Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/27/2012
02:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ISSA-LA Offers Free Registration Program For NonProfits

Registration is open to anyone interested in learning more about information security

Los Angeles, California, United States of America (Free-Press-Release.com) April 26, 2012 -- Los Angeles – April 26, 2012 – The Los Angeles Chapter of the Information Systems Security Association’s (ISSA-LA) has created a donation fund of up to $20,000 to IT employees and executives of nonprofits to attend, at no charge to the attendees, the fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business, which includes the business of operating nonprofits.

“We are offering 100 free registrations to our nonprofit friends because we know how important it is that the critical work of nonprofits move forward unimpeded by criminal attacks,” said ISSA-LA President Stan Stahl, PhD. “Nonprofits are prime targets of cybercriminals who steal personal identities and bank funds. Additionally, nonprofits typically have thousands upon thousands of individual pieces of data, sensitive data that belongs to the people in our community, and which cannot be secured if staff members and executives are not aware of how to deal with the danger they face. The idea of extending a hand to nonprofits is in line with ISSA-LA’s credo that ‘It takes the village to secure the village’ SM.”

According to a new study by the Center for Civil Society at the UCLA's Luskin School of Public Affairs, in September 2011, the latest date for which data is available, there were 31,600 registered 501(c)(3) public charities in Los Angeles County, generating more than $35 billion in economic activity and employing over 230,000 people. At least 10% have budgets over $1 million. A significant number of large nonprofits have budgets of more than $10 million. Most of the donations today are made over the Internet and kept on the organizations’ databases. This information needs to be properly protected and secured.

The Summit is the only educational forum in Los Angeles specifically designed to encourage participation and interaction among all three vital information security constituencies: (1) business and organization executives, senior business managers, and their trusted advisors; (2) technical IT personnel with responsibility for information systems and the data they contain; and (3) information security practitioners with responsibility for ensuring the security of sensitive information.

Registration is open to anyone interested in learning more about information security but is particularly recommended for business and nonprofit executives and senior managers; business professionals in law, accounting, insurance and banking; technical IT personnel; and information security practitioners.

The Information Security Summit is part of ISSA-LA’s important community outreach program. The goal of the program is to help the community stay safe from cybercrime by enabling the necessary collaboration between business, nonprofit and community leaders, technical IT professionals and the information security community.

Nonprofits interested in registering for the event should e-mail [email protected] to receive the appropriate registration codes.

About the LA Chapter of the Information Systems Security Association (ISSA-LA)

The Los Angeles Chapter is the founding Chapter of the Information Systems Security Association, an international not-for-profit organization of information security professionals and practitioners. ISSA-LA is the premier catalyst and information source in Los Angeles for improving the practice of information security. The Chapter conducts outreach programs to business, nonprofits, government and consumers. For more information or to register for ISSA-LA’s 4th Annual Information Security Summit, please visit: www.issa-la.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...