home_banner

Events

Join The IANS Peer Community

IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather all members of the security function.

*Receive 1 CPE credit for every hour of attendance at our events.
Vince Aimutis, Federated Mutual Insurance

Forums

Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.

CISO Roundtables

One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.

Symposiums

Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.

Webinars

Hour-long interactive discussions examining hot topics in information security.

Filter Events By:

May 28

IANS has run multiple workshops on threat hunting, purple teaming and tool selection, but MITRE ATT&CK has opened up a new range of possibilities for how to approach these areas.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

May 28

Small teams are stuck at the ground level for cloud security and need to mature. Large teams keep making rookie mistakes when designing cloud architecture, managing apps and configuring systems.

Speakers:
  • Mike Rothman

    Mike Rothman

    IANS Faculty

    Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

June 2

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • J Wolfgang Goerlich

    J Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

June 4

In this 2.5-hour Virtual Super Symposium, you'll choose one track to attend. Track 1 with Dave Kennedy will focus on 'Effectively Leveraging MITRE ATT&CK.' Track 2 with Jake Williams will focus on 'Zero Trust Principles in Action.'

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

June 9 - 10

2020 Washington, DC
Information Security Forum

Walter E. Washington Convention Center

After careful consideration, we’ve decided to postpone the upcoming Washington, DC Forum.

June 9

2020 Washington, DC
CISO Roundtable

Walter E. Washington Convention Center

After careful consideration, we've decided to postpone the upcoming Washington, DC CISO Roundtable.

June 10

An increasing number of security firms are offering ransomware brokering services. The idea: Let an experienced middleman negotiate with attackers on the amount and delivery of ransom to unlock hijacked files and systems. This takes the emotion and missteps out of the negotiation. But how best to proceed? Furthermore, is it the right thing to do?

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

June 11

Security teams large and small are clamoring for open source tools they can use across security domains in a broader, more cost-effective manner. But before diving in, they must understand how these tools would work in their environment.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

June 17

IANS has run multiple workshops on threat hunting, purple teaming and tool selection, but MITRE ATT&CK has opened up a new range of possibilities for how to approach these areas.

Speakers:
  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

June 18

Small teams are stuck at the ground level for cloud security and need to mature. Large teams keep making rookie mistakes when designing cloud architecture, managing apps and configuring systems.

Speakers:
  • Mike Rothman

    Mike Rothman

    IANS Faculty

    Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

June 24

In this 2.5-hour Virtual Super Symposium, you'll choose one track to attend. Track 1 with Tanya Janca will focus on 'Security Learns to Sprint: DevSecOps.' Track 2 with Rich Mogull will focus on 'Advancing Cloud Security: A Roadmap.'

Speakers:
  • Tanya Janca

    Tanya Janca

    IANS Faculty

    Tanya Janca is independent security consultant specializing in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years and founding the OWASP DevSlop open-source and education project. With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organization WoSEC, starting the online #MentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.

  • Rich Mogull

    Rich Mogull

    IANS Faculty

    Rich is the CEO and an Analyst for Securosis, an information security research and advisory firm, in addition to Founder and Vice President of Product at DisruptOPS, a cloud environment monitoring platform. Prior to founding Securosis, he was Research Vice President for Gartner’s security team where he also served as Research Co-Chair for the Gartner Security Summit. Additionally,Rich has served as an independent consultant, web application developer, software development manager, and a systems and network administrator.

June 25

2020 Los Angeles
Information Security Forum

Omni Los Angeles Hotel at California Plaza

After careful consideration, we’ve decided to postpone the upcoming Los Angeles Forum.

June 25

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • J Wolfgang Goerlich

    J Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

June 25

2020 Los Angeles
CISO Roundtable

Omni Los Angeles Hotel at California Plaza

After careful consideration, we've decided to postpone the upcoming Los Angeles CISO Roundtable.

July 8

Amid the economic downturn, where can security teams find cost savings in the coming months as their budgets are stretched? This webinar explores creative ways to find savings through tech licensing, storage and de-duplication of vendors.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

 
 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation
 

* Required Fields