CISOchicago 2016 Nov. 29, 2016 to Nov. 29, 2016, chicago,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Strengths 2.0 – Applying Design Thinking to Your Strengths and Weaknesses John K. Coyle Consider the adage “The definition of insanity is doing the same thing over and over ...
Caught Phishing Todd Fitzgerald Even with increased awareness around security, phishing attacks aren’t slowing down in their success and ...
Expand Additional Information Jj Markee , Brian Wrozek , Greg Bee Often issued as a threat from armed robbers, “your money or your life,” encapsulates the ...
Keeping Insider Threats at Bay Doug Copley , Stephen Gilmer , Robert S. Allen Malicious insiders have the upper hand in many organizations, and IT security staffs can be ...
Reading the Fine Print – CISOs and Cyber Insurance Nick Graf , Larry Lidz People? Check. Process? Check. Technology? Check. But how do you manage the liability and preserve ...
Io(S)T – Internet of Secured Things Marc Blackmer The massive distributed denial of service attacks in September 2016 woke the world up to ...
Getting Ahead of GDPR Marc Varner , Sol Cates In 2015, the EU agreed to a draft of the General Data Protection Rules with ...
Defending Against the Rising Trend of SAP Cyberattacks Mariano Nunez , John Germain , Waqas Akkawi Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost ...
Challenge the Status Quo Nir Zuk Many organizations are realizing that as cyberattacks become more advanced, tactical security is no longer ...
Application Self-Protection – Revolutionizing Application Security Jeff Williams Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches ...
The Hidden Enemy – Malvertising and Ransomware Justin Dolly Malvertising is increasing in sophistication and prevalence, often delivering ransomware as the payload. Learn the ...
The Threat Is Already Inside Your Organization Michael Mckee Traditional enterprise security mechanisms tend to ignore indicators of compromise. ObserveIT's platform keeps insiders within ...
Security à La Carte Fred Kwong Tasked with the challenge of securing a number of Delta Dental’s member organizations, Fred Kwong ...
How to Stop Breaches – The Need for a New Approach to Endpoint Security Adam Meyers , Larry Lidz , Steven Mclean Close examination of the motivations and tradecraft of hacktivists, cyber criminals and nation-states shows that ...
From DevOps to DevSecOps – Meeting the Demands of Continuous Security Aman Raheja , Stephan Hundley Lean and mean. Fast, faster, fastest. With most organizations adopting agile approaches to technology, it’s ...
Building Trusted Solutions and Being the Business Vugar Zeynalov Vugar Zeynalov leads in a complex environment where the ability to manage technology risk is ...
Building a Breach-Ready Organization – Modern-Day Lessons From Troy and Byzantium Gregory Webb Mobility, adoption of cloud and access to the web lead to a stark reality: Sophisticated ...
Activating Human Power Brian Stone , Victor Hsiang , Craig Youngberg Phishing is well-established as hackers’ top entry method when trying to access corporate networks. Yet, ...