CISOnewjersey 2016 Nov. 30, 2016 to Nov. 30, 2016, new jersey,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Tighten the Lug Nuts to Achieve Balance and Optimize Performance Rocky Romanella On the highway of corporate America, leadership is an active responsibility not a passive duty. ...
Toward Distributed and Virtualized Enterprise Security Edward G. Amoroso Is the perimeter a thing of the past? Ed Amoroso, CEO of Tag Cyber, posits ...
A Partnership to Showcase Brent Maxwell , Joseph Santamaria General Electric and Public Service Enterprise Group Incorporated have created a strong partnership within IT ...
Head in the Cloud, Finger on the Pulse Damian Mcdonald IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands ...
Wrestling with Innovation Michael Crowe , Mahesh Harvu , Walter Yosafat It’s commonly believed that innovation, risk and resources are a triangle of tradeoffs. Sacrificing in ...
Smartphone to Virtual Remote Gerard Insall Three, two, one. Your plane lands, you turn on your electronic devices and you receive ...
Mind the Gap – Integrating IT and Security Rob Pickering Despite the hype and promise behind the latest next generation security technologies, organizations continue to ...
Securely Enabling your Digital Workforce Brian Katz CIOs have a mandate to digitally enable their workforce to deliver in an age of ...
Rapid Advancement of Behavioral Analytics Hussein Syed , Jose Dominguez How are you reading this right now? On your phone, tablet or a mobile application? ...
Thriving in the Age of Digital Transformation Howard Elias , Brett Hecker The seminal challenge facing all enterprise CIOs is creating the digital DNA needed to compete ...
An Innovation Revolution Today Faraz Shafiq Innovation in technology is materializing at a rapid pace, and we are witnessing more revolution ...
The Human Firewall Hussein Syed , Luis Taveras Emails are one of the main targeted attacks perpetrated by phishers, with sometimes disastrous effects. ...
The Scarcity of Security Talent – How Does Technology Fit In? Jonathan Bransky , Kevin Gokey , Paul Stamp The increased complexity of the threat landscape has significantly increased the demand for security talent. ...
Find and Replace Damian Mcdonald , Jose Dominguez , Arno Walt Advanced threats are difficult to discover, remove and attribute. It takes a huge amount of ...
Beyond the Table – The Future of IT Leadership Michael “drbearsec” Smith As CIOs and their peers in information technology put greater and greater distance between themselves ...
Connected Reality Michael Del Priore , Ken Jeanos , Nilesh Mhatre The Internet of Things impacts everything — from optimizing manufacturing processes to revolutionizing consumer interactions ...
Orchestrating Effective Data Loss Prevention Programs Raymond Lipps , Nanda Santhana , Brett Hecker , Mike Towers Effective data security isn’t a one-man band; it’s a carefully tuned orchestra. CISOs know that ...