home_banner
Vince Aimutis, Federated Mutual Insurance

Events

Join The IANS Peer Community

IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather all members of the security function.

*CPE credits will be awarded for attending the event.

Forums

Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.

CISO Roundtables

One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.

Symposiums

Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.

Webinars

Hour-long interactive discussions examining hot topics in information security.

February 11

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • J Wolfgang Goerlich

    J Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

February 13

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • J Wolfgang Goerlich

    J Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

February 19

2020 Columbus Symposium
Effectively Leveraging MITRE ATT&CK

Nationwide & Ohio Farm Bureau 4-H Center

IANS has run multiple workshops on threat hunting, purple teaming and tool selection, but MITRE ATT&CK has opened up a new range of possibilities for how to approach these areas.

Speakers:
  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

February 20

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

February 20

AI/ML technology can help security teams make more accurate decisions, but it only works when you feed the right data into the machine.

Speakers:
  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.

March 5

Existing and forecasted data privacy/protection legislation is taxing the current privacy model inside large organizations. Security teams need step-by-step guidance to keep up.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

March 12

Small teams are stuck at the ground level for cloud security and need to mature. Large teams keep making rookie mistakes when designing cloud architecture, managing apps and configuring systems.

Speakers:
  • Mike Rothman

    Mike Rothman

    IANS Faculty

    Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

March 18

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Speakers:
  • J Wolfgang Goerlich

    J Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

March 25

2020 Los Angeles Symposium
IAM: Advanced Tools and Techniques

Venue Coming Soon

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first.

Speakers:
  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.

April 1

2020 San Diego Symposium
Open Source Tools/Techniques for Cloud, SecOps, Architecture and Threats/Vulnerabilities

San Diego Marriott La Jolla

Security teams large and small are clamoring for open source tools they can use across security domains in a broader, more cost-effective manner. But before diving in, they must understand how these tools would work in their environment.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

April 9

2020 Philadelphia Symposium
IAM: Advanced Tools and Techniques

Venue Coming Soon

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first.

Speakers:
  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.

April 22

2020 Denver Symposium
Open Source Tools/Techniques for Cloud, SecOps, Architecture and Threats/Vulnerabilities

Denver Marriott Tech Center

Security teams large and small are clamoring for open source tools they can use across security domains in a broader, more cost-effective manner. But before diving in, they must understand how these tools would work in their environment.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation
 

* Required Fields