2021 Los Angeles/Seattle Virtual
Information Security Forum

#IANSLA #IANSSeattle #IANSEvents

Wednesday, September 15, 2021 | 9:00 AM - 3:30 PM PT
Web Conference, Los Angeles and Seattle Metro Areas

The Los Angeles/Seattle Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers in a virtual environment. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers. Topics fall into five tracks:

  • Security Operations
  • Security Architecture
  • Threats and Vulnerabilities
  • Governance, Risk Management, and Compliance
  • Leadership and Career Development

IANS Forum content is geared toward the entire security function. Attendees include but are not limited to CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.

Let your colleagues know you're coming!

This event has ended.

Check out our other upcoming events!

View All Events
*Receive 1 CPE credit for every hour of attendance at our events.

Agenda

Ed-Skoudis

Ed Skoudis

SANS Instructor and Fellow Founder, Counter Hack

Ed Skoudis has taught cyber incident response and advanced penetration testing techniques to more than 20,000 cybersecurity professionals. He is a SANS Faculty Fellow and Instructor. His courses distill the essence of real-world, front-line case studies he accumulates because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost.

Ed led the team that built NetWars, the low-cost, widely used cyber training and skills assessment ranges relied upon by military units and corporations with major assets at risk. His team also built CyberCity, the fully authentic urban cyber warfare simulator that was featured on the front page of the Washington Post. He was also the expert called in by the White House to test the security viability of the Trusted Internet Connection (TIC) that now protects US Government networks and lead the team that first publicly demonstrated significant security flaws in virtual machine technology. He has a rare capability of translating advanced technical knowledge into easy-to-master guidance as the popularity of his step-by-step Counter Hack books testifies. Ed earned an M.S. in Information Networking from Carnegie Mellon University, and his B.S. in Electrical Engineering from the University of Michigan, summa cum laude.

9:00 AM - 9:30 AM

From Cybersecurity Practitioner Up to The Board - Gaining Security Alignment Throughout an Organization

with Ed Skoudis

Given the rapidly escalating intensity of ransomware, breaches, and other major cyber attacks, Boards of Directors in many organizations are taking a far more active role in cybersecurity. Cybersecurity practitioners can be vastly more successful if they communicate effectively with their Boards and senior leadership about how they are prepared to defend against real-world attacks. In this lively session, Ed Skoudis will share specifics about:

  • What Boards of Directors are asking their organizations about cybersecurity
  • Strategies and techniques for ensuring that an organization’s cybersecurity practices are in alignment across all levels, from Board to CISO to day-to-day security practitioner
  • Common cybersecurity myths at the Board level and how to counter them with a fresh dose of reality from trenches
  • Techniques and tips security practitioners can use to explain their work effectively to Boards and other senior leaders
9:35 AM - 10:20 AM

Sponsor Tabletops & Technology Spotlight Sessions

Visit the Live Sessions Page to join topic-specific Technology Spotlight Sessions.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

10:20 AM - 11:00 AM Security Architecture

Navigate the Multi-Cloud with Fewer Bumps

with George Gerchow

Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments and seek guidance to adapt their approach to cover the differences from one cloud to the next. This session will explore how to:

  • Focus on process rather than tools -- how they want to do this as opposed to what they should buy
  • Build a consistent monitoring capability across clouds
  • Develop key management and encryption approaches that will be better suited for multi-cloud
  • Apply consistent policy and controls
  • Apply one identity system across clouds
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Threats & Vulnerabilities

Securing Your Remote Collaboration Tools (and Using Alternatives)

with Mike Rothman

Though security teams have worked to harden their messaging and video platforms, attacks against those tools continue to skyrocket. This session will offer security teams more effective methods to beat back the ongoing barrage, including how to:

  • Work with your ISPs to ensure they are providing the proper DDoS protections
  • Determine if 3rd-party CDN security support from the likes of Akamai, Cloudflare or Radware is necessary
  • Defend against attacks against VPNs via TLS connections and private AD certificates
  • Better educate employees about social-engineering techniques attackers might use against them to compromise platforms
  • Pinpoint and adopt new, alternative platforms to Zoom, Teams, etc.
Ryan Leirvik

Ryan Leirvik

IANS Faculty

Ryan is the CEO of GRIMM, a cybersecurity research and development consultancy. He has spent the better part of two decades enhancing cyber programs at the world's largest institutions — from the Department of Defense to some of the most successful private and commercial organizations. He focuses largely on providing advanced capabilities for CISO's, as well as testing for best possible security practices at board of directors' requests.

