CISOminneapolis 2016 June 21, 2016 to June 21, 2016, minneapolis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Adapting to the New Security Normal Nir Zuk Many organizations are realizing that as cyberattacks become more advanced, tactical security is no longer ...
From Trading and Stealing to Staying and Leading Mike Johnson , Susan Davis-ali , Adam Holton , Margaret Anderson Kelliher The Minneapolis talent landscape is a challenging one, with the constant shortage of IT security ...
Addressing Cybersecurity Challenges With Applied Security Analytics Brian Contos , Chris Buse , Bernie Rominski Data-driven artificial intelligence and unsupervised machine learning can now answer the question that has plagued ...
Transitioning to Continuous Vendor Risk Management Joseph Mitchell Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
The Incredible Shrinking Perimeter Josh Pollock Learn how a Fortune 50 company leveraged technology to shrink their perimeter, significantly reducing their ...
Intrusions – Are We Left to Raise Our Hands in Defeat? Roy Katmor Discuss new and effective strategies to combat today’s advanced threats, ways to remove the operational ...
iResponse – Reporting Incidents, Recording Success Kathy Orner How can a large, global company create a culture of security awareness? Ask Kathy Orner. ...
Defending Against Phishing – Preparing and Using Human Sensors Tom Gibb As the security industry has continued to underinvest in the human element of security, phishing ...
Managing Cyber Risk – Effective Communication With the Board Chris Grillo , Kathy Washenberger , Deborah Scanlon CISOs are confident in what cybersecurity threat information to present to the board and what ...
People Before Things – Always! Chris Laping Author “People Before Things” and Former CIO Red Robin Gourmet Burgers, Inc. Seventy percent of ...
The Land of 10,000 Risks Heather Hanscom , John Valente , Tris Lingen , Rich Agostino Regardless of industry or organization size, risk comes in all shapes and forms as new ...
Mind the Gap – Integrating IT and Security Piero Depaoli Despite the hype and promise behind the latest next generation security technologies, organizations continue to ...
Reducing Your Attack Surface – An Identity Management Perspective Barry Caplin , Michael l. Kearn , Ron Kuriscak The significant increase in the use of distributed applications running in the enterprise — in ...
CISOs and Law Enforcement Working Together Michael Krause , Timothy Rank , Louis Stephens CISOs are constantly striving to improve their incident response process, and many are often ill ...
The Untold Secrets of Fighting APTs Douglas Degrote , Larisa Thomas , Ashish Larivee According to an ISACA study, one out of four organizations were targeted by APTs in ...
Getting Ahead of the GDPR Sol Cates , Patrick Joyce , Jim O'conner , Natalie Persson In 2015, the EU agreed to a draft of the General Data Protection Rules with ...