Personal Information
Industry
Technology / Software / Internet
Website
ntxissa.org
About
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources.
Tags
ntxissa
issa
stem
texas
cybersecurity
ntxissacsc4
ntxissacsc5
ntxissacsc3
ntxissacsc2
information security
security
hacking
cloud
threat modeling
richard brunner
hacking team
hack
enterprise
collin college
threat
malware
ntxissacsc1
layered security
ciso
technology
exploitation
software
issantx
conferences
cybersecuity
james muren
deception
education
michael saylor
harold toomey
trojan
defense in depth
nathan shepard
grant gilliam
marco fernandes
laurianna callaghan
branden r. williams
brian kirkpatrick
david nelson
ed keiper
patrick florer
heather goodnight-hoffmann
quentin rhoads-herrera
mark nagiel
brian mork
mark timothy mandrino
gordon mackay
andy thompson
mark overholser
george finney
certificates
keys
enterprise security
contracts
privacy
data security
rules
data science
signatures
strategies
avid life media
identifying attackers
cyber threats
defense
payments
emv
sharing
tracking the bad guys
psmm
security maturity model
mobile security incidents
iam
snake oil
information management
grc
vulnerability management
risk analysis
fundamentals
threat management
capstone
workload
cloud security
security mindset
storage
encryption
metasploit
metrics
multi-vector ddos attacks detection and mitigation
advanced threat hunting
incident response
landscape
phishing
roundtable
byod
threat intelligence
top ten trendsissa
threat model
dread
stride
andrea almeida
dmz
trust modeling
social media
marathon
industrial control systems
scada
intrusion prevention
life cycle management
apt
advanced persistent threat
internet of things
iot
kid proofing
risk management
information
owned
stranger
social engineering
risk
exam
new
cissp
frameworks
traps
software assurance
essential guide
beginners
updates
process
big data
people
next-generation
requirements
See more
Presentations
(99)Personal Information
Industry
Technology / Software / Internet
Website
ntxissa.org
About
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources.
Tags
ntxissa
issa
stem
texas
cybersecurity
ntxissacsc4
ntxissacsc5
ntxissacsc3
ntxissacsc2
information security
security
hacking
cloud
threat modeling
richard brunner
hacking team
hack
enterprise
collin college
threat
malware
ntxissacsc1
layered security
ciso
technology
exploitation
software
issantx
conferences
cybersecuity
james muren
deception
education
michael saylor
harold toomey
trojan
defense in depth
nathan shepard
grant gilliam
marco fernandes
laurianna callaghan
branden r. williams
brian kirkpatrick
david nelson
ed keiper
patrick florer
heather goodnight-hoffmann
quentin rhoads-herrera
mark nagiel
brian mork
mark timothy mandrino
gordon mackay
andy thompson
mark overholser
george finney
certificates
keys
enterprise security
contracts
privacy
data security
rules
data science
signatures
strategies
avid life media
identifying attackers
cyber threats
defense
payments
emv
sharing
tracking the bad guys
psmm
security maturity model
mobile security incidents
iam
snake oil
information management
grc
vulnerability management
risk analysis
fundamentals
threat management
capstone
workload
cloud security
security mindset
storage
encryption
metasploit
metrics
multi-vector ddos attacks detection and mitigation
advanced threat hunting
incident response
landscape
phishing
roundtable
byod
threat intelligence
top ten trendsissa
threat model
dread
stride
andrea almeida
dmz
trust modeling
social media
marathon
industrial control systems
scada
intrusion prevention
life cycle management
apt
advanced persistent threat
internet of things
iot
kid proofing
risk management
information
owned
stranger
social engineering
risk
exam
new
cissp
frameworks
traps
software assurance
essential guide
beginners
updates
process
big data
people
next-generation
requirements
See more