
What we’re about
Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. It was founded in 1984 by Sandra M. Lambert and Nancy King (albeit work on its establishment started in 1982). ISSA promotes the sharing of information security management practices through educational forums, publications and networking opportunities among security professionals. ISSA is present in more than one hundred countries, including Europe and Asia, with more than 10,000 members.
As the founding chapter of ISSA, ISSA Los Angeles (ISSA-LA) has become the premier catalyst and community resource in Southern California for improving the practice of information security. The Chapter provides various training classes and lectures for information Security and IT professionals throughout the year and at the annual Summit. We accomplish this by providing:
- Education, networking and support to information security practitioners
- IT practitioners with information security responsibilities
- Information security vendors
- Outreach, advocacy and education to the broader Los Angeles community
ISSA-LA meets monthly for lunch and dinner and regularly collaborates with other IT and InfoSec organizations, having joint meetings with ISACA, OWASP, the Cloud Security Alliance, HTCIA, and the Association of IT Professionals to name a few.
Upcoming events (2)
See all- Cybersecurity in the Age of AI: Navigating Unseen ThreatsPlaya Vist Park , Los Angeles, CA
You must register to attend: https://www.eventbrite.com/e/cybersecurity-in-the-age-of-ai-navigating-unseen-threats-tickets-1292147771769
### Topic One : Cybersecurity in the Age of AI: Navigating Unseen Threats
Now more than ever, cybersecurity is paramount for protecting sensitive data from breaches and attacks. The integration of AI in business processes brings both efficiency and new cybersecurity challenges. This presentation explores the dual nature of AI as both a business asset and a potential threat. It highlights how AI enhances productivity, transforms customer service, and enables predictive analytics, while also posing risks such as data privacy concerns and the potential for malicious use.
The presentation will delve into AI's role in cybersecurity, including its ability to detect threats and respond to breaches in real time. It also addresses the darker side of AI, such as its weaponization by cybercriminals, enhanced attack capabilities, and the challenges in detecting AI-driven threats like data poisoning, AI-enabled malware, and sophisticated social engineering attacks. Real-world examples illustrate the significant impact of these threats on businesses.
We'll discuss how to mitigate AI risks, discuss future trends, emphasize the need for businesses to adapt to new AI threats and opportunities, and the role of predictive analytics in future defenses.
Speaker One: Ken May
Ken May is CEO of Swift Chip and a cybersecurity expert with more than a dozen industry certifications. He has significant experience in the fields of offensive threat modeling, digital information security analytics, intrusion detection, and response.
Ken is a Community Instructor for SANS and also teaches at Oxnard College.
Along with his work in the IT industry, Ken is also an active community member, serving on the SANS Advisory Board and previously serving on the CompTIA IT Security Executive Council, the Business Advisory Board at the Museum of Ventura County, and the Industry Advisory Council at Oxnard College.
### Topic Two: The Routing Security Crystal Ball: RPKI Yesterday, Today and Tomorrow
Join us for a deep dive into the evolution of Routing Security and the key factors that led to the development of Resource Public Key Infrastructure (RPKI). We'll explore the timeline of its initial deployments and the pivotal moments that brought RPKI to the forefront of the global Internet community. Recent U.S. government initiatives have prioritized the creation of RPKI Route Origin Authorizations (ROAs) to bolster network security. Finally, we’ll look ahead into the future of RPKI, examining upcoming developments and long-term plans being discussed within standards bodies and the broader Internet community.
### Speaker Two: John Sweeting
John Sweeting is the Chief Experience Officer for the American Registry for Internet Numbers (ARIN), accountable for the overall customer experience and development of all customer services and applications. He is responsible for the direction and operations of the Registration Services Department, Communications Department, and Customer Experience and Strategy Department. Prior to joining ARIN, he served 12 years on the ARIN Advisory Council, six of which he was the Chair, and one year on the Address Supporting Organization’s Address Council (ASO AC). John participated on the Consolidated RIR IANA Stewardship Proposal (CRISP) team that was convened in December 2014 to guide development of the Number Community response to the IANA Stewardship Transition Coordination Group’s RFP.
John’s experience in the Internet industry includes building and managing large global networks with international carriers such as Internet MCI, Cable & Wireless, Teleglobe, and Tata Communications. Immediately prior to joining ARIN, John served as the Senior Director of Architecture and Engineering for Time Warner Cable, responsible for the selection and testing of all network infrastructure from the core backbone to the service delivery platforms.
- Cybersecurity Leaders PanelScopely, Inc., Culver City, CA
You must register and pay to attend: https://www.eventbrite.com/e/cybersecurity-leaders-panel-tickets-1426087930389
### Come and network with your friends, make new friends, and hear a great panel. A buffet dinner will be served and drinks will be available.
Join us for a powerhouse panel, moderated by chapter president Richard Greenberg, featuring top minds in cybersecurity as they dissect today’s most pressing threats, emerging technologies, and strategies for safeguarding the digital future. From AI risks to nation-state attacks, these experts won’t hold back. Expect sharp insights, real-world experiences, and bold perspectives—from people who’ve been in the room when it mattered most.
If you're in the business of protecting data, people, or infrastructure, this event is for you. You’ll walk away with perspectives you can use to protect your organization.
Panelist One: Nicole Holmes is Scopely's SVP of Enterprise Technology and CISO. She has worked in the field of technology for over eighteen years. She has a Master’s Degree in Information Technology from the Florida Institute of Technology.
She has worked in various industries, including gaming, entertainment, consumer goods, decorative coatings, and financial and food services.
Panelist Two: Nikolay Chernavsky is CISO at ISSquared Inc., a provider of Cybersecurity, Cloud, Infrastructure, Consulting and Digital Transformation services.
Prior to joining ISSQUARED Inc., Mr. Chernavsky held numerous executive and senior leadership roles in Cybersecurity and IT at PennyMac, Amgen and National Oilwell Varco.
Nikolay has played an active role in the Cybersecurity community by serving on the H-ISAC Board of Directors, forming and leading the Mortgage Risk Council for FS-ISAC and co-chairing Southern California Evanta “CISOs for CISOs” .
Nikolay holds a MS degree in Computer Information Systems from Boston University and CISSP & CISM certifications.
Panelist Three: Steven Weil has been a security engineer, security architect, auditor, senior security consultant and CISO. He has assessed, designed and built cybersecurity programs for a wide variety of organizations. He has also designed and implemented pragmatic compliance programs for regulations such as SOC 2, HIPAA, GDPR, PCI DSS and CMMC.
Mr. Weil has expertise in creating security policies & standards, performing risk assessments, assessing and managing compliance and developing cybersecurity solutions for small and large organizations.
Mr. Weil has a Master's degree in Information Science and numerous certifications including CISSP, CISA, CISM and CCSK.