CISOtoronto 2014 Dec. 10, 2014 to Dec. 10, 2014, Toronto,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Resilience Awareness - Fighting Instability, Uncertainty and Turbulence Dan Hefkey Resiliency is essential to the continuity of workplace operations. Most people are well aware of ...
The Value of a Global Information Risk Metrics Program John Schramm Tracking 150 information risk metric KPIs in 24 categories and integrating them with enterprise risk ...
The Importance of Resilient Device Integrity Systems Dennis Meharchand End-point server and client device compromise is a consistent theme in nearly every major security ...
Internal Security Awareness Gamification Raheel Qureshi A novel approach to employee security awareness created 90 percent compliance at Thales. Hear how ...
What Do You Do When "When" Comes? Dan Moor Today's technology abilities bring along new vulnerabilities. A single compromised system can lead to the ...
Surviving an Ever-Evolving Threat Landscape Doug Cooke , Ana Andreasian , Michael Castro From high-profile data breaches to advanced malware, the threat landscape continues to broaden while striking ...
Cloud Security Strategy - A Case Study Lyndon Dubeau Building consensus around a cloud strategy is hard for any organization, and even more so ...
Pillars of Security-Responsible Canadian Enterprises Walid Hejazi Since 2008, the Rotman School of Management and TELUS have surveyed more than 2,500 companies, ...
The Future of IAM - Who Plus What, When and Where Alan Beveridge , Bill Evans As cloud adoption and mobility transform business, the way security leaders manage system and data ...
Delivering on Canada's Cyber Security Strategy Robert Gordon In 2010, the Government of Canada launched its cybersecurity strategy to meet the cyber threat. ...
Mitigate Risks Before Threats Spread Chad Breslin , Richard Livesley Intelligence sharing, guided by technology changes, has evolved rapidly over the past few years. New ...
Executing the Intelligence-Driven Security Vision Peter Tran It is clear from just a cursory review of daily cyber breach news announcements that ...
Modern Threat Defense - Hiding in Plain Sight Dave Frymier , Steve Browning , Saad Majeed With many types of advanced malware creeping through networks almost undetectable, CISOs are working on ...
The Benefits of Public-Private Information Sharing Mario Coutinho In Toronto, what began as a partnership between Toronto Police Services and private enterprise has ...
Beyond Encryption Zaki Abbas , C.j. Radford , William Varma When an outside party owns, controls and manages their infrastructure and computational resources, how can ...
New Strategies for Addressing Emerging Threats and Targeted Attacks Stephen Weston , Deepak Rout , Ron Burkett Today's unknown malware, "one day wonder" websites and zero-day threats continue to evade even the ...