Welcome to ISSA KC

The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA -Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

December 2016 Chapter Meeting

Posted by Administrator Thursday, December 1, 2016

*** We are at capacity now! May not be able to facilitate walk ins *** 11/14/2016

Please join ISSA chapter members and other security professionals at Hereford House in Leawood, KS, for our December chapter meeting.

Jeff Lanza was an FBI Agent for more than 20 years during which he investigated corruption, fraud, and cybercrime and organized crime. He served as chief of internal security for the FBI’s Kansas City region. He has provided thousands of presentations on risk management to associations, corporate boards, and employees of major corporations around the world. He appears regularly on CNBC, the Fox News Channel and has informed the public on other national programs including the Today Show, Good Morning America, Dateline and CNN, among others. He holds a Master’s Degree in Business Administration.

Protecting Your Business from External Threats
Protecting Your Business from Internal Threats

Part One - Protecting Your Business from External Threats

  1. The Threat
    1. The mastering of electromagnetism
    2. Old vs new heists
    3. The world’s greatest hacker
    4. Cyber-criminal organizational chart
    5. Operation Trident Breach
    6. Major security breaches
  1. Cyber Attacks Against Business – Prevention
    1. Prevention the compromising of data in motion
    2. Prevention the compromising of data at rest
    3. Whale phishing
    4. Wi-Fi hotspot security
    5. Holding data hostage
    6. Cloud considerations
  2. Bank Account Takeovers
    1. Takeover example
    2. Most common words used in phishing emails
    3. Creating security layers to bank account takeovers
i.      Separate computer for financial transactions
ii.      Device security
iii.      Mutual authentication
iv.      Security token
v.      Dual authorization
    1. Technology can fail!
  1. Corporate Espionage
    1. The loss
    2. Significant breaches
    3. Old fashion spying
    4. Trust and employees
    5. The need to know principle
    6. Authentication and access control
  2. Privacy Issues
    1. The state of privacy
    2. Who has your information and what they do with it
    3. Protecting your personal information

Part Two - Protecting Your Business from Internal Threats

  1. Embezzlement
    1. Draining Dixon – and embezzlement example
    2. The trusted employee
    3. Other examples
    4. Embezzlement warning signs
    5. Embezzlement prevention strategies
    6. Positive Pay
  2. Check fraud
    1. Check fraud vs other payment frauds
    2. Check fraud example
    3. Check fraud deterrence
    4. Mobile check deposit security
    5. Online bill pay
  3. What make good people go bad
    1. The state of integrity
    2. Triangle of fraud
    3. FBI cases and current examples
    4. How does it start?
    5. Why is wasn’t it enough?
    6. Corporate culture and integrity
    7. Vision and mission
    8. Fraud reporting mechanisms and examples
    9. Ethics flow chart
  4. Hiring good people
    1. Qualities to look for in new hires
    2. Background investigations
    3. Interview techniques
    4. Detecting deceit in interviews and investigations
    5. Prevention not aftermath.
Question and Answer

Date/Location: Thursday, December 15th, 2016,  11:30 - 3:00 pm

Hereford House:
Town Center Plaza, 5001 Town Center Dr, Leawood, KS 66211

Kansas City Class BBQ Buffet
Grilled Boneless Chicken Breast, Sliced Brisket and Pork Ribs, Coleslaw, Cheddar, Ranch Potatoes, Sauteed Green Beans, Chef's Dessert Selection, Coffee, Tea

11:30 AM  -  12:00 PM - Registration
12:00 PM  -  1:00 PM - Lunch
1:00 PM  -  3:00 PM – Presentation

$20.00 for ISSA Members,
$30.00 for Guests/Non-Members

Upcoming Events

June 27th Chapter Meeting - Register

July 25th Chapter Meeting

Join the ISSA Kansas City Chapter

ISSA KC Mentorship Program Program Details

Mentor form/Application
Mentee form/Application

Join our mailing list to stay current on ISSA Kansas City!

For more information on how to join the Kansas City Chapter of ISSA click here. ** Join today! **

ISSA Member Login Page ISSA ** Login **

ISSA International’s Special Interest Groups (SIG) and Webinars:SIG On-Demand Conf

SIG groups are:

Security Awareness

Women in Security



Social Media

Chapter meetings are a great way to get to know your peers here in KC. And, if you're currently looking to make a career change, it's an invaluable way to build relationships that can provide you with the "inside information" on open security positions.

Do you have any membership questions? email link


Image result for Synack

Image result for Forcepoint

Image result for Carbon Black

Image result for Zerto

Image result for Tenable

Related image

Image result for CyberArk

Image result for Critical Start

Image result for Securonix

Image result for OKTA

Image result for ProofPoint

Be a sponsor!!! Email us at president@kc.issa.org