cisoglobal 2017 Sept. 18, 2017 to Sept. 20, 2017, scottsdale,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Women in Security Reception Tina Thorstenson , Carmen Simon , Nasrin Rezai Come reconnect with your peers and maximize the value of your Global CISO networking experience ...
Welcome Reception Mike Lettman , Miller Newton The Governing Body invites attendees to kick off the Global CISO Executive Summit with a ...
Then and Now – Inventing the CISO Role Michael Wilson , Marc Varner , Stephen r. Katz , Emily Heath To survive as a CISO, you’ve got to be a chameleon. Besides speaking the language ...
Benchmark This! An Interactive Experience Ken Athanasiou , Nick Nedostup , Andrew Tuck One of the best ways to check your assumptions in business is to know where ...
Checks and Balances in Third-Party Security Stephen Boyer , Dave Estlick In the digital age, two things are likely — a third party will have access ...
Scaling Data-Driven Security Nanda Santhana Amid constant alerts and a daily barrage of data, organizations can struggle to configure and ...
Breached! A Wargame Simulation Nicole Monteforte , John P. Carlin , Brad Maiorino How prepared is your organization for a major cyberattack? Immerse yourself in a breach simulation ...
How Cyber Risk Affects Your Bottom Line Jack Leidecker , Feris Rifai , Tris Lingen , Alden Sutherland Because security leaders are now a boardroom staple, they must approach cyber risk with broader ...
The Collaborative Cloud Derek Tumulak , Vaughn Hazen , Joey Johnson As the effects of digitization spread into every corner of the enterprise, it’s tempting to ...
Securing Innovation – Cutting Through the IoT Hype John Graham , Chris Bitner , Santhosh Nair It’s not news that the Internet of Things has transformed the way consumers and businesses ...
Understanding Business-Critical Application Security Risks Mariano Nunez , Zouhair Guelzim Despite housing an organization’s “crown jewels,” ERP systems such as SAP and Oracle are not ...
Decoding the Business Impact of Ransomware Talvis Love , Chet Davis , Jimmy Sanders , Ken Liao No longer can ransomware be considered just another piece of malware — ransomware strains are ...
Sponsor Workshop: The Neuroscience of Being Memorable Carmen Simon Success in any industry is a function of influencing others. This is no easy task ...
Executive Presence for Lasting Leadership Chris Ulrich Any given gesture - a nod, a point of the finger - unconsciously communicates powerful ...
Help Wanted – Seeking Diversity in Security Kim Jones , Nasrin Rezai , Rohan Amin , Kirsten Davies The talent gap is not just a numbers game. To overcome the cybersecurity talent shortage, ...
Governance, Compliance and Security – Keys to Protecting the Business Kimberlee Brannock Maintaining proper network and data security compliance is an important concern for every business. Noncompliance ...
Disruption – Your Secret Weapon to Improving Security Posture Jeff Lunglhofer , Tim Upton CISOs struggle (and often fail) to secure information despite valiant efforts and increasing budgets. From ...
Beyond Cyber – Managing IT Risks Christopher Mixter Companies often overemphasize risks like cyberattacks and business-continuity failures, ignoring much larger but less-salient risks ...
Stealing Fire – Driving Maximum Human Performance Steven Kotler After four years of research and interviews with everyone from Silicon Valley executives to Navy ...
What Got You Here Won’t Get You There Marshall Goldsmith Dr. Marshall Goldsmith is a global authority in helping leaders achieve positive, lasting change in ...
CISO Therapy – Pause, Reflect and Resolve Malcolm Harkins , Kylie Watson , Sara Andrews , Chris Lugo A CISO’s world is complex, challenging and often exhausting. If you’re not dealing with vulnerabilities ...
The Risk-Aware Enterprise Through Identity Amit Saha As insider threat management and cloud-first initiatives take center stage in enterprise organizations’ IT roadmap ...
Preparing Your Business for GDPR Compliance William Malik The EU General Data Protection Regulation will soon be in effect for all businesses with ...
Identity Access Management in a Hybrid World Zouhair Guelzim , Ken Athanasiou , Fahad Rizqi With one foot in the cloud and one still on-prem, today’s hybrid enterprise is uniquely ...
Seeking Continuous Security Validation Catharina Budiharto , Richard Jankowski , Mike Spanbauer They say luck favors the prepared, but is this old adage true in cybersecurity? Even ...
Tool Time – Technology Overload Dan Chisum , Omar Khawaja In the security arms race, it’s easy to feel inundated by all the shiny new ...
Mind the Gap – Securing Data in Use Ellison Anne Williams You know how to secure data at rest and in transit. But what about securing ...
Don’t Buy a Fix, Fix Your Buys with SA&O Robi Papp Robi Papp provides an agnostic overview of the emerging security automation and orchestration market, including ...
Hunting with Cyber Deception Gadi Evron Learn how to proactively hunt APT actors with cyber deception. Gadi Evron examines the predictable ...
The Cybersecurity Workforce Game of Chicken Amjed Saffarini Who is going to move first and build a pathway — the supply or the ...
Managing Digital Risk Across the Open, Deep, and Dark Web Dan Lowden Organizations struggle to manage digital risk across the open, deep, and dark web, including possible ...