CISOSanFrancisco 2014 Dec. 2, 2014 to Dec. 2, 2014, San Francisco,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Active Defense - Strike, Counterstrike or Vigilante Justice? Jeff Bardin Sensitive data flows to cyber criminals, hackers, foreign intelligence services and other adversaries at an ...
Breaking New Ground With Public Cloud Security Indu Kodukula Intuit is reimagining security to host flagship applications in the public cloud. The benefits of ...
Software-Defined Security Bestows Simplicity Carson Sweet Once an over-hyped buzzword, software-defined security is now a high-value strategy seeing adoption by large ...
Vetting Cloud Vendor Security Using VISA Raj Patel When deciding to host sensitive information in the cloud, how can CISOs verify cloud vendors' ...
Executing the Intelligence-Driven Security Vision Grant Geyer It is clear from just a cursory review of daily cyber breach news announcements that ...
The Future of IAM - Who Plus What, When and Where Kathleen Mullin , Mark Stavaski As cloud adoption and mobility transform business, the way security leaders manage system and data ...
Strengthen Resiliency Through Public-Private Partnerships Michele Robinson , Michael Pozmantier , Ulf Lindqvist , Joshua Belk Private enterprise has historically viewed government as an adversary rather than a true ally. But ...
Defense is Critical, but Offense Wins Games Jon Ramsey Let's face it - when it comes to combating ever more sophisticated threats, security professionals ...
New Strategies for Addressing Emerging Threats and Targeted Attacks Krishnan Chellakarai , David Rusting , John Vecchi Today's unknown malware, "one day wonder" websites and zero-day threats continue to evade even the ...
Blueprint for a More Secure Future Keith Krach , Tom Pageler Security's role in the organization is constantly evolving. In a period of explosive change and ...
Integrated, Intelligence-Driven Enterprise Security Architecture Rakesh Radhakrishnan Many of the biggest challenges CISOs face center on alignment. One solution? To create an ...
Moving Forward With the Cybersecurity Framework Matt Doan Although the Cybersecurity Framework is currently voluntary, it is the product of a collaborative effort ...
Navigating Third Party Vendor Assessment Arthur Lessard , Colin Anderson , Shafeeq Banthanavasi Issues such as risk management, cybersecurity and access governance are becoming more critical in the ...
Creating a Positive Security Culture to Attract and Retain Talent Patrick Heim The rapid rise of the information security profession has had an unintended side effect - ...
Compliance and the Rise of Data Breaches Derek Tumulak , Selim Aissi , Tom Borton , Melody Pereira Over the past year, the cadence, size and severity of data breaches worldwide has accelerated, ...
Tips for "The Talk" - Prepping the Board for the Inevitable Breach Grace Crickette , Dave Scholtz , Lou Desorbo CISOs know the reality of today's data breaches, it's no longer a question of "if," ...