Log in


The Minnesota Chapter of ISSA hosts several different types of meetings throughout the year.


GENERAL MEETINGS


MN ISSA holds its meetings on a quarterly basis with lunch, networking and multiple speakers and sessions.  Meetings are held the 3rd Tuesday in the months we have meetings.  Doors open at 11:45 AM for networking and lunch with a meeting start time of 12:20 PM.  Meetings wrap up at about 4:45 with a sponsored happy hour following.


You are welcome to join us as a guest if you’re not currently an MN ISSA member!  If you find value in attending our meetings and want to continue to participate, then we do ask that you become an ISSA member. Your membership provides great benefits to you and helps provide the funding needed to keep our chapter going.  We appreciate it!


These meetings will rotate locations throughout the metro to align to our goal of reaching as many people as possible.


AFTERHOURS


Our AfterHours format is more casual and interactive than our regular chapter meetings and is designed for those not always able to make regular meetings, for individuals from our larger local security community, as well as those who simply enjoy discussion with their peers and industry leading thinkers.



Come out and join us – you’ll get informative presentations in intimate settings at great local venues, good food and refreshments, plus plenty of opportunity to refresh and build your network with valuable connections.


Registration is required for our events to help with logistics and to provide self-service validation of attendance for any continuing education requirements. Please click on Details and Registration to RSVP.

Limited on-site registration will be available but may delay entry, so please register ahead of time whenever possible.



Upcoming events

    • October 21, 2020
    • 10:00 AM - 1:00 PM (CDT)
    • Virtual Meeting


    Zero Visibility. Even Less Control

    A discussion on how to deal with the challenges of managing third-party vendor cyber risk.


    No business leaves the back door open at night. Yet companies often use third-party service providers without checking their security and privacy measures. And when these providers have their own third-party service providers, risk multiplies.

    So, even if you have robust security measures across your network and systems, your assets – trade secrets, IP, personal data, business data, reputation, even – can be low-hanging fruit for a cyber-attack. Join us for a conversation on the challenges and strategies of managing supply chain and third-party vendor risks, including:

    • Defining a comprehensive approach to addressing and managing a sustainable vendor risk program
    • Typical issues such as inconsistent ongoing monitoring of vendors, security and risk considered too late in procurement process, lack of risk visibility across vendor landscape, and communication to the C-suite and Board 
    This expert panel of security and risk specialists will be moderated by Graeme Payne, former Senior Vice President and CIO of Global Corporate Platforms at Equifax and author of The New Era of Cybersecurity Breaches available on Amazon. Click here to learn more about Graeme and his 30+ years of consulting and management experience. NOTE: we are offering attendees a free 2-hour Vendor Risk Consulting Workshop (a $1,600 value) with our experts to discuss ways to optimize your current vendor cyber risk process.

    Register now to reserve your spot!

    • October 26, 2020
    • (CDT)
    • October 28, 2020
    • (CDT)
    • Minneapolis, MN

    To register please visit: https://www.cybersecuritysummit.org/

    • November 17, 2020
    • 1:00 PM - 2:15 PM (CST)
    • Virtual CST
    Register

    Meeting Agenda

    • Announcements 
    • Speaker
    • Wrap Up

    Speaker: Sandra Joyce, EVP Head of Global Intelligence, Mandient

    As EVP and Head of Global Intelligence at Mandient, Sandra Joyce oversees intelligence collection, research, analysis and support services for threat intelligence customers and the Mandient security product portfolio. Joyce has held positions in product management, business development and intelligence research over the course of 21 years in both national security and commercial industry.

    Joyce serves in the US Air Force Reserve and is a faculty member at the National Intelligence University. She is completing her MBA at MIT and holds a bachelor's degree in German with four master's degrees in cyber-policy, international affairs, science and technology intelligence, and military operational art and science. Joyce speaks English, Spanish, and German and lives in Virginia.

    Presentation Topic: Cyber Threat From the Front Lines: A Look at What We're Up Against

    From influence operations to ransomware attacks, the cyber threat landscape today is more complex and dangerous than it's ever been before. We will take a look at the emerging cyber threats that we believe are the most pertinent and impactful to defenders in today's cyber security industry. Our briefing will cover the recent developments in cyber espionage, including China's recent focus on IP theft. We will also cover the rise of ransomware and the threats that tactic poses across all industries.






    FAQs

    Are non-members and guests welcome at meetings and events?

    Yes, we welcome individuals at large from the security community to join us for any of our events. We simply ask that, after experiencing the value of our community at two events, individuals consider joining ISSA for the additional benefits that membership provides.

    Why do we have to register to attend meetings and events?

    Besides assisting the board with planning logistics for our events, registering for meetings and events, provides you with self-service documentation you can print out to support your CPE credits if you are audited.

    ***Information/image release.  By registering for this event, I agree that:

    I am allowing my contact information included in the registration to be shared with MN ISSA and I may be contacted by MN ISSA

    I grant MN ISSA and/or ISSA International the right to use any candid photos or videos taken during the event in future marketing and communication efforts, to include, but not limited to, websites, brochures, advertisements, magazines, newspapers, newsletters, emails, videos and web conferences.


    • December 15, 2020
    • 1:00 PM - 3:30 PM (CST)
    • Virtual CST

    Meeting Agenda

    • Announcements 
    • Speakers & Sponsor Spotlight
    • Wrap Up

    Speakers:

    Details Forthcoming


    FAQs

    Are non-members and guests welcome at meetings and events?

    Yes, we welcome individuals at large from the security community to join us for any of our events. We simply ask that, after experiencing the value of our community at two events, individuals consider joining ISSA for the additional benefits that membership provides.

    Why do we have to register to attend meetings and events?

    Besides assisting the board with planning logistics for our events, registering for meetings and events, provides you with self-service documentation you can print out to support your CPE credits if you are audited.

    ***Information/image release.  By registering for this event, I agree that:

    I am allowing my contact information included in the registration to be shared with MN ISSA and I may be contacted by MN ISSA

    I grant MN ISSA and/or ISSA International the right to use any candid photos or videos taken during the event in future marketing and communication efforts, to include, but not limited to, websites, brochures, advertisements, magazines, newspapers, newsletters, emails, videos and web conferences.



SPEAK AT MN ISSA

We welcome submissions from across our local and national community for potential speakers and presentations for our membership. As we serve all domains across the information security spectrum and at many different levels from deeply technical to high-level governance, all topics are welcome and will be considered. Presentations must be educational and tool/vendor-agnostic.

Please send an abstract and bio, or simply a recommendation for a speaker you’d like to see, using the form to the right and our Program Director will respond.

We routinely survey our membership for topics of interest and common requests are shown below. However, topics across all domains will be considered.

1. PCI requirements / solutions; Compliance
2. Forensics
3. Attack methods / defense
4. Database security and best practices
5. Application and Cloud Security
6. Security Awareness and Education
7. Penetration testing
8. Data loss prevention
9. Security architecture
10. End-point intelligence


2002, 2016, 2019 Chapter of the Year

© Minnesota Chapter of ISSA International

Powered by Wild Apricot Membership Software