CISOMinneapolis 2014 June 24, 2014 to June 24, 2014, Minneapolis,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The First Step Toward a High-ROI Cyber Defense Scott Borg Some of the most destructive cyber attacks today go unrecognized for weeks or indefinitely. Meanwhile, ...
Recasting the Security Program as a Business Partner Barry Caplin , Chris Buse , Chris Grillo With challenging budgets, it’s increasingly important for the security organization to build business relationships and ...
Incident Response – How to Overturn Hacker Advantage James Robinson , James Christiansen CISOs have long understood the essential need for a cyber-incident response plan. But what are ...
Before the Security Event Happens Dave Frymier , Patrick Joyce , Jim O'conner Two main drivers of information security today are the consumerization of IT and advanced persistent ...
Is Vendor Management the New Risk Management? Douglas Degrote The complexity of the cyber attack space is fostering an indirect problem: vendor risk. Whether ...
Four Cybersecurity Innovations to Give You Courage Pamela Warren Despite the negative press about the weakness of collective good-guy cyber defenses, there is reason ...
Old Maps No Longer Work – Using Analytics to Evolve Security Strategy Brian Contos , Jason Newman , Anton Towne The last few decades in security have proved that no walls are high enough to ...
Transition to Practice – Next-Level Security Innovation Michael Pozmantier , Glenn Fink , Darby Mitchell Today’s cyberwar is an escalating and rapidly evolving arms race. While government R&D labs have ...
Tales from the Front Lines – Actionable Strategies for an Intelligence-Driven Security Program Dave Martin Security programs must evolve with the times. What new challenges are impacting the security status ...
Speaking to the Business Joe Topinka How can CISOs communicate priorities and sell them to the business? Not just to the ...
Freedom and Accountability – Establishing a Balance in BYOD Policy Michael Mcneil , Paul Hershberger , Tomas Castrejon Employees appreciate the flexibility of using their personal mobile device for work related activities; what ...