CISODetroit 2014 Nov. 12, 2014 to Nov. 12, 2014, Detroit,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Great Minds Think Differently Mark Cornillie Technical challenges come and go, but communication is a perennial issue within IT. It is ...
A Model for Information Sharing Charles Bretz , George Smirnoff Financial services set the standard for formalized best practices in information sharing and risk mitigation ...
Beyond Shadow IT – Enabling and Accelerating the Adoption of Cloud Services Kamal Shah , George Goble Shadow IT is a real and growing concern for enterprises, and for the right reasons. ...
Executing the Intelligence-Driven Security Vision Matthew Mccormack It is clear from just a cursory review of daily cyber breach news announcements that ...
Be Careful What You Wish For Ethan Steiger , Meredith Phillips , Mahmood Sher-jan Not so long ago, information security leaders had to convince their board that security mattered. ...
Developing a Risk Culture Renee Guttmann With information security attacks becoming more sophisticated by the day, it has become increasingly difficult ...
Taking Down a Fraud Ring Jeff Kearney Jeff Kearney shares the story of an auto-finance fraud ring that plagued the financial sector ...
Insights from GE’s Cyber Security Fusion Center David Trollman GE’s state-of the-art Cyber Security Fusion Center is a national hub for collecting and sharing ...
Aligning Threat Intelligence with Business Risk Stephanie Scheuermann Over the last year, Stephanie Scheuermann has been building a cyberthreat capability that aligns intelligence ...
Data Across Borders Karla Thomas , Russ Gordon , Brent Cieszynski International organizations with distributed technologies across the globe encounter new sets of security and privacy ...
Not Without My Signature – Assessing (and Reassessing) Every Vendor Tonya Byers When a member of Blue Cross Blue Shield found their sensitive data on the Internet, ...
Demystifying Data Loss Prevention in a Connected World Archit Lohokare , Rich Armour , Martin Bally Reputation-damaging headlines on the latest data breaches are making the news everyday. Meanwhile, mainstream adoption ...