Events

2011 Speaking Engagements

01/13/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Central Florida
Half-Day Event

01/13/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Northeast Florida
Chapter Meeting

02/03/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Raleigh
Chapter Meeting

02/10/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA South Texas
Chapter Meeting

02/17/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Pugent Sound
Chapter Meeting

02/23/2010 John Dickson
Software Security: Is OK Good Enough?
ACM Conference on Data and Application Security and Privacy
Conference Session

03/07/2011 John Dickson
Panel: What Enterprises Should be Doing but Aren't
SANS AppSec Summit 2011

03/15/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Minnesota
Chapter Meeting

04/21/2011 Dan Cornell
The Real Cost of Software Remediation
SOURCE Conference: Boston 2011
Conference Session

04/27/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Baltimore
Chapter Meeting

05/10/2011 Dan Cornell
The Real Cost of Software Remediation
Secure360°
Conference Session

05/13/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
2011 Rocky Mountain Information Security Conference

06/10/2011 John Dickson
Software Security: Is OK Good Enough
OWASP AppSec EU Dublin
Conference Session

06/10/2011 Dan Cornell
Putting the Smart into Smartphones: Security Testing Mobile Applications
OWASP AppSec EU Dublin
Conference Session

06/15/2011 John Dickson (Moderator)
Information Security Hot Topics Panel for IT
ISSA Los Angeles
3rd Annual Information Security Summit

06/15/2011 John Dickson
Compliance and Risk
ISSA Los Angeles
3rd Annual Information Security Summit

06/15/2011 John Dickson (Moderator)
Panel Discussion: Real Software Security Initiatives
ISSA Los Angeles
3rd Annual Information Security Summit

06/15/2011 Dan Cornell
Hacking Mobile Devices
ISSA Los Angeles
3rd Annual Information Security Summit

07/14/2011 Dan Cornell
Webinar: The Real Cost of Software Remediation
Download Recording (WMV format)

07/20/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Colorado Springs
Chapter Meeting

08/12/2011 Dan Cornell
Smart Phones with Dumb Apps
ISSA Seattle CISO Executive Forum

08/19/2011 Dan Cornell
Smart Phones with Dumb Apps - Threat Modeling
Rocky Mountain Information Management Association - All Things Mobile
Conference Session

09/20/2011 John Dickson
Software Security: Is OK Good Enough?
ASIS International 2011
Conference Session

09/20/2011 Dan Cornell
Designing, Building, and Testing Secure Applications on Mobile Devices
OWASP AppSec USA 2011
Training Session

09/22/2011 Dan Cornell
The Self Healing Cloud: Protecting Applications and Infrastructure with Automated Virtual Patching
OWASP AppSec USA 2011
Conference Session

09/22/2011 John Dickson
Software Security: Is OK Good Enough
OWASP AppSec USA 2011
Conference Session

10/04/2011 John Dickson
Skeletons in the Closet: Securing Inherited Applications
ISSA Phoenix
Quarterly Half-Day Event

10/05/2011 Dan Cornell
The Need for Open Software Security Standards in a Mobile and Cloudy World
Rochester Security Summit
Conference Keynote

10/06/2011 Dan Cornell
Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications
MIS Training Institute's Mobile & Smart Device Security Conference
Conference Session

11/14/2011 John Dickson
Webinar: Securing Inherited Applications: Gathering Information
Download Recording (WMV format)

11/17/2011 Dan Cornell
Webinar: The Self-Healing Cloud: Protecting Applications and Infrastructure with Automated Virtual Patching
Download Recording (WMV format)

12/2/2011 John Dickson
Webinar: Securing Inherited Applications: Risk Ranking