CISONewYork 2014 May 12, 2014 to May 12, 2014, New York,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Persistent Threat – Combating the Evolving Cybersecurity Challenge Michael Chertoff Today’s unrelenting threat of cyber crime represents one of the most disruptive dangers to national ...
Holistic Risk Management – Guiding the Business Through Change Michael Rossman , Joel Molinoff , Medha Bhalodkar , Robert Zandoli Historically, many organizations have talked about risk in silos, from finance and operational risk to ...
Humans – The Weakest Link or Your Greatest Security Asset? Rohyt Belani Are your users more likely to cause or prevent your next data breach? Industry consensus ...
Impacts and Opportunities of the Cyber Executive Order and NIST Framework Linda Betz , Dennis Dickstein , William Stewart Created through public-private collaboration, the NIST Framework serves as a working document of collective intelligence ...
Insider Threats – Thwarting Sophisticated Cyber Adversaries and Attacks on Privileged Users Alan Kessler , Ramin Safai The profile of insider threats is changing. Traditionally, insider risk came from disgruntled or malicious ...
Clarifying the Cloud – A Proactive Approach to Cloud Use David Cass The public cloud has not only settled on the IT landscape, it has infiltrated every ...
Big Data Meets Security – Operationalizing an Intelligence-Driven Security Program Mike Huckaby Big Data and intelligence-driven security is currently touted as the right solution for detecting and ...
From Risk Management to Better Governance, Relating GRC to the Boardroom Andrew Conte , Stephen Gant Security organizations invest a lot of money on tools to mitigate risk, but how do ...
Identity Access Management – Getting Past the Building Blocks Laura Jagodzinski , Zouhair Guelzim , Eric Robinson As an organization grows, so do the number of accounts that tie into the network. ...
Next-Generation CISOs Thornton May , Mark Connelly , John J. Masserini , Steven Young The security industry is changing and with it, the role of the security leader. Or ...
Providing a Framework for Building a Security Organization Steven Young For the last two years, Steven Young has developed partnerships across all levels at Kellogg ...
Defense is Critical, but Offense Wins Games Jon Ramsey Let’s face it — when it comes to combating ever more sophisticated threats, security professionals ...
Looking to Data for Security Dennis Brixius , Patrick Gray , Laraine Weglarz As criminal and state-sponsored cyber attacks become more sophisticated, traditional security solutions no longer sufficiently ...
Protecting Business-Critical Applications from Cyber Attacks Mariano Nunez , Brian Lozada , Deborah Snyder A well-implemented ERP is the lifeblood of an organization, managing most of its business-critical information ...