Download
Carl_Neidhardt_CNT_DOH_ISSA_20May2021
Download
David-Brent-Bosch-Security-Systems-20190920
Download
Dominic_Yip-Area_1_Security
Download
EllipsisInfoSec--Jeremy_Druin-Security-Awareness-Password-Security-Tips_20210416
Download
George Usi, OMNISTRUCT INC-security and privacy frameworks-20200221
Download
JeffNeithercutt-Blockchain-201811
Download
JillFeagans-SecurityAudit-201809
Download
John_McDonald_Software-Supply-Chain_Threatrix_20220121
Download
Kacey_Clark-Phishing-Digital_Shadows_20200619
Download
Kelly Robertson-The Internet of Things: How to Surf the Security Tsunami-20200821
Download
Kudelski Security-Ron-Frederick-Cloud-and-Legacy-Security_20200515
Download
Mark_Heckman_ISSA-MeasuringSecurity-20210917
Download
Mark_Sangster-eSentire_factors
Download
MarkHeckman-201708
Download
MarkHeckman-201805
Download
Mike Raggo_Cloud_Infra_Cyber_Kill_Chain-CloudKnox-20210219
Download
Monty_Burkholder_Ransomware_To_The_RotaryClubofRoseville-20210805
Download
Paula_Wong-Accend_Networks-How to handle a Configuration Analysis and Best Practices Audit-20210116
Download
Roger-Schotsal_Zero_Trust_Presentation_PaloAltoNetworks_20210820
Download
Sean Deuby, Ransomware, Risk, and Recovery:​ Is Your Disaster Recovery Strategy Ready for Today's Threats?-20200717
Download
SkipBrewer-201709
Download
Steven-Ziggy-Shanklin_WhiteCloudSecurity
Download
The Lazy Hacker Strikes Again: Ransomware, Honeypots, and Zero Trust--Axis Security-20210716
PDF
ISSA-Security_Policies-20170818.pdf
PDF
ISSA-Security_Predictions_2018-20180216.pdf
Google Drive Shortcut
Past Speakers
Google Drive Shortcut
Past Speakers Excel