Our AfterHours format is more casual and interactive than our regular chapter meetings and is designed for those not always able to make regular meetings, for individuals from our larger local security community, as well as those who simply enjoy discussion with their peers and industry leading thinkers.
Come out and join us – you’ll get informative presentations in intimate settings at great local venues, good food and refreshments, plus plenty of opportunity to refresh and build your network with valuable connections.
Planned MN ISSA AfterHours
The chapter will host another exciting MN ISSA AfterHours networking event on Thursday, March 22nd, 2018 from 4:30-7:30pm at Poor Richards Commonhouse in Bloomington (8301 Normandale Blvd, Bloomington, MN 55437). Complimentary food and refreshments provided by CyberArk.
- Social networking: 4:30 – 5:30pm
- Welcome and remarks: 5:30pm
- Presentation: 6:00 – 6:45pm
- Social networking: 7 – 7:30pm
Our After Hours format is more casual and interactive than our regular chapter meetings and is designed to garner attendance from those not always able to make the regular chapter meetings; as well as those who simply enjoy discussion with their peers and industry leading thinkers. Come for great networking, information and fun!
The Power and Potential of Robotic Process Automation. And the Security Risks.
Please join us on March 22nd as we explore the powerful and emerging Robotic Process Automation technology in regards to what IT security professionals need to know about RPA platforms.
Robotic process automation (RPA) is a powerful and emerging technology that streamlines and standardizes many human user processes as well as harmonizes different systems across an organization’s environment. So what do IT security professionals need to know about RPA platforms?
Very simply, it is a new attack vector and organizations need to start to understand their risk.
Because RPA software interacts directly with business applications and mimics the way applications use and mirror human credentials and entitlements, this can introduce risks when the software robots automate and perform routine business processes across multiple systems.
Learn about the vulnerabilities attackers seek out in RPA and the methods you can employ to proactively secure, protect and monitor privileged credentials in RPA non-human user entities that mirror human entitlements.
Our featured speaker Brandon Traffanstedt has over 10 years of Information Security experience. He has fulfilled many roles during his time encompassing the main security domains along his way. He is an expert on cloud security along achieving some of the industry’s highest level of accomplishments.
Thanks to our event and Gold chapter sponsor, CyberArk, there will be complimentary food and drinks for you to enjoy while networking with colleagues and learning from our presenter.