CISOmilwaukee 2016 Nov. 15, 2016 to Nov. 15, 2016, milwaukee,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Disrupt or Get Disrupted – Business in an Exponential Era Laura London Technology is evolving at an exponential rate — so fast, in fact, that most of ...
Fear Factor – IT Leaps Into the Void Thornton May As emerging technologies continue to impact all industries, C-suite IT leaders must stay abreast of ...
Two Roads Diverged in a Wood: Agile Unites the Business and IT Gregory Chi Often, communication between the organization and IT could be summed up in one command: this ...
Leading the Pack—CIOs go Digital Blaise Beaulier Technology has changed every aspect of the environment as we knew it. For companies looking ...
How Hybrid Approaches Are Changing the IT Landscapes and Transforming Businesses Kerrie Hoffman , Barb Streubel , Kevin Maddock According to a recent Gartner survey, 82 percent of CIOs are taking a hybrid IT ...
Home Grown – How to Cultivate IT Leaders Fawaz Rasheed The need for IT talent and those who require it continues to climb. Given this ...
Security on Lockdown – Building Better Defense Fayyaz Rajpari , Thornton May Whether mitigating fallout from malware or securing data on the cloud, CIOs and CISOs have ...
You and Me and Everyone We Know – The Phishing Pandemic Mike Warner , Larry Pedrazoli , Bob Amich Seemingly no celebrity, politician, organization or government is immune to the relentless and dogged pursuit ...
Thriving in the Age of Digital Transformation Brant Hummel The seminal challenge facing all enterprise CIOs is creating the digital DNA needed to compete ...
The Changing Role of the CIO in the New Digital Reality Judy Lemke , Jerry Fox , Dave Cotteleer , David Hotchkiss Technology is enabling disrupters to challenge virtually every industry and long-standing business model. While CIOs ...
Think Your Network Is Safe? Check Your Printers Jason O'keeffe Where do printers fall in your current endpoint security practices? Most companies invest millions in ...
The Human Factor in the Age of Cyber Conflict Paul Bowen , Kathy Lang , Joe Smits With new technologies appearing almost daily, attackers have growing access to a constant stream of ...
Rendering Valid Stolen Credentials Useless Josh Pollock Learn how a Fortune 50 company leveraged technology to eliminate risk from credential theft, eliminating ...
Building a Platform for Disruption Brian Stuelpner In times of rapid change, IT leaders face the near-impossible task of designing for an ...
Cloudy with a Chance of Clarity Dave Schecklman , Manish Chawla , David Privett Most IT leaders have accepted that cloud is the way of the future. While security ...
Getting Started - Managing Third Party Cyber Risk Alex Ellis Vendor risk management has become a major issue for businesses following major breaches traced back ...