CISOwashington 2016 Nov. 29, 2016 to Nov. 29, 2016, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Safeguarding FBI Information from Foreign and Domestic Cyberthreats Arlette Hart Even with our nation’s top law enforcement resources and privileged cyberthreat information at her fingertips, ...
Developing VT-Shaped Talent and Doing Good with Good Data Rafael Diaz , Linda Oldham Linda Oldham is developing “minds-on, hands-on” talent and producing actionable data for Rafael Diaz at ...
Mind the Gap – Integrating IT and Security Rob Pickering Despite the hype and promise behind the latest next generation security technologies, organizations continue to ...
Ushering in The Era of Big Data Security Analytics Chris Tignor , Christopher Porter , Vincent Bodner Security leaders have accepted the realistic but pessimistic outlook of “it’s not if, but when” ...
Beyond the Hype Towards Authentic Enterprise Innovation Bruce Lee , André Mendes , Kevin Poe The innovation hype curve has flattened out and all of those start-up playbooks and Silicon-Valley ...
Value-Laden Cybersecurity – Partnership and Communication Vinit Duggal Step 1: Gain executive buy-in for a security-first approach. Step 2: Create a message and ...
The First 72 Hours Mike Buratowski , Michael Castagna , Chris Lugo The initial signs of a security incident are rarely black and white. The first questions ...
The Talent Pipeline Fuels Innovation and Accelerates Execution Amy Doherty , Georgette Kiser , Mark Morneau People are the lifeblood of every function within an organization, but nowhere is this more ...
Thriving in the Age of Digital Transformation Josh Bernstein The seminal challenge facing all enterprise CIOs is creating the digital DNA needed to compete ...
Data Governance Takes a Village Loretta Ibanez , Jodi Morton A pillar of the modern enterprise is data. It fuels every function, helping to innovate, ...
Activating Human Power Gordon Lawson , Rodrigo Loureiro , Jeff Lolley Phishing is well-established as hackers’ top entry method when trying to access corporate networks. Yet, ...
Emerging Provider sponsored by: Contrast Security Arshan Dabirsiaghi Insecure applications have been the leading cause of breaches over the last eight years. Deep ...
Getting Sentimental with Security Analytics Rob Rachwald Security teams sit on massive amounts of data — but don't know what to do ...
Does That Cloud Look Like a Strategy to You? Lee Congdon Opinions and viewpoints on the cloud are as diverse as the shapes of clouds themselves. ...
The Jury Is Out on Privacy and Cybersecurity Frameworks Janine Hiller Organizations continue to gain a competitive edge and make smarter decisions using enterprise data and ...
Managing Cyber Risk – Effective Communication with the Board David Stender , Brian Wilkinson , Steven Grossman CISOs are confident in what cybersecurity threat information to present to the board and what ...