Ryan’s C-level work experience also includes developing Board level metrics to measure and manage enterprise cyber risk, developing and instructing C-Suite cyber risk management courses, and establishing functional reporting metrics for assessing cyber readiness.

GRC

Bringing Business Units and Third Parties into Your Risk Management Orbit

with Ryan Leirvik

Legal, human resources and privacy teams tend to be risk averse while the business side is usually pro-risk, leaving infosec stuck in the middle and often blamed for workflow hold-ups. Security teams need to master the mediator role and ensure accountability is spread out among teams. This session will explore how to:

  • Manage internal and external risks under one team
  • Better understand how other organizations quantify vulnerability risk
  • Adopt a per-application view of vulnerability management and bundling it into an application risk rating with an umbrella perspective
11:05 AM - 11:50 AM

Sponsor Tabletops & Technology Spotlight Sessions

Visit the Live Sessions Page to join topic-specific Technology Spotlight Sessions.
Ryan Leirvik

Ryan Leirvik

IANS Faculty

Ryan is the CEO of GRIMM, a cybersecurity research and development consultancy. He has spent the better part of two decades enhancing cyber programs at the world's largest institutions — from the Department of Defense to some of the most successful private and commercial organizations. He focuses largely on providing advanced capabilities for CISO's, as well as testing for best possible security practices at board of directors' requests.

Ryan’s C-level work experience also includes developing Board level metrics to measure and manage enterprise cyber risk, developing and instructing C-Suite cyber risk management courses, and establishing functional reporting metrics for assessing cyber readiness.

Leadership

Leading Risk Conversations with Business Stakeholders

with Ryan Leirvik
InfoSec initiatives increasingly intersect with the business. As security teams work to align with the needs of business, they must create risk dialogues that allow stakeholders to understand the critical technical issues and apply that understanding to their operations. To help security practitioners lead these conversations effectively, this session will cover:
 
  • Translating security metrics into business contexts
  • Style shifting by adjusting your language and demeanor to relate to business users
  • Navigating organizational boundaries to influence the right stakeholders at the right times
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

11:50 AM - 12:30 PM Threats & Vulnerabilities

Phishing and Ransomware: Defense and Recovery Tactics for 2021

with Jake Williams

Ransomware and phishing attack methods continue to evolve, as do protection techniques. Security teams seek updates on what has changed this past year. This session will explore:

  • Case studies from the news: What victims did wrong and what they did right
  • Tools and techniques to use if an initial attack is successful
  • A look at how tactics differ for small teams vs. large teams
  • How to account for ransomware attacks -- including ransomware denial-of-service -- in your incident response plan
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Security Operations

Incident Response: Fixing What’s Wrong with Crisis Management

with Mike Rothman

Security teams are getting better at the technical side of incident response, but crisis management is still a pain point. This session details how to quickly and efficiently manage a crisis when the crush is on. This session explores:

  • Tips to help first responders take charge, including the art of speaking in short sentences and keeping a journal
  • Case study: What we can learn from the SEAL team approach
  • How integrating OODA (observe, orient, decide and act) Loop principals across the culture results in a faster, more effective crisis response
  • How agreed-on values and beliefs guide decision-making when pressure is extreme
  • How leaders’ character, substance and style impact those around them
12:30 PM - 12:55 PM

Networking Lunch

12:55 PM - 1:40 PM

Sponsor Tabletops & Technology Spotlight Sessions

Visit the Live Sessions Page to join topic-specific Technology Spotlight Sessions.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

