ISSA Chicago Chapter February Meeting

February 6th, 2020
Virtual Events Cloud First

 February 6th, 2020  

ISSA Chicago Chapter February Meeting

Event submitted on Tuesday, January 28th 2020, approved by Charles Villanueva

Remember To Check! COVID-19 has wrecked havoc on "traditional" physical conferences, so please double check that ISSA Chicago Chapter February Meeting is definintely going ahead.

Stay Safe, Stay Strong and we'll see you on the other side. Your friends at InfoSec Conferences.

This Event is Now Over
February 6th, 2020
United States  »  Midwest, USA  »  Illinois » 
Event Website

This event has been tagged as follows:

This event is part of a series managed by ISSA

 Our Review

If you’re not a member of ISSA and work in Cybersecurity then we’d absolutely encourage you to get involved with the institution. One of the great things about ISSA is that they organize infosec events like this one taking place in Chicago, as well as helping you network with fellow Cybersecurity professionals in Illinois. Let us know if you attend this event, we’d love to learn more!

- Review written by Henry Dalziel on Tuesday, January 28th 2020.
- Would you like to edit this review? You can by sending us a message or you can connect through LinkedIn.

Event Summary

The following description was either submitted by the Conference Organizer on Tuesday, January 28th 2020, or created by us.

favouriteLoadingAdd this conference to your favourites

Everyone is invited to join the ISSA Chicago Chapter for their monthly chapter meeting. The featured speaker for the February meeting is Dustin Childs, Sr. Security from Trend Micro.

Hors d’oeuvres will be served. Cash bar available. ISSA Chicago Chapter members will receive a complimentary drink if they register for the meeting as members.

The topic title for this meeting is: “Bug Bounty Programs and how they are shaping Threat Research”

Nearly every company claims to do threat intelligence and vulnerability research, but what does that really mean? Different marketplaces exist for security research and the current black and gray markets can be as robust as their white market counterparts. At each stage of the process, information about the vulnerability equates to a monetary value and depending on how this information is disseminated, that monetary value can drastically change. Like any open market, different factors can spur changes in supply and demand, and market actors can shape what types of research either become public – or finds its way into an active exploit.

Even if you don’t actively join in the exploit economy, it impacts the security of your company. The most obvious way this manifests is through security patches that result from submissions to bug bounty programs, but other factors have wide-reaching impacts. Understanding the source of threat intelligence and the exploit economy is vital for getting proactive with your network defenses rather than merely reacting to threats.

Submit a review for this event.

Did you attend ISSA Chicago Chapter February Meeting? Let us know how it was and share your experience with the greater community.