ISSA Chicago Chapter February Meeting

February 6th, 2020

Get Alerts To Events Like This

 February 6th, 2020  

ISSA Chicago Chapter February Meeting

Event submitted on Tuesday, January 28th 2020, approved by Content Team

This Event is Now Over
February 6th, 2020
United States  »  Midwest, USA  »  Illinois » 
Event Website

This event has been tagged as follows:

This event is part of a series managed by ISSA

 Our Review

If you’re not a member of ISSA and work in Cybersecurity then we’d absolutely encourage you to get involved with the institution. One of the great things about ISSA is that they organize infosec events like this one taking place in Chicago, as well as helping you network with fellow Cybersecurity professionals in Illinois. Let us know if you attend this event, we’d love to learn more!

- Review written by Henry Dalziel on Tuesday, January 28th 2020.
- If you would like to edit or ammend facts in my review please either send us a message or connect with me via LinkedIn.

Conference Event Summary

The following description was either submitted by the Conference Organizer on Tuesday, January 28th 2020, or created by us.

Everyone is invited to join the ISSA Chicago Chapter for their monthly chapter meeting. The featured speaker for the February meeting is Dustin Childs, Sr. Security from Trend Micro.

Hors d’oeuvres will be served. Cash bar available. ISSA Chicago Chapter members will receive a complimentary drink if they register for the meeting as members.

The topic title for this meeting is: “Bug Bounty Programs and how they are shaping Threat Research”

Nearly every company claims to do threat intelligence and vulnerability research, but what does that really mean? Different marketplaces exist for security research and the current black and gray markets can be as robust as their white market counterparts. At each stage of the process, information about the vulnerability equates to a monetary value and depending on how this information is disseminated, that monetary value can drastically change. Like any open market, different factors can spur changes in supply and demand, and market actors can shape what types of research either become public – or finds its way into an active exploit.

Even if you don’t actively join in the exploit economy, it impacts the security of your company. The most obvious way this manifests is through security patches that result from submissions to bug bounty programs, but other factors have wide-reaching impacts. Understanding the source of threat intelligence and the exploit economy is vital for getting proactive with your network defenses rather than merely reacting to threats.

Submit a review for this event.

Did you attend ISSA Chicago Chapter February Meeting? Let us know how it was and share your experience with the greater community.