Founded in Los Angeles more than 25 years ago, the Information Systems Security Association (ISSA) is the largest international, not-for-profit professional association in the information security community. ISSA has more than 140 chapters, reaching over 10,000 security professionals in 70 countries. In December 2009, ISSA International Board President Howard Schmidt became President Obama’s White House Cybersecurity Coordinator. The LA Chapter of the Information Systems Security Association launched its Community Outreach Program to provide information security leadership to the Los Angeles community. This Executive Briefing is part of the program, designed to help businesses, not-for-profits, schools, and government agencies effectively meet the challenges of cybercrime and other threats to the confidentiality, integrity and availability of information. Stan Stahl, Ph.D. is President of the Los Angeles Chapter ISSA and the architect of ISSA-LA’s Community Outreach Program.
Dr. Stahl and Kimberly Pease offer engaging presentations on meeting the challenges of cyber security to professional, civic and philanthropic associations. They are knowledgeable, articulate, high-energy speakers with the rare gift of being able to describe the complexities of information systems security in a way that makes sense to real-world non-technical business professionals. View an overview of the Executive Briefing.
An information security pioneer, Dr. Stahl has secured teleconferencing at the White House, Top Secret databases inside Cheyenne Mountain, the communications network controlling our nuclear weapons arsenal and other very high-threat high-risk information security challenges. A frequent speaker and writer on cyber security, Stan is a former Mathematics Professor with a Ph.D. in Mathematics from The University of Michigan.
Ms. Pease has an extensive background in the applications of technology and Information Security Management for middle-market companies. Here she explains that nobody is immune from the threat of cybercrime, as well as the anatomy of a typical cyber attack: