CISOdenver 2016 June 28, 2016 to June 28, 2016, denver,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Best Brain Forward Scott Halford Everyone has similar “hardware” called the brain. But how people use it is as individual ...
The Consumer-Centric Universe Alan Cullop The consumer is the center of the digital universe. At DaVita, the IT team is ...
Data – The New Currency of Culture Sujan Turlapaty A spreadsheet might not seem particularly moving, but Sujan Turlapaty is out to change that. ...
Agile Transformation David Bessen , Jeetu Patel As technology levels the competitive playing field across every industry, the necessity of agile transformation ...
Security From Scratch Sue Lapierre Prologis didn’t have a security awareness program until Sue Lapierre took the helm. Less than ...
The Incredible Shrinking Perimeter Josh Pollock Learn how a Fortune 50 company leveraged technology to shrink their perimeter, significantly reducing their ...
Take the Devil Out of the Details Don Frazier Learn a new cloud-based approach to bulletproof strategy formulation. Find hidden leverage regardless of the ...
When the Lights Go Off in the City Dawn Roth Lindell As CIO for Western Area Power, Dawn Roth Lindell’s chief concern is “keep the lights ...
See the Forest and the Trees With Operational Intelligence Howard Haile , Sherri Hammons , Tapan Bhatt All websites, communications, networking and complex IT infrastructures generate massive streams of data in a ...
2016, The Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? Jim Hansen , Christine Vanderpool , Steve Oberg 2016 is shaping up to be the year of the ransomware attack. As ransomware and ...
Cloud Not Liking That “WAN in the Middle”? Dan Ceynar , David Hluska , James Winebrenner How can CXOs make cloud migration a walk in the park? One hurdle is that ...
Stop the Breach – Use the Cloud as a Powerful Game Changer in the Fight George Kurtz Today’s hacktivist, criminal and nation-state adversaries have tremendous asymmetric advantage over defenders that manifests itself ...
Drafting the Right Bench of Tech Talent Catherine Pitt There’s no question the need for skilled information and security professionals is accelerating dramatically, but ...
IT’s Transformation to Business Enabler Thomas Roloff In just over a decade, IT has become a business enabler and a key player ...
Managing Cyber Risk – Effective Communication With the Board Sheryl Rose , Brett Bradshaw , Deborah Scanlon Security leaders are confident in what cybersecurity threat information to present to the board and ...
Leading a Digital Transformation Chuck Fredrick , Al Rosabal Marketers continue to shift ad budgets to digital platforms as consumers increasingly view content on ...
Mind the Gap – Integrating IT and Security Piero Depaoli Despite the hype and promise behind the latest next generation security technologies, organizations continue to ...
Reducing Your Attack Surface – An Identity Management Perspective Jd Sherry , John Everson , Sam Masiello The significant increase in the use of distributed applications running in the enterprise — in ...