assessing a wide variety of commercial software... Read More →


Thursday May 7, 2020 4:20pm - 5:10pm
Terrace Lounge

4:20pm

Talk
TBD

Speakers

Thursday May 7, 2020 4:20pm - 5:10pm
Garden Terrace Room

5:20pm

Platinum Sponsor Greetings
TBD

Thursday May 7, 2020 5:20pm - 5:25pm
Garden Terrace Room

5:25pm

Platinum Sponsor Greetings
TBD

Thursday May 7, 2020 5:25pm - 5:30pm
Garden Terrace Room

5:30pm

Closing Keynote
TBD

Speakers
avatar for Diana Kelley

Diana Kelley

Cybersecurity Field CTO, Microsoft
Diana is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, executive advisor and author. At Microsoft she leverages her 25+ years of cyber-risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the world’s largest companies... Read More →


Thursday May 7, 2020 5:30pm - 6:20pm
Garden Terrace Room

6:20pm

Opening Reception
TBD

Thursday May 7, 2020 6:20pm - 9:00pm
Pool
 
Friday, May 8
 

7:30am

Registration (7:30am), Breakfast (7:45am) and Vendor Expo
TBD

Friday May 8, 2020 7:30am - 8:30am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

8:30am

Welcome Address
TBD

Speakers
avatar for Richard Greenberg

Richard Greenberg

President, ISSA-LA


Friday May 8, 2020 8:30am - 8:35am
Garden Terrace Room

8:35am

Opening Keynote
Speakers
avatar for Ronald Ross

Ronald Ross

Fellow at the National Institute of Standards and Technology, National Institute of Standards and Technology Computer Security Division, Information Technology Laboratory
Ron Ross is a Fellow at the National Institute of Standards and Technology. His focus areas include computer security, systems security engineering, and risk management. Dr. Ross leads the Federal Information Security Modernization Act (FISMA) Implementation Project and Systems Security... Read More →


Friday May 8, 2020 8:35am - 9:25am
Garden Terrace Room

9:35am

Lessons Learned & Best Practices When Developing a HIPAA/HITECH Compliance Program
OCR will provide lessons learned and best practices to consider when developing a HIPAA/HITECH compliance program.  In addition, OCR will present recent OCR policy developments, OCR’s access initiative, and review of recent enforcement actions highlighting the importance of implementing social media policies and procedures, filing breach reports, implementing HIPAA/HITECH policies and procedures and ensuring mobile device encryption.    

Speakers
YP

Yun-Kyung (Peggy) Lee

Deputy Regional Manager, Pacific Region of the U.S Department of Health and Human Services, Office for Civil Rights (OCR)
Yun-kyung (Peggy) Lee is the Deputy Regional Manager in the Pacific Region of the U.S Department of Health and Human Services, Office for Civil Rights (OCR).  Ms. Lee began as an Investigator at OCR in 2003 conducting investigations and recommending resolution of complaints alleging... Read More →


Friday May 8, 2020 9:35am - 10:25am
Club Room

9:35am

AppSec: The Lies Holding You Back
You think you need a penetration test, but you probably need something different.  You think you're budgeting appropriately, but you're probably not.  You think you're finding your security vulnerabilities, but you're probably not finding the important ones. You are barraged with claims from security suppliers, each saying they’ll solve all of your problems in what feels like overblown promises.  You want those promises to be true, but a nagging part of you knows they probably aren’t.  All you want is to be secure. I feel your pain: this session is to help you get application security right.   But to get it right, you need to stop doing it wrong. In this session, CTOs, CISOs, and other leaders learn effective strategies and tactics for how to find and fix security vulnerabilities, before your attacker finds and exploits them. Based on a forthcoming book that exposes the many misconceptions about application security, this session combines stories from the front lines of security research and security consulting, in order to entertain and equip you to achieve your application security mission. You’ll learn ideas that you can implement right away.

