CISOatlanta 2015 May 12, 2015 to May 12, 2015, Atlanta,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Figuring Out How to Figure Out What Comes After What Comes Next Thornton May Confederate cavalry raider Nathan Bedford Forest thought he encapsulated the secret of strategy when he ...
CISOs Aren’t Firefighters – Creating a Clear Security Strategy Christopher Bullock Getting buy-in from the C-suite can be a daunting task for CISOs trying to demonstrate ...
Cyber Intelligence – Then, Now and Why Joel Garza Where did cyber intelligence originate? Growing out of governmental organizations such as DOD, intelligence, with ...
Create a Breach-Ready Enterprise Mike Whitt , Brian Foster , Robbie Hudec “Breach readiness” is an enterprise-wide concern — no one wants to be the next headline. ...
Attracting and Retaining Talent in a Competitive Marketplace Martin Fisher Locating and keeping high-quality talent in the fierce information security job market creates a dilemma ...
Technology is Simple – Let’s Talk People and Process Charles Sterner Security programs must contain the right mixture of technology, people and process — technology itself ...
Lost in Translation – Helping the Board Crack the Cybersecurity Code Ashley Ferguson , Kyle Waddle , Doug Steelman CISOs often encounter a disconnect when communicating their priorities to senior executives and the board. ...
Leveraging NIST Frameworks to Build Comprehensive Cybersecurity Programs Ron Ross As a result of an executive order by President Obama in 2013, NIST developed a ...
Combining Trust and Innovation to Advance Information Sharing Phyllis Schneck It’s vital for CISOs to have the most accurate and current information to secure networks ...
A 20/20 Vision for the 2020 CISO Thornton May , Will Alexander , Robert Mims As security becomes an organization-wide initiative rather than an exclusive endeavor, the role of the ...
Pre-Emptive Defense – Objective- and Intelligence- Based Systems Tony Ucedavelez When the castle is under siege, don’t protect the farmhouse. Tony UcedaVelez reveals how linear, ...
Compliance Does Not Automatically Equal Security Ozzie Kadiri As Target’s breach — despite PCI compliance — shows, compliance does not automatically equal security. ...
Rethinking Data Protection John Bruggemann Even substantial investments in security systems and applications cannot prevent a breach. John Bruggemann explains ...
Cloud Security Architecture: Building a Software Defined Perimeter Gram Ludlow Building a secure, risk managed network typically involves significant caveats: namely, restrictions on application flexibility, ...
Dynamic Defense for Today’s Digital Business Zulfikar Ramzan Traditional security models are failing. While the idea of a shift from prevention to detection ...
Lessons in Compliance – Notes From Insurance Lynda Fleury , Tim Callahan , Chris Parton Just as the retail sector lends ideas to finance, so too can industries learn lessons ...