CISOsoCal 2016 June 28, 2016 to June 28, 2016, california,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Plight of CIOs and CISOs – Crafting a Common Agenda Bill Miller Never before has the world of the CIO been so complex, so challenging, and still ...
The Future of Identity Is Now Scott Howitt Identity and access management is so entrenched in information risk management programs that it has ...
Defending Against Phishing – Preparing and Using Human Sensors Tom Gibb As the security industry has continued to underinvest in the human element of security, phishing ...
Getting it Right – Discussing the Many Factors of Security Solution Selection Dov Yoran , Arthur Lessard , Bently Au , Jennifer Ramsey Selecting the right security vendor requires a CISO to assess countless variables, each as distinct ...
You Have a Blind Spot – Why Encryption Is Making You Sick Kevin Bocek , Sudhakar Gummadi , Michael Mongold Adversaries outsmart enterprise security strategies by exploiting the foundation of online security. Intel predicts the ...
Multiplayer Incident Response Christopher Hymes Riot Games takes the needs of its players seriously. But unlike its competitors, Riot Games ...
Identity and Access in the Digital Nirvana Scott Howitt , Jerry Sto. Tomas , Scott Schwarzhoff As the digital nirvana expands, the amount of control businesses have over their systems naturally ...
New Approach to Endpoint Security – Stopping Breaches Gary Hayslip , Colin Black , Robert Pittman Close examination of the motivations and tradecraft of hacktivists, cyber criminals and nation-states all indicate ...
Application Self-Protection – Revolutionizing Application Security Alan Naumann Insecure applications have been the leading cause of breaches over the last eight years. Deep ...
Protecting Your Information and Infrastructure in the Cloud Adina Simu Enterprises constantly consume applications and deploy services through the cloud. Learn how early cloud access ...
The Hidden Enemy – Malvertising and Ransomware Pedro Bustamante Malvertising is increasing in sophistication and prevalence, often delivering ransomware as the payload. Learn the ...
Enterprise Cybersecurity Through a CEO’s Eyes Charles Harrington The emergence of a fully interconnected world is ripe with opportunity for driving growth and ...
Combining Forces at the Cyber Training Complex William Britton , Jay M. Coggan Bill Britton from Cal Poly San Luis Obispo and Lt. Col. Jay Coggan from the ...
The Key Pillars of Cloud Security Sachin Nayyar With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now ...
Getting Ahead of the GDPR Sol Cates , Doug Murray , Paresh Amin , Michael Miora In 2015, the EU agreed to a draft of the General Data Protection Rules with ...
The Insider Threat – The Most Overlooked Risk in Security Josh Davis , Geoff Aranoff , James Christiansen , Henry Praw Historically, the insider threat has been undervalued and underestimated, and funding for solutions to mitigate ...
The Inside Track – Lessons on the Evolving CISO Phil Ferraro As security incidents accelerate in both frequency and severity, the transparency of the aftermath increases ...
Floating Safely on a Cloud Martin Mazor , David Brewer , Mark Urban Cloud applications and infrastructure are transforming business, but rapid adoption is leaving security and compliance ...