About us
Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. It was founded in 1984 by Sandra M. Lambert and Nancy King (albeit work on its establishment started in 1982). ISSA promotes the sharing of information security management practices through educational forums, publications and networking opportunities among security professionals. ISSA is present in more than one hundred countries, including Europe and Asia, with more than 10,000 members.
As the founding chapter of ISSA, ISSA Los Angeles (ISSA-LA) has become the premier catalyst and community resource in Southern California for improving the practice of information security. The Chapter provides various training classes and lectures for information Security and IT professionals throughout the year and at the annual Summit. We accomplish this by providing:
- Education, networking and support to information security practitioners
- IT practitioners with information security responsibilities
- Information security vendors
- Outreach, advocacy and education to the broader Los Angeles community
ISSA-LA meets monthly for lunch and dinner and regularly collaborates with other IT and InfoSec organizations, having joint meetings with ISACA, OWASP, the Cloud Security Alliance, HTCIA, and the Association of IT Professionals to name a few.
Upcoming events
2

AI Didn’t Break Cybersecurity
Veterans Memorial Building, 4117 Overland Avenue, Culver City, CA, USYou must register to attend: https://www.eventbrite.com/e/prepared-tested-compliant-the-modern-incident-response-strategy-tickets-1977194947312
### Topic One: AI Didn’t Break Cybersecurity - it revealed where our controls end, and human judgment begins.
Cybersecurity leaders are being asked to secure systems that learn, adapt, and increasingly reason. Yet many organizations still approach AI as a perimeter problem—something to lock down, restrict, or “keep out.”
That instinct is understandable—and increasingly insufficient.
In this session, Philip Topham challenges the traditional “gatekeeper” posture toward AI and cybersecurity. Drawing on his experience advising boards, executives, and security leaders, he reframes AI not as an external threat to be contained, but as a powerful co-thinking capability that—if properly framed—can strengthen judgment, accelerate insight, and improve security outcomes.
Attendees will explore:
- Why AI amplifies both risk and responsibility.
- How poor problem framing creates security failure before tools are even deployed.
- The shift from control-based security to judgment-based security
- Practical ways security leaders can engage AI without surrendering accountability.
This is not a talk about tools, prompts, or hype. It is a conversation about how cybersecurity leaders can evolve their role—from defending the gates to shaping how decisions are made in an AI-driven world.
### Speaker One: Philip Topham
Philip Topham is the Founder of Savionai and an AI thought leader who works with boards, executives, and leadership teams to improve decision quality and organizational performance in an AI-driven world. He is the author of CRAFT Thinking™, a practical framework for using AI as a co-thinking partner—strengthening human judgment rather than replacing it. Philip speaks regularly to executive and technical audiences on how AI changes the way decisions are framed, evaluated, and governed.
### Topic Two: You did WHAT with AI?!?!
Last month, an AI helped Ron Dilley find and fix four critical security vulnerabilities in C code in under an hour. Last week, an AI-powered social network exposed 1.5 million API keys because its creator "didn't write a single line of code" and skipped basic security controls.
Welcome to 2026, where "You did WHAT with AI?!?!" can be said with wonder... or horror.This talk explores both sides through real-world case studies. On the "good" side: AI-assisted bug hunting in legacy C, optimized threat detection, robust prompt injection defenses, and more. On the "bad" side: so many examples, including the spectacular OpenClaw/Moltbook hilarity, where "vibe coding" without threat modeling led to exposed credentials and prompt injection vulnerabilities.
Attendees will leave with a practical defense framework, measurable AI security metrics, and two core principles: 1) Expert-in-the-loop and 2) Content must inform but never control.
The question isn't whether AI will transform security; it already has. Which side are you on?
### Speaker Two: Ron Dilley
Ron Dilley is a Distinguished Cybersecurity Innovator with over 20 years of security leadership experience, including 14 years as VP & CISO at Warner Bros Entertainment Group. He serves as an IANS Research Faculty, focuses on architecture and R&D at ISSquared, and is involved in many fun projects. Ron documents his AI-assisted security research at iamnor.com, where he maintains a "brutally honest" chronicle of what works, what fails, and what catches fire. He holds patents in TCP state tracking and threat deception and still writes C code that runs as root—because some lessons are best learned the hard way.
11 attendees
Building Future Cybersecurity Leaders Today
Location not specified yetYou must register to attend: https://www.eventbrite.com/e/building-future-cybersecurity-leaders-today-tickets-1977659979235
### Topic One: Building Future Cybersecurity Leaders Today
Organizations across all industries eventually reach a critical juncture: the realization that relying on luck is no longer sufficient to protect their vital information and systems. At this point, they must choose a path forward—whether to hire seasoned professionals, develop talent internally, or outsource to trusted experts.
Given the current shortage of cybersecurity professionals and the urgent demand for skilled talent, how can organizations accurately assess the experience of potential candidates? More importantly, how can established professionals ensure their teams are set up for long-term success?
This session will share key observations and foster discussion about the career development strategies necessary to achieve excellence in cybersecurity leadership. We will also explore the distinction between leaders and managers, and why cultivating leadership qualities in yourself and those you mentor is essential.
You will learn how to:
- Identify the stages of cybersecurity talent development
- Recognize and address gaps in team growth
- Communicate to management the value of nurturing cybersecurity leadership organically
When executed effectively, developing future cybersecurity leaders will position your organization for sustained success and create pathways for talent development that extend beyond your company, driving positive change throughout the profession.
Speaker One: Frederick Beck
Frederick Beck is a retired Air Force Major with 22 years of service and a former Director of Cybersecurity Infrastructure Services and Operations. With over 34 years of experience in IT, cybersecurity, and leadership, Fred has held numerous key positions, including Section Chief for Defensive Counter-Information Warfare, Deputy Flight Commander for Network Operations and Security at the US Air Force Academy, Test Director for RQ-4 Global Hawk Operational Test and Evaluation, and Section Manager for Global Cyber Security Operations and Infrastructure at NASA’s Jet Propulsion Lab.
### Topic Two: Cybersecurity Leaders Panel
This exciting cybersecurity leaders panel brings together seasoned experts to unpack emerging threats, evolving defense strategies, and the organizational shifts needed to stay resilient. The conversation blends strategic insight with real‑world experience, offering a rare look at how top security minds navigate rapidly changing digital risks and high‑stakes decision making.
Speakers: Richard Greenberg, CISO @ Security Advisors LLC; Abe Cohen, Sr. Director of Information Security @ iHerb; Jeannete Lind, Director of IT and Information Security @ Unison; Gary Landau, Field CISO | Security Services @ Unisys; Rahul Goel, SVP, Information Security @ First American
6 attendees
Past events
196

