CISOhouston 2016 June 20, 2016 to June 20, 2016, houston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
People Before Things – Always! Chris Laping 70 percent of all change initiatives fail, according to Gallup. In the constantly changing world ...
The Recipe for a High-Performance Security Team Charles Layton A high-performance team is able to predict the next IT shift or innovation, rather than ...
Activating Human Power Jim Hansen Phishing is well-established as hackers’ top entry method when trying to access corporate networks. Yet, ...
We Must Work Together John d. Davis , Christopher Peters , Angelique Grado No single organization has all the talent, skills, resources, capabilities, capacity and authority to act ...
The First 72 Hours Derek Rude , Steve Neiers , Ryan Vela The initial signs of a security incident are rarely black and white. The first questions ...
10 Focus Areas for Breach Prevention Keith Turpin In the realm of information security, the better you are at doing your job, the ...
Defending Against the Rising Trend of SAP Cyberattacks Mario Chiock , Shane Macdonald Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost ...
APTs, the Board and You Stuart Wagner , Catharina Budiharto Board members want to know about Advanced Persistent Threats, acceptable risk, and especially how they ...
Shut Down the Attack Surface Inside Your Data Center and Cloud Alan Cohen How exposed are your highest value applications? What communications are the most vulnerable? Hear CISOs’ ...
Transitioning to Continuous Vendor Risk Management Mathew Cherian Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
Application Self-Protection – Revolutionizing Application Security Jeff Williams Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches ...
Inside Look at Successful CISO Playbooks Mario Chiock , Angela Haun Cybersecurity has quickly become an integral part of daily life affecting all aspects of business ...
IT and OT Integration Insights Scott Vonfischer Too often at companies across the industry spectrum, there is a continental divide between information ...
Building a Breach-Ready Organization – Modern-Day Lessons From Troy and Byzantium Simon Crosby Mobility, adoption of cloud and access to the web lead to a stark reality: Sophisticated ...
Addressing Cybersecurity Challenges With Applied Security Analytics Brian Contos , Glenn Dally , Anthony Caruso Data-driven artificial intelligence and unsupervised machine learning can now answer the question that has plagued ...
Floating Safely on a Cloud Marc Crudgington , Genady Vishnevetsky , Owen Johnson Cost savings, reduced staff requirements and unprecedented power are drawing organizations to cloud applications, but ...
Workshop – Unraveling the Intricacies of Risk Nikk Gilbert Energy companies face myriad challenges to information security — from connected technology assets, stringent regulations ...
Policing the Deep Web Eduardo Cabrera The cyber criminal underground economy is a rising tide that rivals the surface web. Far ...
IGA 2.0 Powered by Risk Analytics and Identity Intelligence Mike Coogan , Amit Saha , Simon Tong As insider threat management and cloud-first initiatives take center stage in organizations’ IT road map, ...