Infosecurity ISACA North America Expo and Conference 2019 

2018 Highlight Video


View Highlight Video >>

 

KEYNOTE SPEAKERS

Opening Keynote Speaker

Theresa PaytonTheresa Payton
Former White House CIO & Cybersecurity Authority
More >>

 

 

Closing Keynote Speaker

Jamie BartlettJamie Bartlett
British Author and Journalist
More >>

 

 

2018 Conference Brochure

Download the 2018 Conference Brochure below.

 

Conference Report

Review highlights from last year’s CSX Conferences.

Download 2018 Report >>

 

Infosecurity ISACA North America Expo and Conference 2019

Register Now!

 

 

Infosecurity ISACA North America Expo and Conference will debut in New York City’s Javits Convention Center 20-21 November 2019. The event will leverage ISACA’s Cybersecurity Nexus (CSX) community and solutions with Infosecurity Group, Reed Exhibition’s immersive event series staged worldwide for the infosecurity industry.

ISACA will bring experience developed since the 2015 launch of its CSX Conferences, expert workshop series, certification preparation sessions, and latest developments related to the CSX Training Platform, all to the new event programming. Infosecurity, which entered the North American conference arena in 2017, will build on its strengths in industry expositions, media, immersive learning and leadership networks.

Across workshop, conference programs and exhibition, the first-time 2019 event is expected to draw more than 2,000 attendees and more than 120 exhibitors. Professionals can gain a range of CPE for attending the conference and associated events.

Countdown to
Infosecurity ISACA North America Expo and Conference 2019
11/20/2019

37

CPEHOURS

Earn up to 37 CPE hours by attending this conference.

 

Conference Venue

Jacob K. Javits Convention Center
655 W 34th St
New York, NY 10001


Follow @ISACANews and join the conversation.
Like ISACA on Facebook to stay informed.
Follow @ISACANews on Instagram to see behind the scenes photos of the conference.
Follow ISACA’s Company page on LinkedIn for updates.


  Thank You to Our 2019 Premium Sponsors!

Adobe

A-LIGN

CEQUENCE

Expanse

Keeper

Lockpath

OneTrust

SecurityScorecard

S3 Security

Vanguard

VENAFI

 

 

2019 CONFERENCE PROGRAM

As the program is developed, we will continue to add information to this page – check back frequently for updates!

Tracks

Workshops

2-day Pre-Conference Workshops
Monday, 18 November & Tuesday, 19 November | 9:00AM – 5:00PM

1-day Pre-Conference Workshops
Tuesday, 19 November | 9:00AM – 5:00PM

1-day Post-Conference Workshops
Friday, 22 November | 9:00AM – 5:00PM

NEW IDEAS

Do you have a topic that you think should be offered at this conference? We want to know! Tell us about it by submitting your idea on Twitter!

 

 

Opening Keynote Speaker

Theresa PaytonTheresa Payton
Former White House CIO & Cybersecurity Authority
More >>

 

 

 

Closing Keynote Speaker

Jamie BartlettJamie Bartlett
British Author and Journalist
More >>

 

 

CONFERENCE SCHEDULE AT-A-GLANCE

Monday, 18 November

Time  

9:00AM – 5:00PM

Workshops will take place at The New Yorker Hotel
WS1–Accelerated CSX Cybersecurity Practitioner Certification Workshop
WS2–The Truth About AI, Machine Learning and Cyber Security Revisited


Tuesday, 19 November

Time  

9:00AM – 5:00PM

Workshops will take place at The New Yorker Hotel
WS1–Accelerated CSX Cybersecurity Practitioner Certification Workshop
WS2–The Truth About AI, Machine Learning and Cyber Security Revisited
WS3–Auditing Microsoft 365 and Azure Cloud Security


Wednesday, 20 November

Time  

7:30AM – 6:00PM

Registration Open

8:00AM – 8:30AM

Keynote Coffee

8:30AM – 9:30AM

Opening Keynote – Theresa Payton

9:00AM – 7:00PM

Refreshments Expo Floor

9:30AM – 10:00AM

Expo Hall Open

10:00AM – 10:50AM

111—Dark Web Review - a Deep Dive into a Dark World
112—Code Signing: A Security Control That Isn’t Secured
113—Hacking to Teach Cyber Awareness in an Organization
114—How Global Expansion Affects Cybersecurity Risk
115—Take a Ride on the Dark Side - Data on the Dark Web

