CISOVancouver 2014 June 4, 2014 to June 4, 2014, Vancouver,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Privacy Management – In Enterprise We Trust Elizabeth Denham In the era of Edward Snowden’s revelations, consumers are worried about privacy and online surveillance ...
Who Watches the Watchers? CSIS and CSE Oversight Michael Doucet , William Galbraith National security intelligence agencies are subject to strict oversight and scrutiny, but does the existing ...
Humans – The Weakest Link or Your Greatest Security Asset? Jim Hansen Are your users more likely to cause or prevent your next data breach? Industry consensus ...
The Intersection of ERM and GRC Keir Novik , Jason Hinchliff How are enterprise risk management (ERM) and governance, risk management and compliance (GRC) different, and ...
A Step Toward Security Success – Communicate in Plain Terms Jim Attridge , Erin Mcewan , Leo Navin , Gary Perkins Security teams across business sectors face a sizable common challenge — the perception of their ...
Proactive Risk Management – Three Steps to Business Acceptance Martin Kyle As organisational leaders, it’s necessary to rise above the hallmarks of fear, uncertainty and doubt ...
Surviving an Ever-Evolving Threat Landscape Hugh Burley , Rob Labbé , Chris Covell , Greg Brown From high-profile data breaches to advanced malware, the threat landscape continues to broaden while striking ...
Protecting Brand Identity in the Digital Age Marc Varner With recent media-worthy data breaches on the mind of many consumers and legislators, it is ...
Security is No Laughing Matter – Or is It? Chris Johnson Johnny Carson once said, “if you want to get them listening, get them laughing.” Oscar ...
CASL Compliance – Remaining Issues and Questions Tamara Hunter , David Spratley “C-Day” for CASL Compliance is fast approaching. Is your organisation ready? In this session, Tamara ...
Data Integrity – The Unintended Casualty of the Privacy War Baden Smith , David Izzard , Bill Trott With all the hype surrounding privacy over the last decade, many security practices spend the ...