CISOphoenix 2016 Nov. 30, 2016 to Nov. 30, 2016, phoenix,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Case Studies in Institutional Change Gilbert M. Orrantia Miami. 1986. The FBI agents were well trained, and the robbery suspects were outnumbered. Agent ...
A Pawsitive Transformation Mike Goodwin CXOs know that in order to be competitive, organizations must predict customers’ needs before they ...
Breaching the Horizon – Building a Culture of Security Awareness Kim Jones , Jerry Walters , Jason Lish , Jeff Miller Anyone can do the math. An organization’s risks increase daily at an exponential rate. IT ...
Cyber Strategy and Delivery in the New World Rajat Sen , Nate Smalley Disruption and an ever-changing security landscape have presented a variety of opportunities and challenges for ...
How Hybrid Approaches Are Changing IT Landscapes and Transforming Businesses Michael Baron , Todd Davis , David Jarvis According to a recent Gartner survey, 82 percent of CIOs are taking a hybrid IT ...
Lockdown – How to Keep Your Important Data Safe in the Cloud C.j. Radford , Richard Shetina For IT security, the cloud presents a unique dilemma: How do you embrace the benefits ...
Adaptive Architecture Narayanan Krishnakumar In the ever-changing world of technology, IT architecture needs to be able to adapt to ...
Disrupting Incident Response – Shrinking Detection Times From Weeks to Seconds Tina Slankas , Jeffrey Coe , Tom Gibb Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ...
Stop the Breach – Use the Cloud as a Powerful Game Changer in the Fight Jerry Dixon Today’s hacktivists, criminals and nation-state adversaries have tremendous advantage over defenders, which manifests daily in ...
The Incredible Shrinking Perimeter Josh Pollock Learn how a Fortune 50 company leveraged technology to shrink their perimeter, significantly reducing their ...
A Resilient Performance Robert Crossley When Robert Crossley moved into his new role at Choice Hotels International as VP, IT ...
Head in the Cloud, Finger on the Pulse Marnie Wilking IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands ...
The First 72 Hours Mike Lettman , Steve Reese , Sig Murphy The initial signs of a security incident are rarely black and white. The first questions ...
Scaling the Villain – How Everyday Criminals Are Expanding the Threat Landscape Brad Wardman What do the minds of cyber criminals look like? What choices do they make and ...
Defending the Enterprise Gary Nichols With data breaches on the rise, leaders such as Gary Nichols, Managing Director of Security ...
The Big Migration Umesh Manathkar IT leaders are looking up these days — to the cloud that is. But the ...
Email Attacks – Prepare Your Defenses Jason Grovert , Rekha Reddy-sareen , Tyrin Ford The amount of emails sent around the world each day is nearly unfathomable. One Internet ...
Returning Power to the Defender Vaughn Hazen , Ashish Larivee , Keith Stocks Advanced attacks have become everyone’s problem. Cyber criminals have greatly increased their capabilities and techniques, ...