10:50AM – 11:00AM

Session Movement Break

11:00AM – 11:50AM

121—Using Cloud Access Security Brokers to Stop SaaS Data Leaks
122—Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture
123—Cyber Leadership in an Ecosystem Context
124—Illuminating the CISO’s ICS Blind Spot
125—The Collision Course Between Big Data and AI, Privacy, Ethics and Regulations in the AI + IoT World

11:50AM – 1:20PM

Networking Lunch

1:20PM – 2:10PM

131—DNS - A Phishing Chokepoint
132—Cyber Terrorism - Real Threats Exist
133—Bat Cave to Board Room, Selling Technology Solutions to Upper Management
134—How to Articulate the Value of Information Security to Senior Management?
135—Leveraging Behavioral Analytics to Strengthen Internal Controls

2:10PM – 2:20PM

Session Movement Break

2:20PM – 3:10PM

141—Exposing The Dark Overlord – Using OSINT Identify a Group of Modern-Day Cyber Terrorists
142—Cyber-attacks on Industrial Technology and SCADA Systems
143—Implementing a Cybersecurity Skills Competencies Framework
144—Making Cents of Maturity: Building Resistive Strength
145—Effective Key Steps into Digital Forensics and Incident Response (DFIR)

3:10PM – 3:40PM

Refreshment Break

3:40PM – 4:30PM

151—The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, and Automated Response
152—Don't Lose Your Crypto: Scams, Hacks, and Pitfalls of Blockchain Assets
153—Privacy & Ethics Are the Headlines - How Does a Business Leader Cope and Capitalize
154—Next Gen Risk Assessment - Can it Save My Bacon Both with Regulators and in Litigation?
155—Hacker-Powered Data: The Most Common Security Weaknesses and How to Avoid Them

4:30PM – 7:00PM

Cyber Soiree

4:50PM – 5:20PM

Spotlight Educational Sessions

5:30PM – 6:00PM

Spotlight Educational Sessions


Thursday, 21 November

Time  

7:30AM – 4:00PM

Registration Open

8:00AM – 8:30AM

Keynote Coffee

8:30AM – 8:40AM

Session Movement Break

9:00AM – 5:00PM

Expo Hall Open

8:40AM – 9:30AM

211—End-To-End Injection Safety at Scale
212—How Weakness in DNS and Email Superpowers BEC Attacks
213—Auditing with SOC-CMM: Cyber Security Detection and Incident Response
214—Risk Informed Privacy Management: The NIST Privacy Framework
215—Information Governance - the Foundation for Information Security

9:30AM – 10:00AM

Refreshments Expo Floor

10:00AM – 10:50AM

221—Death by Automation - Accelerating Your SOC Using Open Source Tools
222—Offensive Threat Models Against the Supply Chain
223—Dynamic Information Security in a Static Organizational Culture
224—How to Train Your Robot: Security Governance for RPA Solutions
225—Data Governance in the Analytics and Privacy Driven Era

10:50AM – 11:00AM

Session Movement Break

11:00AM – 11:50AM

231—Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths
232—Multidimensional Attack Path Analysis: Eliminating Network Blind Spots
233—CPE Credits Helping to Massively Scale up the Next Generation of Cyber Professionals
234—Crypto-Agility: Responding Quickly to Cyber Security Events
235—Statistical Analysis of Network Exposure

11:50AM – 1:20PM

Networking Lunch

1:20PM – 2:10PM

241—Authorization Using Attributes
242—5G Security: New Vulnerabilities, New Solutions
243—A New Employer-Driven Model of Cyber Workforce Development For Dell
244—Using NIST Frameworks with COBIT 2019
245—From Heist to Hostage Situation: The Rise of the Modern Bank Robbery

2:10PM – 2:20PM

Session Movement Break

2:20PM – 3:10PM

251—Assessing Integrated Risk Intelligently
252—Using Passive DNS to Strengthen Incident Investigation and Response
253—The ROI of Information Security Teams
254—Security Risks Your Auditors Care About in a Cloud Native & DevOps World
255—Additional Information Coming Soon!

3:10PM – 3:40PM

Refreshment Break

3:40PM – 4:30PM

261—Modernize Your Incident Response Program for the Cloud
262—Using the Distributed Vulnerability Assessment to Improve the Security Level
263—Security Key Point Indicators or "How to Measure Security from the Governance Perspective"
264—Enterprise IT Governance and DevSecOps: A Grounded Theory Literature Review
265—Additional Information Coming Soon!