Speakers
avatar for Ted Harrington

Ted Harrington

Executive Partner, Independent Security Evaluators [ISE]
Ted Harrington is Executive Partner at Independent Security Evaluators, the security organization famous for hacking everything from cars to medical devices to smartphones, and more. Ted has been named both Executive of the Year and 40 Under 40, he is one of the organizers of popular... Read More →


Friday May 8, 2020 9:35am - 10:25am
Sand and Sea Room

9:35am

Talk
TBD

Speakers

Friday May 8, 2020 9:35am - 10:25am
Terrace Lounge

9:35am

Talk
TBD

Speakers
avatar for Caroline Wong

Caroline Wong

Chief Strategy Officer, Cobalt.io
Caroline Wong is the Chief Strategy Officer at Cobalt.io. Caroline’s close and practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. She holds advisory roles for... Read More →


Friday May 8, 2020 9:35am - 10:25am
Garden Terrace Room

9:35am

CMD+CTRL Cyber Range - Security Innovation
The CMD+CTRL Cyber Range features intentionally vulnerable applications and websites that tempt players to steal money, find out their boss’s salary, purchase costly items for free, and conduct other nefarious acts. Hundreds of vulnerabilities, common to most business applications, lay waiting to be exposed.
The result? Teams that beg you for more.Teams learn how applications are attacked by actively exploiting websites, applications, and mobile apps. Hands-on means higher engagement and retention.

Friday May 8, 2020 9:35am - 3:20pm
Guest House Parlor

10:25am

Break and Vendor Expo
TBD

Friday May 8, 2020 10:25am - 10:55am
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

11:00am

Talk
TBD

Speakers

Friday May 8, 2020 11:00am - 11:50am
Club Room

11:00am

PCI Compliance
Speakers
avatar for Mike Villegas

Mike Villegas

Edu Director, ISSA LA
Miguel (Mike) O. Villegas is a Senior Vice President for K3DES LLC. He performs and QA’s PCI-DSS and PA-DSS assessments for K3DES clients. He also manages the K3DES ISO/IEC 27002:2013 program. Mike was previously Director of Information Security at Newegg, Inc. for five years. Mike... Read More →


Friday May 8, 2020 11:00am - 11:50am
Terrace Lounge

11:00am

Talk
TBD

Speakers
avatar for John Dickson

John Dickson

Principal, Denim Group, Ltd
John Dickson is an internationally recognized security leader, entrepreneur and Principal at Denim Group, Ltd. He has nearly 20 years’ hands-on experience in intrusion detection, network security and application security in the commercial, public and military sectors. As a Denim... Read More →


Friday May 8, 2020 11:00am - 11:50am
Sand and Sea Room

11:00am

Panel Discussion: All Roads Lead to Cybersecurity: Diverse Roles for a Diverse Workforce
Cybersecurity is a rewarding industry, but it can be difficult for women and minorities to enter and is full of problems to solve once you get there. However, it’s those same challenges that excite and motivate newcomers to sign up for a career in cybersecurity. So many roles in the field offer fulfilling purpose as well as valuable professional and personal growth—and they are not constrained to one set path. The cybersecurity road is full of forks, and professionals involve themselves in various ways, some in technical roles, others in marketing, communications, entrepreneurship and more. This level of flexibility and diversity in the field warrants candidates who are just as flexible, diverse and talented, but it is the responsibility of current professionals to demonstrate how this is a recipe for success. Join our conversation as our panel of security professionals share how they come together through many different roles to make cybersecurity work. They will also impart their personal success stories and insights about how women and minorities can stand out and step up as promising new talent in the field.

Moderators
Friday May 8, 2020 11:00am - 11:50am
Garden Terrace

12:00pm

Healthcare CISO Panel
Healthcare CISO Panel

Moderators
avatar for Richard Greenberg

Richard Greenberg

President, ISSA-LA

Speakers
avatar for James Brady

James Brady

Chief Information Officer, Los Angeles County Department of Health Services (DHS)
James is the Chief Information Officer for the Los Angeles County Department of Health Services (DHS), the second largest municipal health system in the nation with an integrated system of 19 health centers and four hospitals.  DHS annually cares for about 600,000 unique patients... Read More →


Friday May 8, 2020 12:00pm - 12:50pm
Garden Terrace

12:00pm

DevOps Security? Oxymoron or Truism?
There’s “SecDevOps”, “DevSecOps”, DevOpsSec”, and just plain old security for DevOps. You might very well be confused? Software developers and security people haven’t been able to settle on a term, much less what it all means in practice. Many shops have developers who declare that security is too cumbersome for DevOps. At the same time, those charged with application security try for control of the DevOps chain. These positions are based in myths and misunderstandings; they lead to unnecessary friction. Security practices benefit from a DevOps mindset, and the automation and code that results. But first, myths must be busted. There is no inherent antipathy between security and DevOps. Even DevOps requires plans and structure. And security improves through iteration of bite-sized chunks.

A common myth of DevOps is that activities like architecture may be jettisoned in favour of automation. But, architecture typically requires at least some human analysis. A key part of architecture and design will be security thinking. Security thinking will be based in threat modeling. An examination of the integration of security activities, and especially threat modeling into the DevOps cycle is critical to implementing security in a DevOps loop.

