CISOsanfrancisco 2016 Dec. 5, 2016 to Dec. 5, 2016, san francisco,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Reimagine Security Malcolm Harkins Join one of the world’s most respected CISOs for a morning of reimagining what it’s ...
Transforming for Success Emily Heath AECOM and URS Corporations came together two years ago, doubling the company in size in ...
Think Your Network Is Safe? Check All Your Endpoints Michael Howard , Ron Chestang While you invest time, resources and millions of dollars in protecting endpoints and network perimeter, ...
Keeping Insider Threats at Bay — Key Steps to Building a Successful Audit Program Gary Coverdale , David Barton Malicious insiders have the upper hand in many organizations, and IT security staffs can be ...
3rd Party Risk Management – The Key to a Perplexing Lock Michelle Nix , George Decesare George DeCesare and Michelle Nix offer a risk-based roadmap for developing a robust vendor risk ...
Transitioning to Continuous Vendor Risk Management Mathew Cherian Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
The Hidden Enemy – Malvertising and Ransomware Mark Patton Malvertising is increasing in sophistication and prevalence, often delivering ransomware as the payload. Learn the ...
Application Self-Protection – Revolutionizing Application Security Jeff Williams Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches ...
Returning Power to the Defender Phillip Cantu , Ashish Larivee , Joe Cravotto Advanced attacks have become everyone’s problem. Cyber criminals have sharply increased their capabilities and techniques, ...
Defending Against the Rising Trend of SAP Cyberattacks Justin Somaini , Michael Wilson , Mariano Nunez Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost ...
Challenge the Status Quo Nir Zuk Many organizations are realizing that as cyberattacks become more advanced, tactical security is no longer ...
Signal vs. Noise – Strategies for Effective Security Awareness Masha Sedova Ask a CISO about their employee security habits, and a typical answer follows: “I want ...
2016, Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? Tom Gibb 2016 is shaping up to be the year of the ransomware attack. As ransomware and ...
Ushering in the Era of Big-Data Security Analytics Todd Barnum , David Swift , Frederick Cox Security leaders have accepted the realistic but pessimistic outlook of “it’s not if, but when” ...
Head in the Cloud, Finger on the Pulse Steve Martino , Jack Leidecker , Yash Prakash IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands ...
Stronger Together – Coordinated Efforts With Public Agencies Malcolm Palmore , Keith Tresh Private enterprise knows they can mutually benefit from partnerships with public agencies — but many ...
Security From The Start Shannon Lietz Next generation software deserves security from the start and better collaboration to effectively reduce the ...
How to Stop Breaches At The Endpoint Colin Black , Yassir Abousselham , Todd Berman Close examination of the motivations and tradecraft of hacktivists, cyber criminals and nation-states all indicate ...