4:30PM – 4:45PM

Session Movement Break

4:45PM – 5:45PM

Closing Keynote – Jamie Bartlett

5:45PM – 7:00PM

Closing Networking Drinks

6:00PM – 6:30PM

Spotlight Educational Sessions


Friday, 22 November

Time  

9:00AM – 5:00PM

Workshops will take place at The New Yorker Hotel
WS4–Penetration Testing in a Cloud Environment

 

Conference Registration Fees

Passes Regular Ticket Price ISACA Member* Provides Access To

Full Conference Pass

$1,550

$1,400

Morning Keynote, ISACA Education tracks, Expo, Networking Lunch, Networking Party, Expo Floor and partner content**


Workshop Only
WS1
WS2
WS3
WS4

Varies by workshop
$1,399
$1,050
$850
$850

Varies by workshop
$1,299
$850
$650
$650

Workshop session only (+Expo both days)


Expo & Keynote

$299 pre-event / $349 at event

$249 pre-event / $299 at event

Expo, Opening & Closing Keynote, Networking Lunch, Networking Party, Expo floor & partner content**


Expo Only

$199 pre-event / $249 at event

$149 pre-event / $199 at event

Expo, Networking Lunch, Networking Party, Expo floor & partner content**


Day Pass

$50

$50

Expo floor & partner content**



Cancellation Deadline: Friday, 18 October 2019

*Member Disclaimer
Discounts for the Conference are available to ISACA members. Please enter your accreditation number during step one (1) of the registration process and the discount will be applied automatically at checkout. Note that discounts cannot be applied retroactively.

**Partner Content
Your pass grants access to the ISC East, Unmanned Security Expo and Infosecurity exhibit halls, as well as the Infosecurity ISACA North America Innovations Sessions and Geek Street Theater.

Registration and Payment Policy

Registration submissions for this conference and any additional workshops are not processed, and a seat is not confirmed or reserved, until full payment is received. All submissions not paid in full will be placed on a waitlist and priority will be given to paid registrants in a payment first-come, first-serve basis. Space is limited, so it is highly recommended that payment is provided at the time of submission to guarantee a seat within the conference and all related events.

Payments must be remitted to Circdata Ltd.  For questions regarding payment please email infosec@circdata.com or by phone at +44 (0) 1635 588492.  Office hours are Monday – Friday 17:30 GMT. Circdata Ltd. is operated out of the United Kingdom, foreign transaction fees may apply when remitting payment.

Discounts for the Conference are available, detailed below. To verify eligibility for any of these discounts, please contact https://support.isaca.org or +1.847.660.5505. Note that discounts cannot be applied retroactively. All discounts are applied to the main conference registration fee, and cannot be applied to workshop registrations.

You must be 21 years of age or older to attend this event.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Group registrations must be processed in a single registration transaction. Please contact the ISACA Conference department for more details at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Government Discounts

ISACA offers a $350 conference registration discount to government employees. Please contact the ISACA Conference department for more details and eligibility verification at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Academic and Student Discounts

ISACA offers a $350 discount to academic institution employees and students. Please note that you must be an ISACA Student member in order to receive the student discount; additional membership and qualification details can be found here. For additional registration details and eligibility verification, please contact ISACA’s Conference Department at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Cancellation Policy

All cancellations must be received by the published deadline to receive a refund of registration fees. A cancellation charge of US $295 will be subtracted from conference refunds, and US $50 per workshop from workshop refunds. No refunds can be given after the cancellation deadline above. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5505
Fax: +1.847.253.1443
E-mail: https://support.isaca.org

 

Payment Methods

  1. Pay online at www.isaca.org/invoices
  2. Mail your payment to:
    ISACA
    1055 Paysphere Circle
    Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America
    135 S. LaSalle St.
    Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    * Please include attendees name on the Advice of Transfer.

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.


Consent Language for Photos, Audio and Video Recordings Taken at Events or for Marketing Purposes

I agree irrevocably and free of charge that ISACA or any third party who is acting on ISACA’s behalf may create images, videos and/or sound recordings of me (“works”) at the event for marketing purposes. For these purposes, the granting of rights in the works also includes the rights to adapt, reproduce, distribute, perform, making available to the public, broadcast, retransmit or sublicense the works to ISACA’s affiliates. The granting of rights in the works also includes all current and future media, goes beyond the repetition of an event and is not restricted to time or territory. View ISACA’s Privacy Notice >>


Dress

Business casual is appropriate for this and all ISACA conference events.

Conference Venue

Jacob K. Javits Convention Center
655 W 34th St
New York, NY 10001

Hotel Information

Please use the link below to view all hotel options available for the Infosecurity ISACA North America Expo and Conference.

