CISODallas 2014 Nov. 17, 2014 to Nov. 17, 2014, Dallas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
An Economic Outlook on IT Security Peter Kuper As the number of American enterprises damaged by public breaches mounts, the ardent desire to ...
People, Processes, Technology – A 2014 Retrospective Scott Howitt , Brian Wrozek It’s time to reflect on how individuals, departments and organizations have advanced as 2014 winds ...
Disrupting Incident Response – Shrinking Attack Detection Times From Weeks to Seconds Allan Carey Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ...
New Strategies for Addressing Emerging Threats and Targeted Attacks Parrish Gunnels , Grant Asplund Today’s unknown malware, "one day wonder" websites and zero-day threats continue to evade even the ...
Combating Cyber Threats with Big Data Predictive Analytics Anil Earla The lines between technology and the business are blurring. Increasingly, executives are able to leverage ...
Four Cybersecurity Innovations to Give You Courage Richard Rogers Despite the negative press about the weakness of collective good-guy cyber defenses, there is reason ...
Encryption and Access Control for Cloud and Big Data Environments Alan Kessler , Joseph D'agostino , Mike Schiller Cloud and Big Data present unique dilemmas — embracing the benefits of these new technologies ...
A Fighter Pilot’s Secret to Business Success Jim Murphy In today’s rapidly changing complex environment, organizational agility is imperative to success. During this multimedia ...
Cybersecurity Defense – Establishing an Action Plan Matthew Yarbrough Today’s headlines are filled with reports of cyber attacks, privacy breaches and data loss at ...
Predictive Prescription – Staying Ahead of Advanced Threats Dave Scholtz , Anil Earla , Christopher Mears With new threats emerging daily, security professionals must rely on predictive security analytics to stay ...
Combating Global Threat With Next-Generation Web Security Bill Morrow Government and enterprise perimeters can no longer be defined or protected with traditional security solutions. ...
Winning the War on Data Breaches Billy Austin The security of all personally identifiable information and corporate intellectual property is under constant attack. ...
Mitigating Risk Throughout the Security Development Lifecycle Sahba Kazerooni Incorporating security requirements into overall management processes should be sought out, automated and leveraged wherever ...
Insanity – Cyberspace 3.0 Is Coming James Beeson Bad actors are taking advantage of the ridiculous speed at which major disruption is happening ...
Executing the Intelligence-Driven Security Vision Ben Smith It is clear from just a cursory review of daily cyber breach news announcements that ...
You Can’t Discover a Malware Pandemic by Diagnosing One Patient Brian Engle , Scott Bonneau , Anil Varghese Examining one infected host usually won’t provide enough information to identify a global bacterial or ...