ISSA of WI-Summer Meeting: Patch TuesdayFollow @infosec_events
InfoSec Conference Summary
The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.
ISSA of WI Summer Meeting BBQ will feature 3 Keynotes, 3x CPEs and a BBQ. Keynotes are: Kurt Roemer, Chief Security Strategist-Citrix, Steve Hunt, ISSA Hall of Fame & ISSA Distinguished Fellow, Russell From, Technical Manager-Tanium
Kurt Roemer will present: Architecting the Privileged Workspace: As a highly privileged user, you have the power to create, enhance and destroy-and so does anyone who can impersonate you, use your tools or otherwise abuse your powers. How can privileged worker’s productivity and experience be optimized while protecting all the resources they’ve been entrusted with?
Steve Hunt will present: Supercharge Your Cybersecurity Career: Almost all security professionals struggle at some point to land a more lucrative and rewarding senior position. In this session, Steve will describe steps you can take today to boost your career with a powerful path to attain coveted powerful and influential senior roles. Everyone will leave this session feeling more empowered about their work life, with actionable practical steps to take right away. Steve is an ISSA Hall of Famer, served on ISSA International BOD, was a judge at RSA Conference and CSO Magazine presented him with the “Industry Visionary” Award. Steve has been featured on CNN, CNBC, Fox News, CNN, Financial Times, WSJ, NY Times and Business Week.
Russell From will present: Micro and Nano-Segmentation: Lessons Learned from the Field, Thoughts on the Future. This presentation introduces Micro-Segmentation and includes industry adoption statistics, strategies, and implementation examples. This presentation came from experience implementing Micro-Segmentation in a fully virtualized hosted environment for many large hospital systems. Russell is a Technical Manager for Tanium. Previously, Russ was a Sr. Network Security Engineer for US Cellular where he defended customers by focusing on proactive network behavior analysis, network forensics, mobile malware identification and remediation.