CISOconneticut 2014 Dec. 9, 2014 to Dec. 9, 2014, conneticut,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Fusion of Geopolitical Events and Cybersecurity ‰ÛÒ A Fundamental Change in the Threat Landscape Jim Routh Jim Routh will share his perspective on the adjustment in techniques necessary for the evolving ...
In the Event of an Attack Linda Betz , Martin Mcbride , Timothy Rogers CISOs are on a constant quest to improve the readiness of their organization to handle ...
Security and the Bottom Line ‰ÛÒ Data-Driven Insights for Effective Programs Vijay Viswanathan Information security is no longer an afterthought, it‰Ûªs a crucial component of any business. Ensuring ...
Learning to Accept Disruptive Technologies Nassar Nizami , Karl Schoen-rene , Brian Kelly Disruptive technologies are changing how businesses operate. If security leaders hesitate to implement these technologies ...
CISO Skill Set ‰ÛÒ An Interactive Discussion Greg Alexander The skills needed to be a successful CISO are rapidly changing as many organizations are ...
A CISO's Perspective on an Effective Cybersecurity Program Kostas Georgakopoulos With various levels of funding, tools and workforce, developing a successful cybersecurity program is never ...
Embracing BYOD Jeffrey Brown , Stephen Gilmer , Daniel Sefton The human factor will always be one of the biggest threats to security within an ...
Creating a Championship IT Department Dan Robertson IT leaders tasked with restructuring their departments face unique challenges. Such transformation is a delicate ...
Vendor Risk Management ‰ÛÒ Extending Security Beyond Organizational Boundaries David Bostrom , Benjamin Miron In today‰Ûªs dynamic business environment, organizations increasingly rely on external vendors and third parties to ...
Defense in Depth ‰ÛÒ A New Way to Defend Against Emerging Threats Chad Fulgham Legacy approaches to defending against modern day threats are no longer sufficient to meet today's ...
A CISO‰Ûªs Guide to Cybersecurity - Communicating to the C-Suite Edition Vijay Viswanathan , Timothy Rogers , Greg Alexander Cyber attacks continue to effect American businesses, and consumers have become wary of trusting companies ...
Risk Management ‰ÛÒ It‰Ûªs All About Prioritizing Jeffrey Brown How do you know that your limited budget and resources are focused on the right ...
Taking a Data-Centric Approach to Security in the Cloud Bob West Moving business-critical data into the cloud forces companies to rethink how to provide security, compliance ...
A New Way to Look at IT Security Patrick Crowley Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion ...