For the second day, members of The Information Systems Security Association (ISSA) are meeting in Baltimore to discuss today’s security challenges. Here’s a partial look at today’s agenda.9 a.m.M. Eric Johnson – Director, Glassmeyer/McNamee Center for Digital Strategies and Professor, Tuck School of Business at Dartmouth College: Human Behavior – The Weakest Link?For many organizations, the most challenging security frontier is people. Corporations and governments alike are faced with staggering risks from members of their own organization. Whether willful or inadvertent, human-induced leaks fueled by mass distribution from WikiLeaks can create breath-taking exposure. Likewise, simple deceptions can lead to large-scale losses of intellectual property. While the risks are not new, the targeted threats toward individuals are increasing with ever-more sophisticated deceptions. The consumerization of technology has simply added to the human challenge. Whether malicious or naďve, learning how to assess and change human behavior is every security professional’s challenge. In this presentation, the problems with people will be explored and how firms might address them in the future will be considered.10:30 a.m.Application Security: New Requirements for Software (Panel) In the past, it was easy enough to just throw out a new program and have it become a corporate standard if it just worked.However, in today’s world it now needs to be secure.What does this mean? How do you design, implement, and test in today’s world? Simply put what does SDL mean to you?Cloud Computing Legal Risk and Liability, David Navetta, Esq, CIPP – Founding Partner, Information Law Group Cloud computing has emerged as one of the fastest-growing segments of the information technology industry. While outsourcing a company’s data to the cloud creates enormous value for businesses and drives down costs, it also creates significant business, legal and reputational risks. This presentation, conducted by information security lawyer, David Navetta, will explain the legal risks that businesses face in seeking to leverage the cloud and suggest ways to address these risks. It will also offer guidance to cloud computing providers on what they can do to help allay their customers’ fears and increase their competitiveness by proactively addressing these legal risks.Study from East Japan Earthquake Disaster, Kazuki Yonezawa – Senior Manager, Symantec Japan Inc. and President ISSA Tokyo Chapter Glenn Townson CISSP, ISSEP – Director and Systems Engineering, Secure Technologies Group, LLC.The March 2011 magnitude 9 earthquake and resulting 60-foot tsunami devastated Eastern Northern Japan. As Japan recovers from these tragic events the ISSA Tokyo Chapter looks at the issues IT systems administrators faced with the loss of electricity, water, fuel for generators and water purification facilities. This session will share studies from this disaster and provide suggestion for sustainable IT environment for future11:40 a.m.Rafal Los – Security Evangelist & Blogger, Hewlett Packard (HP): The Future of Software Security Assurance – Cloudy, with Storms LikelyIt’s been almost 15 years since the browser started its march to become the dominant engine for business, personal and social applications. It was about that time security professionals first realized that software, and by extension ‘web applications,’ were gearing up to be a battlefield for hackers and corporate defenders, with developers creating the opportunity. Since then there has been a building parade of critical vulnerabilities, mass exploitations, and media hype, no more so than in the past five years.But for all of the industry’s testing tools, developer education and protective mechanisms – things don’t seem to be getting better.Software Security Assurance (SSA) is the process of ensuring a reasonable degree of trust in software. As we look 3-5 years out into the future, how will this process evolve to rise and meet the ever-changing threats? The speaker will examine the future of attack methodologies including automated exploitation, mass injections, and logic hacking – and protective methodologies and technologies including developer education, testing technology, the mythical “secure SDLC,” and the future of Web Application Firewalls. We will delve into what’s next, and how you can get ahead, (or fall a little less behind), the coming threats.1 p.m.Position Yourself for 2020 – An Executive PerspectiveThis keynote panel will feature leading executives discussing what they expect the future to hold for security professionals. How will information security change between now and 2020? What skills will be valuable? How will security concerns integrate with business goals? And how can practitioners prepare for this future?Moderator: Bob Bragdon – Publisher, CSO Magazine and CFOworld.comPanelists Include:• Roland Cloutier – Vice President, Chief Security Officer, ADP• Andy Ellis – Chief Security Officer, Akamai• Dave Estlick – VP Information Security, Starbucks Coffee Company• Kris Herrin – Chief Technology Officer, Heartland Payment Systems –Bill Brennerone-stop view of latest business threats. We created it for you! Bookmark it! Use it!CSO’s Daily Dashboard gives you a Sign up today.Get your morning news fix with the daily Salted Hash e-newsletter! Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe