CISOGlobalSummit 2014 Oct. 27, 2014 to Oct. 28, 2014, New York,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Principles of Leadership for CISOs Rudy Giuliani Mayor Rudy Giuliani sets the stage for the second annual gathering of North America’s most ...
Universal Information Sharing Andy Ozment The need for stronger intelligence sharing networks is driving the formation of ISACs, with the ...
Cybercrime, Espionage and Sabotage – Understanding and Managing Threats Nadav Morag Cybercrime preys fervently on the enterprise with the largest threats stemming from nation-states, criminal syndicates ...
Privacy Matters David Cass The flood of digital opportunities is a double-edged sword to major enterprise. While such advances ...
Partnering for Secure Transformation Tim Mcknight , Jamie Miller , Mark Leary As CISOs strive to integrate security into business enabling processes, forging partnerships is key. At ...
Is Vendor Management the New Risk Management? Douglas Degrote The complexity of the cyber attack space is fostering an indirect problem: vendor risk. Whether ...
Disrupting Incident Response – Shrinking Attack Detection Time from Weeks to Seconds Rohyt Belani Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ...
Adopting International Standards Tim Mcknight Leading the security operation for a multi-national enterprise means dealing with an infoscape of international ...
The Power of Information Inundation – Data as a Force Multiplier Roland Cloutier With the incredible depth that data intelligence provides, CISOs are immersed in strategies to track, ...
The Modern Adversary, Targeted Threats and Endpoint Security Barry Hensley In nearly every major security breach over the past 12 months involving an actor operating ...
Lobbying for Better Regulatory Compliance Michael Nance Compliance puts a great deal of pressure on CISOs who strive to balance regulatory necessity ...
Cyborgs and the Future of Personal Data Amber Case Humanity is now cyborg, existing in a symbiotic relationship between humans and technology. With more ...
Finding a Path Forward in a Conflicted Digital World Arthur W. Coviello The fundamental shift in the use of information technology has jarred organizations into trying to ...
Battling Transnational Cybercrime Roland Cloutier , Eduardo Cabrera The cyber kill chain is a familiar concept to any CISO worthy of their title. ...
Hacking Back – Active Defense and Internet Tough Guys John Strand For thousands of individuals across the globe, hacking is a full-time job. And according to ...
Can the CISO Facilitate Convergence of IT and Physical Security? Michael Wilson , Stephen Gant , Tim Callahan Despite growing interdependencies involving processes and technologies across IT and physical security domains, risk and ...
Follow the Data – Making Security a Strategic Partner to the Business Mark Connelly , Alan Kessler Cloud and Big Data serve to enable the business, but as massive breaches occur more ...
Before the Shot is Fired – Delivering Predictive Security Intelligence Dana Wolf , Greg York A decade ago, firewalls and antivirus software were enough to protect against infiltration, but today’s ...
Advanced Cybercrime Defense – Building a Leading Threat Intelligence Program Dan Chisum , Byron Collie , Bradley Maiorino Like building all forms of intelligence, success demands not only sharp resources, but smart planning ...
Shifting Attitudes on Business Critical Applications (SAP) Security Mariano Nunez , Steven Young Specialized ERP security systems, such as SAP, have become marginalized. Often operationally segregated and overlooked ...
Modern Threat Defense – Hiding in Plain Sight Dave Frymier , Zouhair Guelzim , Jay Weinstein With many types of advanced malware creeping through networks almost undetectable, CISOs are working on ...
Establishing Trust After a Breach Dwayne Melançon , Colin Anderson , John Hibbs While many organizations take preventive methods to reduce the risk of data breaches, even the ...
Securing the Enterprise – The Biggest Bang for Your Buck Simon Crosby , Bromium The rapid adoption of cloud computing and the profound changes in mobility, consumerization and the ...
United in Defense – Building a World-Class Security Team Steven Young The ability of a security organization to defend the corporation resides within the hearts of ...