1:40 PM - 2:00 PM Leadership

Ask Me Anything: Promoting Inclusivity through Management

with George Gerchow Diversity has become a critical issue in infosec, and functional managers can promote inclusivity in how they engage with the team members they supervise. In this “Ask Me Anything” session, we’ll address your questions on tangible ways security managers can promote diversity in various forms, including identifying and addressing implicit bias and eliminating language that can exclude team members from conversations.
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Leadership

Ask Me Anything: Managing Your Team Through an Incident

with Mike Rothman
The immediate aftermath of an incident puts a strain on teams, and managing the stress is critical in returning to a normal state as effectively as possible. In this “Ask Me Anything” session, we’ll address your questions on setting and adjusting work/life boundaries in the aftermath of an incident, identifying signs of excessive strain among team members and creating processes that position you to take care of your people.

jake-williams

Jake Williams

IANS Faculty

Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

Threats & Vulnerabilities

Ask Me Anything: The Future of Threats by Industry (and How to Prepare)

with Jake Williams Though many attacks inflict the same types of damage across industries, the best defenses are not always universal. In this “Ask Me Anything” session, we’ll address your questions about how attackers might tailor their campaigns against different business sectors in the coming years – and which security best practices are most important to your industry, be it critical infrastructure, healthcare or financial services.
Shamla Naidoo

Shamla Naidoo

IANS Faculty

Shamla is the Head of Cloud Strategy and Innovation at Netskope and a former Managing Partner and Global CISO at IBM. She is a Board Director at both QBE and Stonebridge Acquisition Capital and a Board Member at ReferencePoint. Shamla’s experience spans 38+ years in a variety of sectors and 6 continents, making her an expert in cross-cultural collaboration and working across industries. She is recognized as a leader in applying security to enable priorities of the business. Her background also includes authoring and teaching several courses for the University of Illinois Chicago School of Law in technology, security, and privacy law. Shamla coaches professionals on leadership, board communication and how to align security with strategic business initiatives. 

Leadership

Ask Me Anything: Influence Business Stakeholders

with Shamla Naidoo Security’s scope has shifted, and infosec has become more embedded in the business as a result. It isn’t just CISOs who need to learn to talk to the business. In this “Ask Me Anything” session, we’ll answer your questions on how you can influence business stakeholders to get buy-in on projects that require collaboration.
2:05 PM - 2:50 PM

Sponsor Tabletops & Technology Spotlight Sessions

Visit the Live Sessions Page to join topic-specific Technology Spotlight Sessions.
george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

2:50 PM - 3:30 PM Security Operations

Optimizing a SOC via Automation and Visualization

with George Gerchow

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them. This session will provide attendees with a path forward, including:

  • A look at the automation/visualization tools being used in the most advanced SOCs
  • Case studies from faculty on their own SOC challenges and successes when choosing and implementing tools
  • Common mistakes organizations make on the path to better SOC automation/visualization and how to avoid them
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

Security Architecture

Building a Better Security Champion Program

with Jake Williams

Small security teams lack the staff and tools to communicate and enforce application security best practices across the organization. Security champion programs open lines of communication between security and the rest of the organization, leading to better support, accelerated alert cycles and stronger business/security alignment. This session will provide the necessary guidance to:

  • Properly identify and recruit champions from each developer, IT and operations team
  • Train champions to find and communicate problems quickly and accurately
  • Delegate some of the meatier security work to the champions
  • Identify, obtain and deploy metrics/KPIs to track the program’s effectiveness
Ryan Leirvik

Ryan Leirvik

IANS Faculty

Ryan is the CEO of GRIMM, a cybersecurity research and development consultancy. He has spent the better part of two decades enhancing cyber programs at the world's largest institutions — from the Department of Defense to some of the most successful private and commercial organizations. He focuses largely on providing advanced capabilities for CISO's, as well as testing for best possible security practices at board of directors' requests.

