CISOatlanta 2016 June 1, 2016 to June 1, 2016, atlanta,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Preparing for a World That Thinks for Itself Jack Shaw What happens when you combine the cloud, mobility, the Internet of Things, 3-D printing and ...
Don’t Duck Away From a Threat Tim Callahan What does intelligence mean in a market with deafening noise? Many vendors are spinning products ...
Defending Against Phishing – Preparing and Using Human Sensors Josh Nicholson As the security industry has continued to underinvest in the human element of security, phishing ...
How to Stop Breaches – A New Approach to Endpoint Security Steven Chabinsky , Reginald Williams , Christopher Roche A fundamental shift is occurring in cybersecurity: Global geopolitical and economic forces are manifesting as ...
Embedding Awareness Into the Culture John B. Dickson For most organizations, the majority of risk profile factors are due to a lack of ...
Application Self-Protection – Revolutionizing Application Security Jeff Williams Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches ...
Transitioning to Continuous Vendor Risk Management Jacob Olcott Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
You Just Got Breached. Now What? Mike Whitt , Robert Mims , Larry Whiteside Jr Incident response is arguably the most important component of a security program. However, it is ...
Put Risk in the Driver’s Seat Andrew Black Andrew Black argues that multinational companies need to move into a “managed risk” posture led ...
Vendor Risk Management – Corporate Obligations for Cybersecurity Nicholas Oldham Nick Oldham is at the forefront of dealing with pressing cybersecurity issues through an attorney’s ...
Building a Breach-Ready Organization – Modern-Day Lessons From Troy and Byzantium Simon Crosby Mobility, adoption of cloud and access to the web lead to a stark reality: Sophisticated ...
Managing Cyber Risk – Effective Communication with the Board Linda Meinzer , Mark Andrews , Joe Quigg CISOs are confident in what cybersecurity threat information to present to the board and what ...
It’s All Greek to the Org Lynda Fleury As leaders of a field that may seem like gobbledygook to the rest of the ...
Cloud Security Doesn’t Have to be Pie in the Sky Derek Tumulak , Will Alexander , Paul Farley As enterprises evolve their IT stack, traditional security approaches need to be reconsidered as well. ...
Addressing Cybersecurity Challenges With Applied Security Analytics Brian Contos , Gram Ludlow , Hmong Vang Data-driven artificial intelligence and unsupervised machine learning can now answer the question that has plagued ...