Join Author and Master Security Architect, Brook S.E. Schoenfield, to learn about effective, proven DevOps security strategies.

Speakers
avatar for Brook Schoenfield

Brook Schoenfield

Master Security Architect, IOActive
Brook S.E. Schoenfield is the Author of Secrets Of A Cyber Security Architect (Auerbach Publications, 2019) and Securing Systems: Applied Security Architecture and Threat Models (CRC Press, 2015). As IOActive's Master Security Architect, he provides technical leadership for IOActive's... Read More →


Friday May 8, 2020 12:00pm - 12:50pm
Terrace Lounge

12:00pm

Securing AWS
Speakers
VM

Veronica Mitchell

CISO, City of Santa Monica


Friday May 8, 2020 12:00pm - 12:50pm
Club Room

12:00pm

Talk
TBD

Speakers

Friday May 8, 2020 12:00pm - 12:50pm
Sand and Sea Room

12:50pm

Lunch, Vendor Expo, and Raffle Drawings
Friday May 8, 2020 12:50pm - 2:30pm
Annenberg Community Beach House 415 Pacific Coast Hwy, Santa Monica, CA 90402, USA

2:30pm

Panel: Cybersecurity Perils 2020 And Beyond
This panel discussion will take a guided look into the crystal ball to see what threats are looming in 2020, and the tools, technologies, and techniques we’ll use to protect against them.  


Moderators
avatar for Tim Moran

Tim Moran

Tim Moran is a strategic technology professional and entertainment industry IT leader with twenty-five years experience driving innovation, digital transformation, and operational excellence in global organizations. Combining deep technical knowledge, strong team-building and leadership... Read More →

Friday May 8, 2020 2:30pm - 3:20pm
Sand and Sea Room

2:30pm

Talk
TBD

Speakers
avatar for Jim Manico

Jim Manico

Founder, Trainer & Author, Manicode Security
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also an investor/advisor for KSOC, Nucleus Security, Signal Sciences, Secure Circle and BitDiscovery. Jim is a frequent speaker on secure software practices... Read More →


Friday May 8, 2020 2:30pm - 3:20pm
Garden Terrace Room

2:30pm

Countering ‘Short and Distort’ Disinformation Campaigns
Jennifer DeTrani is General Counsel and EVP at Nisos, a cybersecurity company and threat investigations firm. Prior to joining Nisos, Jennifer co-founded a secure messaging company, Wickr, where she served as General Counsel and Chief Privacy Officer.  Jennifer has litigated as an Assistant U.S. Attorney and has worked with technology start-ups both as a solo practitioner and in Big Law.  She writes about cybersecurity, privacy and technology as a contributing author for Above the Law.  


Speakers
avatar for Jennifer de Trani

Jennifer de Trani

EVP and General Counsel, Nisos
avatar for Ryan Lai

Ryan Lai

EVP of Professional Services, Nisos
Ryan Lai has 13 years experience in the information security industry. His focus area has been research against advanced and non-traditional threats, and he has been involved in the global investigations of numerous high profile incidents throughout his career. Ryan is a frequent... Read More →


Friday May 8, 2020 2:30pm - 3:20pm
Club Room
  • surveys y

2:30pm

Talk
TBD

Speakers
avatar for Alyssa Miller

Alyssa Miller

Application Security Advocate, Snyk Ltd.
Alyssa Miller is a hacker, security evangelist, cyber security professional and public speaker with almost 15 years of experience in the security industry. She has always had a passion for deconstructing technology, particularly since buying her first computer at the age of 12 teaching... Read More →


Friday May 8, 2020 2:30pm - 3:20pm
Terrace Lounge

3:30pm

Closing Keynote
Speakers
avatar for Walter O'Brien

Walter O'Brien

Founder, Scorpion Computer Services
Walter O'Brien (aka "Scorpion") is the founder of https://scorpioncomputerservices.com, a global think tank or “intelligence-on-demand” for ANY private families funded needs. Walter is the Executive Producer of the hit CBS-TV drama "Scorpion" inspired by his life, which aired globally to up to a billion viewers each week in 188 countries for 4 seasons. Walter who... Read More →


Friday May 8, 2020 3:30pm - 4:20pm
Garden Terrace Room
  • surveys y

4:20pm

Closing Remarks
Speakers
avatar for Richard Greenberg

Richard Greenberg

President, ISSA-LA


Friday May 8, 2020 4:20pm - 4:30pm
Garden Terrace Room