CISOdallas 2016 Nov. 29, 2016 to Nov. 29, 2016, dallas,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Co-Evolution of the CISO and Homo Digitalis Thornton May The next stage in humankind’s evolution is homo digitalis, or digital human. Our environment has ...
Outsmarting Ransomware – How to Not Give In Matthew Yarbrough , Anil Varghese , Shawn Irving , Larry Montoux One of the most significant cybersecurity threats in 2016 has been a massive increase in ...
Cyber Fusion – An Intelligence-Driven Approach Bill Phelps , Jason Escaravage Cyberattacks have become a frequent and costly occurrence in today’s operating environment with dynamic vulnerabilities ...
How to Stop Breaches – a New Approach to Endpoint Security Scott Bonneau , Ajay Gupta , Rod Murchison Close examination of the motivations and tradecraft of hacktivists, cyber criminals and nation-states all indicate ...
Take Risk off the Invite List – PepsiCo’s Third-Party Risk Program Edsel Garciamendez-budar Organizations are increasingly outsourcing IT functions, which puts data protections out of the CISO’s control ...
Defending Against Phishing Attacks – Case Studies and Human Defenses Tom Gibb Phishing is firmly established as the top entry method for hackers trying to access corporate ...
Keeping Insider Threats at Bay: Key Steps to Building a Successful Audit Program David Barton , Brian "hermit" Mork Malicious insiders have the upper hand in many organizations, and IT security staffs can be ...
A Primer on Secure Decision Making Michele Fincher Co-author, "Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails" How often do ...
Mastering Board Level Communication James Beeson , Jason Frugé , Duaine Styles CISOs are confident in what cybersecurity threat information to present to the board and what ...
Defending Against the Rising Trend of SAP Cyberattacks Alex Horan , Ken Waterman Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost ...
Cybersecurity Lessons From the Secret Service Nathaniel Gleicher Since the Secret Service began protecting the president in 1906, only seven attackers have reached ...
A Town Hall on Talent Parrish Gunnels , Boulton Fernando , Anjie Cayot , Betty Elliott Finding and retaining good talent — an ongoing challenge for CISOs and security teams — ...
Policing the Deep Web Eduardo Cabrera The cyber criminal underground economy is a rising tide that rivals the surface web. It’s ...
Building a Third-Party Risk Program – Guilty by Association James Robinson , Alex Nehlebaeff , Jim Desmond The sheer volume and cost of third-party security risk assessments can be daunting, especially when ...