home_banner

Events

Join The IANS Peer Community

IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather all members of the security function.

*Receive 1 CPE credit for every hour of attendance at our events.
Video Thumbnail
Paul Hypki, Children's Hospital and Clinics of Minnesota

Forums

Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.

CISO Roundtables

One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.

Symposiums

Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.

Webinars

Hour-long interactive discussions examining hot topics in information security.

Filter Events By:

January 26

In this webinar, IANS Faculty Member Aaron Turner will provide an in-depth look at the M365 configurations that the Dark Halo attackers used to gain access to sensitive US Treasury communications. Based upon dozens of IANS client engagements, he will provide a framework to prioritize the remediation of Azure AD and M365 service configuration settings to reduce the risk of similar attacks against IANS customers.

Speakers:
  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.

January 27

Security teams face increased attacks against their security architecture and seek a better approach to stay ahead of the bad guys. The DIE Triad (distributed, immutable, and ephemeral) model of adversarial resilience is one such approach. This virtual symposium will outline the components and how to incorporate them.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

January 28

Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

January 28

Security teams are concerned that their logging techniques are outdated, such as the practice of scouring Active Directory to find needles in haystacks. They seek guidance to identify more sophisticated tools they should use, and many of the answers lie in an approach based around Microsoft System Monitoring (Sysmon) and Elasticsearch (ELK stack) tools.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

February 2

Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.

Speakers:
  • Rich Mogull

    Rich Mogull

    IANS Faculty

    Rich is CEO and Analyst for Securosis, an information security research and advisory firm, in addition to Founder and Vice President of Product at DisruptOPS, a cloud environment monitoring platform. Prior to founding Securosis, he was Research Vice President for Gartner’s security team where he also served as Research Co-Chair for the Gartner Security Summit. Additionally,Rich has served as an independent consultant, web application developer, software development manager, and a systems and network administrator.

February 4

The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

February 10

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

February 10

Attacks against video, messaging and document-sharing tools continue to skyrocket. This webinar will guide security teams on more effective methods to beat back the ongoing barrage.

Speakers:
  • Dave Lewis

    Dave Lewis

    IANS Faculty

    Dave is a Global Advisory CISO for Duo Security, a Cisco subsidiary. He has almost two decades of industry expertise with extensive experience in IT operations and management. Dave is the Founder of the security news site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast. He is also the Director & Co-Founder of OpenCERT Canada, Canada’s first open national Computer Emergency Response Team. Dave has worked finance, healthcare, entertainment, manufacturing, and critical infrastructure verticals. He also has experience consulting for federal organizations working as a Security Consultant and defense contractor to the FBI, US Navy, Social Security Administration, US Postal Service, and the US Department of Defense.

February 11

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first. This virtual symposium helps security teams determine where they are going wrong and how to get on a better track.

Speakers:
  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.

February 16

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

February 16

The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.

Speakers:
  • Matt Chiodi

    Matt Chiodi

    IANS Faculty

    Matt is the CSO of Public Cloud at Palo Alto Networks where he works with organizations to develop and implement security strategy for public cloud adoption and maturity. He has extensive experience in information security leadership and blogging. Matt currently leads the Cloud Threat team which is an elite group of security researchers exclusively focused on public cloud concerns. He also serves as an advisory board member for Rutgers University's Cybersecurity Certificate program.

February 18

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Chris Nickerson

    Chris Nickerson

    IANS Faculty

    Chris is the Co-Founder and CEO of LARES Consulting, an information security consulting firm that leverages a blend of assessment, testing, and coaching. He also serves on the Board of Directors at CREST, an international not-for-profit accreditation and certification body that represents and supports the technical information security market.

February 18

The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

February 23

Manually verifying policy compliance is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for policy automation and tools to do it with.

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

February 25

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Chris Nickerson

    Chris Nickerson

    IANS Faculty

    Chris is the Co-Founder and CEO of LARES Consulting, an information security consulting firm that leverages a blend of assessment, testing, and coaching. He also serves on the Board of Directors at CREST, an international not-for-profit accreditation and certification body that represents and supports the technical information security market.

February 25

IAM teams are challenged with demands for more robust access governance, cloud migration and integration with other IT infrastructure. This virtual symposium helps security teams make smart choices.

Speakers:
  • Idan Shoham

    Idan Shoham

    IANS Faculty

    Idan is the founder of M-Tech Innovations, Inc., (acquired in 2008 and renamed Hitachi) an angel investment firm specializing in Canadian B2B technology startups. Idan led the product development and roadmap strategy and was responsible for customer services at M-Tech and subsequently Hitachi ID for 28 years. During his tenure, the company released password management automation software in 1996, user provisioning/IAM in 2002 and PAM in 2007. Idan has worked with many corporate, government and higher education customers world-wide to implement process automation including IAM and PAM controls across their on-premises and cloud-hosted systems and applications.

    Prior to founding Hitachi ID Systems in 1992, Idan provided network security consulting services to large organizations such as Shell, Amoco, BP Canada and Talisman Energy.

February 25

The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

March 3

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

March 10

Threat actors have taken advantage of new attack vectors created by everyone’s shift to remote operations. IANS Faculty member Anton Chuvakin will guide security teams on how to combat these threats.

Speakers:
  • Anton Chuvakin

    Anton Chuvakin

    IANS Faculty

    Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019.

    Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management.

    In addition, Anton teaches classes and presents at many security conferences across the world; he addressed audiences in United States, UK, Australia, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on advisory boards of several security start-ups. Before that, Anton was running his own security consulting practice, focusing on logging, SIEM and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations.

March 11

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first. This virtual symposium helps security teams determine where they are going wrong and how to get on a better track.

Speakers:
  • Wolfgang Goerlich

    Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

March 18

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

March 25

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first. This virtual symposium helps security teams determine where they are going wrong and how to get on a better track.

Speakers:
  • Idan Shoham

    Idan Shoham

    IANS Faculty

    Idan is the founder of M-Tech Innovations, Inc., (acquired in 2008 and renamed Hitachi) an angel investment firm specializing in Canadian B2B technology startups. Idan led the product development and roadmap strategy and was responsible for customer services at M-Tech and subsequently Hitachi ID for 28 years. During his tenure, the company released password management automation software in 1996, user provisioning/IAM in 2002 and PAM in 2007. Idan has worked with many corporate, government and higher education customers world-wide to implement process automation including IAM and PAM controls across their on-premises and cloud-hosted systems and applications.

    Prior to founding Hitachi ID Systems in 1992, Idan provided network security consulting services to large organizations such as Shell, Amoco, BP Canada and Talisman Energy.

April 8

This roundtable at the Chicago/Columbus Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

April 8

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

April 14

Ransomware and phishing attack methods continue to evolve, as do protection techniques. In this webinar, IANS Faculty member Chris Nickerson will provide updates on what has changed this past year.

Speakers:
  • Chris Nickerson

    Chris Nickerson

    IANS Faculty

    Chris is the Co-Founder and CEO of LARES Consulting, an information security consulting firm that leverages a blend of assessment, testing, and coaching. He also serves on the Board of Directors at CREST, an international not-for-profit accreditation and certification body that represents and supports the technical information security market.

April 22

This roundtable at the New York Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

April 22

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

May 6

This roundtable at the Minneapolis Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

May 6

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

May 12

Manually verifying policy compliance is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. In this webinar, IANS Faculty member Tanya Janca will provide strategies for policy automation and tools to do it with.

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

May 26

This roundtable at the Dallas/Houston Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

May 26

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

June 16

This roundtable at the Boston Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

June 16

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

June 24

This roundtable at the Boston Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

June 24

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

 
 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation

* Required Fields