CISOchicago 2014 Dec. 3, 2014 to Dec. 3, 2014, Chicago,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The New Battle - Engaging the Modern Cyber Enemy Robert Jamieson , Steve Wenc Sun Tzu once said, ‰ÛÏIf you know the enemy and know yourself, you need not ...
The Sartorial CISO - Look of a Leader Waqas Akkawi The creeping cyber threat means CISOs are being called into their golden age of leadership. ...
Zero to 60 - How to Build a Threat Intelligence Capability Jason Clark , Chris Sawall In the fight for a secure organization, awareness and strategy are critical, but what information, ...
Encryption and Access Control for Cloud and Big Data Environments Alan Kessler , John Johnson Cloud and Big Data present the unique dilemma of embracing the benefits of these new ...
Discover, Protect and Monitor - Security in the New Cloud Ecosystem Bob West Moving business-critical data into the cloud forces companies to rethink how to provide security, compliance ...
Next-Generation Enterprise Mobile Data Security Strategies Adam Ely Learn how Bluebox's next-generation mobile data security solution safeguards corporate data across the device, application ...
Transforming Security - From Preventive to Risk-Based Jasper Ossentjuk What happens when preventive security gets in the way of organizational success? Jasper Ossentjuk shares ...
Executing the Intelligence-Driven Security Vision Brian Fitzgerald It is clear from just a cursory review of daily cyber breach news announcements that ...
The Risk Profile - Behavioral Science and New Tools for Defining the Threatening Insider Steve Wenc , Eric Shaw , Scott Weber Across all industries and all organizations, the most critical element of an enterprise's security is ...
Know Thyself, Mr. CISO, So You Can Know Others Todd Fitzgerald If we all had the same personalities, the world would be a boring place. Fortunately, ...
Understanding the Evolving Cyber Attacker Gregory Neal Akers , Jim Cameli The activities of sophisticated cyber hackers have evolved into a true industry, increasing investment in ...
Digital Dark Ages - CISOs and the New Know Thornton May Every year roughly 153 million Americans go to work in approximately 13 million enterprises. The ...
Once More Unto the Breach Michael Zachman The totality of enterprise security is designed with the breach in mind: the moment of ...
Communicating Enterprise Risk Management to the Board Arlan Mcmillan , Joe Nocera Boards are growing increasingly concerned with cybersecurity, and CISOs are responding by using metrics to ...
Let the Right Ones In John Germain As the days of simple, secure password authentication die their quick death, plentiful opportunities for ...
Security Awareness - How a Data-Driven Strategy Changes Everything Mark Chapman Making users aware of best security practices does not necessarily equate to application. A data-driven ...
A Bridge Across the Enterprise Rob Olejnicki Comprehensive security strategy requires total alignment, from end-user to CEO. To get there, Rob Olejnicki's ...
Security Metrics - Tell the Business a Story without Putting Them to Sleep Edward Marchewka We've all heard the mantra of ‰ÛÏyou can't manage what you don't measure.‰Û In this ...
Third Party Risk Management Kevin Novak , Jasper Ossentjuk , Albert Belman Companies have embraced outsourcing for good reasons ‰ÛÓ cost benefits, specialization of service providers, ability ...
One-Day Wonders - Cyber Threats Hiding in Plain Sight Grant Asplund Of the 660 million new hostnames that get registered in an average 90-day period, 470 ...