CISOCincinatti 2016 June 14, 2016 to June 14, 2016, cincinatti,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Gone Phishin’ Brian Lawhorn Anyone with a company email address can be the target of a phishing scam — ...
Blocking the Path of Cyberattacks Earl Rose In 2015, the power centers of the Ukraine were brought to a halt after hackers ...
Everything Modern CISOs Need to Know but Are Afraid to Ask Michael Sutton As enterprise data breaches increase, CISOs are being marched into the boardroom to explain enterprise ...
Orchestrating Effective Data Loss Prevention Programs Paul Bowen , Leo Cronin , Lisa Heckler Effective data security isn’t a one-man band; it’s a carefully tuned orchestra. CISOs know that ...
Security – The Catalyst for Revenue Robert Schuetter Before Robert Schuetter joined Ashland Inc., the organization had no real investment in advanced cybersecurity ...
Understanding the Adversary and Stopping the Breach Colin Black A fundamental shift is starting to occur — cybersecurity activity is being governed by political ...
2016, The Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? Brian Stone , Michael Erickson , Michael Rock 2016 is shaping up to be the year of the ransomware attack. As ransomware and ...
The New Reality – Make Change Your Competitive Advantage Karl Schoemer Like a school of fish, an adaptive security organization must move rapidly and in unison ...
Think Your Network Is Safe? Check Your Printers. Jason O'keeffe Where do printers fall in your current endpoint security practices? Most companies invest millions in ...
Managing Risk While Driving Business Jd Rogers , Gregory Peebles , Michael Lipinski Security controls that lock doors may protect the store, but they also stop the customers ...
Soaring to New Opportunities With Predix Steve Kesler While cloud and analytics are creating new security headaches for CISOs, they’re also creating new ...
Challenges and Lessons Learned in Building a Hybrid SOC Paul Townley Creating an effective SOC to respond efficiently to threats can be challenging. When CISOs are ...
How to Protect Data in Places You Don’t Control Jack D. Nichelson , Chris Mcfarland , Eric Longo The evolution of cloud technologies, third-party solutions and software-as-a-service offerings have steadily transformed the enterprise, ...
Transitioning to Continuous Vendor Risk Management Jacob Olcott Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
Commodification of Attacks Kevin Mclaughlin Hackers are being commoditized, escalating the fight on ransomware. But stopping these attacks doesn’t have ...
Threat Isolation – Stop the Endless Search for Risky Content Guthrie Troise The web remains an overwhelming source of malware infections. Learn best practices for eliminating malware ...