Ryan’s C-level work experience also includes developing Board level metrics to measure and manage enterprise cyber risk, developing and instructing C-Suite cyber risk management courses, and establishing functional reporting metrics for assessing cyber readiness.

GRC

Building an Information Security and Risk Roadmap

with Ryan Leirvik

The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their risks and create roadmaps to move their programs from current to enhanced states. Security teams that haven’t achieved this level seek guidance to get there. This session will explore how to:

  • Control the chaos, be more organized and pursue a strategic agenda
  • Prioritize needed changes
  • Market the enhancement roadmap to get it funded and supported at all levels
  • What not to include in a roadmap

2021 Los Angeles/Seattle Virtual Speakers

george-gerchow

George Gerchow

IANS Faculty

George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

Presentations
  • Navigate the Multi-Cloud with Fewer BumpsAgenda10:20 AM - 11:00 AM
  • Ask Me Anything: Promoting Inclusivity through ManagementAgenda1:40 PM - 2:00 PM
  • Optimizing a SOC via Automation and VisualizationAgenda2:50 PM - 3:30 PM
Ryan Leirvik

Ryan Leirvik

IANS Faculty

Ryan is the CEO of GRIMM, a cybersecurity research and development consultancy. He has spent the better part of two decades enhancing cyber programs at the world's largest institutions — from the Department of Defense to some of the most successful private and commercial organizations. He focuses largely on providing advanced capabilities for CISO's, as well as testing for best possible security practices at board of directors' requests.

Ryan’s C-level work experience also includes developing Board level metrics to measure and manage enterprise cyber risk, developing and instructing C-Suite cyber risk management courses, and establishing functional reporting metrics for assessing cyber readiness.

Presentations
  • Bringing Business Units and Third Parties into Your Risk Management OrbitAgenda10:20 AM - 11:00 AM
  • Leading Risk Conversations with Business StakeholdersAgenda11:50 AM - 12:30 PM
  • Building an Information Security and Risk RoadmapAgenda2:50 PM - 3:30 PM
Shamla Naidoo

Shamla Naidoo

IANS Faculty

Shamla is the Head of Cloud Strategy and Innovation at Netskope and a former Managing Partner and Global CISO at IBM. She is a Board Director at both QBE and Stonebridge Acquisition Capital and a Board Member at ReferencePoint. Shamla’s experience spans 38+ years in a variety of sectors and 6 continents, making her an expert in cross-cultural collaboration and working across industries. She is recognized as a leader in applying security to enable priorities of the business. Her background also includes authoring and teaching several courses for the University of Illinois Chicago School of Law in technology, security, and privacy law. Shamla coaches professionals on leadership, board communication and how to align security with strategic business initiatives. 

Presentations
  • Ask Me Anything: Influence Business StakeholdersAgenda1:40 PM - 2:00 PM
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Presentations
  • Securing Your Remote Collaboration Tools (and Using Alternatives)Agenda10:20 AM - 11:00 AM
  • Incident Response: Fixing What’s Wrong with Crisis ManagementAgenda11:52 AM - 12:30 PM
  • Ask Me Anything: Managing Your Team Through an IncidentAgenda1:40 PM - 2:00 PM
Ed-Skoudis

Ed Skoudis

SANS Instructor and Fellow Founder, Counter Hack

Ed Skoudis has taught cyber incident response and advanced penetration testing techniques to more than 20,000 cybersecurity professionals. He is a SANS Faculty Fellow and Instructor. His courses distill the essence of real-world, front-line case studies he accumulates because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost.

Ed led the team that built NetWars, the low-cost, widely used cyber training and skills assessment ranges relied upon by military units and corporations with major assets at risk. His team also built CyberCity, the fully authentic urban cyber warfare simulator that was featured on the front page of the Washington Post. He was also the expert called in by the White House to test the security viability of the Trusted Internet Connection (TIC) that now protects US Government networks and lead the team that first publicly demonstrated significant security flaws in virtual machine technology. He has a rare capability of translating advanced technical knowledge into easy-to-master guidance as the popularity of his step-by-step Counter Hack books testifies. Ed earned an M.S. in Information Networking from Carnegie Mellon University, and his B.S. in Electrical Engineering from the University of Michigan, summa cum laude.