Click Here to View Hotels & Make Reservations!

There will be shuttle service available from select hotels to the Javits Center. Please click here for full schedule of transportation.

Route 1 | Marriott Marquis, Doubletree Times Square, Yotel
Route 2 | Wyndham New Yorker,  Crowne Plaza Midtown, Even, Springhill Times Square South, Element New York Times Square, Doubletree Times Square West, Homewood Suites Times Square South,  Embassy Suites Midtown, Courtyard Times Square

 

 

Thank you to our 2019 sponsors!

Infosecurity ISACA North America is an immersive event for the information security community where you will access to a high-level conference program with well-respected industry speakers, an expo floor with the latest tech & solutions and a host of networking opportunities.

  Platinum


S3 Security


Specialized Security Services, Inc. (S3) develops and maintains custom-tailored cyber security programs, so you can elevate security to where it belongs—top of mind and top down. We are a women-owned, global cyber security firm with headquarters in both Dallas, TX and London. For over two decades, our expert team has successfully assisted organizations with the implementation and oversight of their information security, privacy and regulatory compliance programs. S3 bridges the gap between your business goals, cyber security needs and compliance requirements to become your trusted and valued security partner for life.


Vanguard


Formore than 30 years, Vanguard has safeguarded the mission critical data and applications for the United States and other governments and the world’s largest financial, healthcare and retail organizations. Vanguard Integrity Professionals is the largest independent provider of enterprise security software addressing complex security and regulatory compliance challenges. Vanguard continuously drives innovation in security software and technology to stay ahead of evolving regulatory requirements and an ever-changing threatscape. Led by some of the most knowledgeable minds in the cybersecurity industry our security solutions lead the industry.

 

  Gold


Adobe


Making great experiences requires trust. Only Adobe gives everyone — from emerging artists to global brands — everything they need to design and deliver exceptional digital experiences. Learn how we help ensure they are trusted experiences at trust.adobe.com.

 


A-LIGN



A-LIGN Description: A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits across SOC 1, SOC 2, ISO 27001, HITRUST, PCI DSS, penetration testing, and more.

 


Expanse


Expanse discovers your unknown Internet assets and what’s talking to them. We continuously discover, track, and monitor the dynamic global Internet edge for the world’s largest organizations. Our platform discovers an organization’s global Internet edge and identifies its IP space, known and unknown assets, and their configurations. We enrich those asset views with global flow data to link a complete picture of edge attack vectors to the communications that indicate a data breach, misconfiguration, or policy violation. F500 organizations like Capital One, CVS, Allergan, and many more trust Expanse to define and secure their global network edge.

 


SecurityScorecard


SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. The company’s approach to security focuses on identifying vulnerabilities from an outside perspective, the same way a hacker would. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information. For more information, please visit www.securityscorecard.com

 

  Silver


CEQUENCE


Cequence Security is a venture-backed cybersecurity software company. Its mission is to transform application security by consolidating multiple innovative security functions within an open, AI-powered software platform that protects customers web, mobile, and API-based applications – and supports today’s cloud-native, container-based application architectures.

 

  Bronze

Keeper



Passwords represent the greatest security risk to businesses today. With Keeper, your employees have on-demand access to encrypted passwords, websites and applications increasing their productivity while protected with best-in-class security.

 

Lockpath


Lockpath is an enterprise software company that helps organizations understand and manage their risk. The company’s line of integrated risk management solutions provides companies with the means to efficiently and effectively identify, manage, and monitor risks, for a more agile and resilient business.

 

OneTrust


OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by 3,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s three primary offerings include OneTrust Privacy, OneTrust PreferenceChoiceand OneTrust Vendorpedia. For more, visit OneTrust.com.

 


VENAFI


Venafi, leader in machine identity protection, keeps identity types safe by orchestrating cryptographic keys and digital certificates. Whether your devices are on-prem mobile, virtual or cloud, they will be protected; lowering risk and safeguarding the flow of information to devices that are trusted while restricting flow to ones that are not.

 

 

  Supporting Sponsors

Axence CMMI Institute GreyCastle Security

LOGICGATE

riskrecon

 

 

For Sponsorship and Exhibitor Opportunities

Contact ISACA’s Sponsorship Department
Please address Sponsorship questions to: sponsorship@isaca.org

Questions

Contact ISACA's Learning Solutions Department:
Tel: +1.847.660.5670
Fax: +1.847.253.1443
Click here to submit a question.

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or
+1.847.660.5564
news@isaca.org

Please address Sponsorship questions to: sponsorship@isaca.org