CISOAtlanta 2014 June 4, 2014 to June 4, 2014, Atlanta,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
In Countering Adversaries, Collaboration is Key | Bill Barouski | The potential impact and sophistication of cyber crimes continue to rise as evidenced in numerous ... | |
Four Cybersecurity Innovations to Give You Courage | Rick Howard | Despite the negative press about the weakness of collective good-guy cyber defenses, there is reason ... | |
An International Case Analysis of Effective Risk Management | Devin Cambridge | There is general consensus among CISOs that business enablement should be foundational to an effective ... | |
Encryption and Access Control for Cloud – Big Data Environments | Wayne Proctor , Alan Kessler , Mj Vaidya | Cloud and Big Data present unique dilemmas - embracing the benefits of these new technologies ... | |
Putting the NIST Framework to Work in Your Organization | Kelvin Coleman , Adam Sedgewick , Mark Reardon | Created through public-private collaboration, the NIST Framework serves as a working document of collective intelligence ... | |
Humans – The Weakest Link or Your Greatest Security Asset? | Jeffrey Rogers | Are your users more likely to cause or prevent your next data breach? Industry consensus ... | |
Manage The Mobility They Want With the Protection They Need | Michael T. Raggo , Robbie Hudec , Brian Kirk | In recent years the topic of mobility has received its fair share of the spotlight. ... | |
Get Them Talking – What The Business Really Thinks About Security | Debbie Alford , Lynda Fleury , Timothy Phillips | As information security programs mature in the enterprise, the CISO function is evolving, too. Once ... | |
Tales from the Front Lines – Actionable Strategies for an Intelligence-Driven Security Program | Dave Martin | Security programs must evolve with the times. What new challenges are impacting the security status ... | |
Find Them, Build Them, Keep Them – A Best Practice for Growing Talent Internally | Kyle Duke , Eric Kuhl | Like many executives, Kyle Duke was suspicious of hiring recent grads. He needed experienced professionals ... | |
Detecting and Responding to Advanced Threats | Christopher Bullock , Wesley Snell Jr. , Dave Scholtz | Today’s threat landscape is so complex and dynamic, traditional prevention controls can’t keep pace. Traditional ... |