Next Meeting Thursday, May 14th, 2020 from 6:00 PM to 8:00 PM (Eastern)

The CI-ISSA chapter meetings will go on as planned this month. Registered attendees will receive Zoom meeting details the day of the event. Going Remote!

Concerned about Zoom’s security and privacy? Watch the SANS On Demand Webcast

First  Presentation:  Best Practices, PAM Security, Data Privacy and Busting the Six Myths about PAM

Speaker: Christopher Hills, BeyondTrust


What is best practice? Best practice ranges from organization to organization as a result of each organizations risk appetite and risk tolerance. Answering the questions around what, how and why. As a leader in the Privileged Access Management (PAM) market, BeyondTrust is constantly challenged with questions surrounding strategy, maturity and priorities, while managing security risks. In this revealing presentation you’ll learn:

•           Analyzing Best Practice
•           Security considerations
•           Key components for a successful PAM strategy
•           How six widely held beliefs about PAM are in fact wrong
•           Why the typical IT environment is a hacker’s playground?
•           Where the current threat landscape is heading and how to prepare

Speaker Bio:

Christopher Hills, Deputy Chief Technology Officer

Christopher L Hills has more than 15 year’s experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy, and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has assisted the Sales Engineering Organization consulting on PAM implementations and now reports to the Office of the CTO as Deputy CTO. In his free time, Chris enjoys spending time with his family on the water with their 32 foot speedboat in the summer and taking to the sand dunes and off-roading in the winter along with being a Cuban cigar aficionado.


Second Presentation: AI vs AI: The Good, the Bad, and the Ugly

Speaker: Nadav Maman, Deep Instinct


The day hackers start using AI and how to protect against it
Think about what would happen when hackers start using the power of AI for their malicious ends? With the dissemination of AI knowledge and resources, this has become not a theoretical question of if, but when. In this discussion, we draw out the implications of this; the risks it holds to the retail sector and what organizations can do to ensure ongoing protection.
From this session you will:
• Understand the future cyber-threat landscape
• Understand the role that advanced AI will play in the development of future malware
• Hear deep learning experts provide a break-down of different types of AI attacks and how they will work
• Gather valuable information that will be useful when planning your future focused security strategy
• Hear recommendations from other cyber experts on how they protected their enterprise against
advanced AI cyber threats
Speaker Bio:
CTO and Co-founder of Deep Instinct:
– Nadav has 15 years of experience in cybersecurity leadership
– Nadav has hands-on experience with data security, network design, and implementation of complex heterogeneous environments
– Previously, Nadav was an Intelligence Officer in well-known Israeli Defense Forces Cyber Defense Unit for seven years
– Mr. Maman was recruited to Israel’s top technology intelligence unit, where he led design and establishment of military data security infrastructures and platforms