CISOwashington 2014 Nov. 19, 2014 to Nov. 19, 2014, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Partnering for a Secure Transformation Tim Mcknight As CISOs strive to integrate security into business enabling processes, forging partnerships is key. At ...
The FCC’s Cyber Activities and Benefits to Enterprise Networks David Simpson Cyber threats are continuously changing as cyber adversaries exploit weaknesses in our communication networks. These ...
Modern Threat Defense – Hiding in Plain Sight Dave Frymier , Bobby Ford , Colin Kibler With many types of advanced malware creeping through networks almost undetectable, CISOs are working on ...
Social Media – The New Cyber Battleground Chris Cullison Social media is thriving — and it’s becoming a major vulnerability for the enterprise. Chris ...
Promoting Diversity in the Talent Pool Lisa Foreman-jiggetts Women represent a staggeringly low percentage of cybersecurity professionals — and the Women’s Society of ...
A Data-Centric Approach to Cloud Security Bob West Moving business-critical data into the cloud forces companies to rethink how to provide security, compliance ...
Getting Creative With Identity Access Management Frank Aiello After trying for years to invest in identity access management, the security team at The ...
Communicating Enterprise Risk Management to the Board Anthony Johnson , Ron Davis , Jack O'meara , Suzanne Hall Boards are growing increasingly concerned with cybersecurity, and CISOs are responding by using metrics to ...
Into the Unknown – Transitioning Between the Federal and Commercial Sectors Mark Weatherford , Robert F. Lentz , Priscilla Guthrie , Philip Reitinger Today’s intense spotlight on information security creates a great deal of job pressure for CISOs, ...
One Size Does Not Fit All – Harmonizing Mission and Security Richard Hale All organizations must balance risk, cybersecurity and mission — and when mismanaged, this process can ...
Cultivating Security Skills Through Testing, Tools and Training Tim Mathias Over the last five years, Thomson Reuters has built an application security testing program that ...
Executing the Intelligence-Driven Security Vision Brian Fitzgerald It is clear from a cursory review of daily cyber-breach announcements that something is fundamentally ...
Mastering the Regulatory Balancing Act Dan Han , Derek Tumulak , Alissa Johnson Prioritizing information security resources has never been easy, but given the increasing pressures of regulatory ...
Sharing is Caring – Better Security with Open Source Technology Chris Nims Network forensics are critical to understanding the events that comprise a security incident. Intrusion detection ...
Mitigating Risk Throughout the Security Development Lifecycle Rohit Sethi Incorporating security requirements into overall management processes should be sought out, automated and leveraged wherever ...
Making Security a Revenue Center David Stender How can security create revenue? David Stender shares strategies for building a business case, encouraging ...
Defending the Enterprise With Automated Threat Response Paul Nguyen Speed matters. The faster a cyber threat is resolved, the better the outcome. Automated threat ...