PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact

Event Information Systems Security Association ISSA LA .pdf

Original filename: Event_ Information Systems Security Association ISSA-LA .pdf

This PDF 1.5 document has been generated by Microsoft® Word 2016, and has been sent on pdf-archive.com on 11/04/2017 at 07:37, from IP address 198.8.x.x. The current document download page has been viewed 244 times.
File size: 312 KB (2 pages).
Privacy: public file

Download original PDF file

Document preview

If you attend only one conference this year, make it the Ninth Annual Information
Security Summit—the premier Information Systems Security Event in Southern
California. The Summit is known for its groundbreaking keynotes and speakers, and this
year will be no exception.
There are several events in Southern California, but none like ours. We have two All-day
Forums, a full day of training, as well as great tracks for you to choose from.
Our Keynote Speakers include Richard Steinnon, Ira Winkler, Araceli Treu Gomes, and
Manley Feinberg.
Are you a CISO, or want to rub elbows with CISOs, and learn about key issues? Come to
the CISO Forum and hear from Mark Weatherford, Diana kelly, Robert Pittman, and
Malcolm Harkins, to only name a few.
Are you in Healthcare? Join in the Healthcare Privacy and Security Forum, which includes
a Healthcare CISO Panel.
Want to learn how to properly protect your applications? Come listen to Jim Manico and
Chenxi Wang.

And our world class speakers don’t stop there. We have revealing talks by Jeff Bardin, Bob
Bigman, Valerie Thomas, Bill Cheswick, Eva Galperin, Jennifer Granick, Liam O’Murchu,
and Eric Chien.

Don’t wait to register for what is going to be the biggest and most important
gathering of information security professionals in Southern California this year.

ISSA-LA reserves the right to alter or delete items from the program in the event of
unforeseen circumstances. Material has been prepared for the professional development
of ISSA-LA members and others in the IT audit, control, security, and governance
community. Neither the presenters nor ISSA-LA can warrant that the use of material
presented will be adequate to discharge the legal or professional liability of the members
in the conduct of their practices. All materials used in the preparation and delivery of
presentations on behalf of ISACA are original materials created by the speakers, or
otherwise are materials which the speakers have all rights and authority to use and/or
reproduce in connection with such presentation and to grant the rights to ISSA-LA as set
forth in speaker agreement. Subject to the rights granted in the speaker agreement, all
applicable copyrights, trade secrets, and other intellectual property rights in the materials
are and remain with the speakers.

Event_ Information Systems Security Association ISSA-LA .pdf - page 1/2
Event_ Information Systems Security Association ISSA-LA .pdf - page 2/2

Related documents

event information systems security association issa la
surviving a security audit
texting and e mail with patients meeting patient requests
10 days to hipaa compliance a 10 step plan for achieving
get ready for your hipaa compliance audit
get ready for the new hipaa audit program

Related keywords