Loading images...
Loading images...
Loading images...

February 2016 – Overcoming Configuration Management Challenges

Date February 23, 2016 (Register) “If for any reason you are prevented from registering, and you would like to attend the event, please send a communication to board@nymissa.com.” Event Start Time – End Time 2:00 – 5:00 pm Overall Event Title Overcoming Configuration Management Challenges Event abstract Configuration Management facilitates the availability, reliability, and security […]

May 2015 – Next Gen Perimeter Protection

  Date Monday, May 11, 2015 (Register) Event Start Time – End Time 2:00 – 5:00 pm Overall Event Title Next Gen Perimeter Protection Event abstract As attacker techniques shift, organizations must have a robust strategy to address both insider and external threat actors.  While the recent April program focused on insider threats, this session […]

April 2015 – Threat Manangement

  Date Thursday, April 9, 2015 (Register) Event Start Time – End Time 2:00 – 5:00 pm Overall Event Title Threat Management Event abstract In today’s shifting threat landscape, threat management must be a part of an organizations comprehensive information security and risk management program.  An effective threat management program combines IT security disciplines of threat […]

November 2014 – 0-Days and Days After

Date November 13,2014 Event Start Time – End Time 2 PM – 5 PM Overall Event Title 0-days and the Days After Venue The Warwick Hotel 65 W 54th St, New York, NY Dress Code Business casual Event kickoff opening remarks 2:00 – 2:10 Speaker NY ISSA Board Member Session description Welcome attendees   Session […]

July 2014 – Overcoming Configuration Management Challenges

  Date POSTPONED Event Start Time – End Time N/A Overall Event Title Overcoming Configuration Management Challenges Event abstract Configuration Management facilitates the availability, reliability, and security of an organization’s systems by establishing minimum baseline standards for server builds, developing systems based on those standards, and ensuring the integrity of those systems throughout their life-cycle.Where […]