CISOpittsburgh 2014 Dec. 2, 2014 to Dec. 2, 2014, Pittsburg,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Transformative Data Strategy for the Future Mike Andrud As many organizations begin to take their first steps toward harnessing the power of advanced ...
Modernizing Advanced Threats Strategy Dave Wainwright So many decisions and details are involved in selecting an effective combination of tools for ...
Times of Change ‰ÛÒ Leading With Commitment and Communication Francois Estellon Transformations are appealing because they can result in enormous returns ‰ÛÓ but ideas and initiatives ...
The CIO and the Reinvention of Work Mark S. Miller Ideas about the where, when and how of work are changing, and one of the ...
Engaging the Next Generation of IT Professionals Denise Sabolcik Many STEM programs focus on internships and capturing the small number of college students who ...
Thank You for Visiting ‰ÛÒ Technology Road Map for an Innovative City Debra Lam In a tech-driven world, superior performance is defined by strong leadership that knows when to ...
Rethinking the Definition of a Breach Tom Prokop Breaches happen ‰ÛÓ it‰Ûªs inevitable. The bad guys will get inside the walls no matter ...
The User, the Enterprise and the Economics of Privacy Alessandro Acquisti There are big advantages to an entire planet of potential customers unknowingly sharing all their ...
Zero to 60 ‰ÛÒ Transforming a Security Program in 12 Months Omar Khawaja The evolution of the security program at Highmark is unquestionably a massive and long-term undertaking, ...
Exploring PITT OHIO‰Ûªs 10-Year Data Journey Scott Sullivan Back in the early 2000s, PITT OHIO, a full-scale transportation provider, began to embrace a ...
Driving the Digital Transformation Michael Everest As the hype around buzzword technologies like social, mobile, cloud and Big Data dies down, ...
Mobile Mania ‰ÛÒ Solving the Riddle of Application Development Andy Santacroce The digital-saturated world is obsessed with constant access and instant results, so it‰Ûªs no surprise ...
On the Origin of Threats and the Evolution of Cyber Response Robert Wagner Cybersecurity as a profession is in constant flux, partly because the cyberthreats themselves change so ...