CISOboston 2014 Nov. 3, 2014 to Nov. 3, 2014, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Personally Identifiable Information – Under the Protection of the U.S. Secret Service Matt O'neill Behind closed doors and in the underbelly of the Internet, the U.S. Secret Service is ...
Phishing in Real Life Quinn Shamblin One of the most effective ways to get around security controls is to simply ask ...
The Future of IAM – Who Plus What, When and Where Eric Robinson As cloud adoption and mobility transform business, the way security leaders manage system and data ...
The Security Stack – 2015–2020 Michael Mcneil , Dana Wolf , Don Anderson As our security solutions are getting more sophisticated, so are the advanced threats that enterprises ...
Decoupled Web Security Architecture Israel Barak Sentrix’s web security architecture is a successor to web application firewalls and DDoS mitigation technologies. ...
Three Branches of Security: Strengthening Posture With Checks and Balances Brian Foster The U.S. Constitution lays out a system of checks and balances to ensure that the ...
Encryption and Access Control for Cloud and Big Data Environments Sol Cates , Brian Betterton Cloud and Big Data present unique dilemmas — embracing the benefits of these new technologies ...
Active Defense – Strike, Counterstrike or Vigilante Justice? Jeff Bardin Sensitive data flows to cyber criminals, hackers, foreign intelligence services and other adversaries at an ...
Executing the Intelligence-Driven Security Vision Dave Martin It is clear from just a cursory review of daily cyber breach news announcements that ...
The CISO's Talent Role in the New World of Work Bruce Morton In the CISO's domain, it has become a maxim that the world is changing at ...
Communicating Security to the C-Suite Joseph Burgoyne , Mark Morrison As data breaches continue to make waves across the country, many consumers have grown wary ...
The Vendor Machine – If Only it was That Easy Bruce Forman , Patricia Enfanto As technology continually evolves, CISOs increasingly rely on outside vendors to keep up with the ...
Security and the Bottom Line – Data-Driven Insights for Effective Programs Vijay Viswanathan Information security is no longer an afterthought; it’s a crucial component of any business. Ensuring ...
Be Positive About Security – The Commercial Benefits of User Freedom Kevin Burns , Tony Faria , Matthew Knutsen Users want and even demand IT freedom, but can often feel stifled by stringent security ...