Presentations
  • From Cybersecurity Practitioner Up to The Board - Gaining Security Alignment Throughout an OrganizationAgenda9:00 AM - 9:30 AM
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

Presentations
  • Phishing and Ransomware: Defense and Recovery Tactics for 2021Agenda11:50 AM - 12:30 PM
  • Ask Me Anything: The Future of Threats by Industry (and How to Prepare)Agenda1:40 PM - 2:00 PM
  • Building a Better Security Champion ProgramAgenda2:50 PM - 3:30 PM

Web Conference

Registrants will receive a logistics email with web conference meeting information one day prior to the event.

Registration Questions

Can I earn continuing education credits for attending the forum?

Attendees may earn up to 6 credits through our partnership with (ISC)2. Attendees will receive a Certificate of Completion one week after the forum concludes for any other certification needs. If you have provided IANS with your CISSP # during the registration process, then we will automatically submit to (ISC)2.

What is the registration fee?

The Forum is complimentary and open to active Information Security Professionals from private and public sector corporations and organizations.

What time does the Forum begin and end?

The Forum opens at 8:30, with the Keynote kicking off at 9:00am.

What's the registration deadline?
You can register for and IANS event up to the day of the event.

Onsite Questions

Are the presentations available for viewing after the Forum?

All IANS Faculty sessions presentation decks will be available after the Forum.

How can I promote my involvement with the event?

Please share your thoughts and excitement using our event hashtags found at the top of this page.

How can I submit my feedback on the Forum?

We encourage you to fill out our general survey located on the lobby page under Resources.

What can I expect when I attend an IANS event?

When attending an IANS Information Security Forum, you will have the opportunity to take part in technical and strategic Roundtable sessions that discuss the latest issues and trends found in the market. These Roundtable discussions are led by IANS Faculty who are also long-time information security practitioners. You will also have the chance to network with industry peers and learn about the newest technologies and services during any one of our Technology Spotlight sessions.

What is the best way to stay updated before and during the Forum?

For all updates please follow us on Twitter.

Will there be opportunities to network with peers and sponsors?

There will be chances to network with your peers throughout the day. Please use the direct messaging feature with the platform to connect with and chat with colleagues

General Information

Cancellations

IANS requests that cancellations please be submitted two weeks prior to a Forum. Reserved seats are limited.

Terms and Conditions

This Forum is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Forum to any entity or individual. Attendance to the Forum is complimentary and open to active information security professionals from private and public-sector corporations and organizations.

Individuals from information security solution providers (software, hardware, and consulting companies) are not eligible to attend unless affiliated with a sponsoring organization.

IANS reserves the right to share attendee contact information with event sponsors and other attendees. IANS will provide on-site opt-out forms that enable you to remove your contact information from being shared as described herein. No contact information will be shared prior to the event.

IANS Code of Conduct

IANS is committed to providing a harassment-free conference experience for all attendees, sponsors, speakers and staff regardless of gender, sexual orientation, disability, physical appearance, national origin, ethnicity, political affliction or religion.

IANS expects all participants to behave in a professional manner. IANS will not condone any form of sexual language and imagery, verbal threats or demands, offensive comments, intimidation, stalking, sustained disruption of session or events, inappropriate physical contract, and unwelcomed sexual attention.

If any form of written, social media, verbal, or physical harassment is reported, participant will be asked to stop and expected to comply immediately. Offender will be subject to expulsion from the conference.

If you are being harassed or notice someone being harassed, please contact the event staff. In the event of an emergency situation, please contact local authorities immediately.

We expect participants to follow these rules at all event venues and event-related social activities.

Attendee Contact

ians@iansresearch.com

Who Should Attend?

IANS Forum content is designed for information security practitioners across all industries. Attendees include CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.

Interested in Forum Sponsorship? Learn More.

Check out IANS other upcoming events