CISOHouston 2015 May 27, 2015 to May 27, 2015, Houston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
It’s Time for Top-Notch Tabletops Derek Benz Your CEO gets it. Your board gets it. From operations on up — everyone gets ...
Trust – Testing 1-2-3 Angela Haun , Steve Neiers , David Mcdermitt “Trust is hard to come by. That’s why my circle is small and tight. I’m ...
It’s Time for a Security Wake-Up Call Charles Ross There are two kinds of organizations: Those who’ve been hacked and know it and those ...
Achieving Agility and Resilience in Your Enterprise’s Cyber Incident Response Dan Chisum , William Stewart , Kirk Hein Today, it isn’t a matter of if, but when your company will suffer a cyberattack. ...
Strengthen the Weakest Link – Integrating PCN and IT Cybersecurity Mohit Chanana , Mark Eckert , Richard Byrd Oil and gas firms face unique cybersecurity challenges that impact both safety and security. According ...
Dicing Up the Dark Side – May the Force Be With You Charles Layton While the tide is slowly turning, there is still work to be done for most ...
Cybersecurity Defense – Establishing an Action Plan Matthew Yarbrough Today’s headlines are filled with reports of cyberattacks, privacy breaches and data loss at our ...
Be Heard Renee Guttmann , Mary Dickerson , Aric Getman In 2014, the NACD, in conjunction with AIG and ISA, published guidelines for corporate boards ...
Data Breach Prevention Strategies for Insider Threats Stuart Wagner , Derek Tumulak , Glenn Dally In the past year, household names in retail, healthcare, finance and government have suffered serious, ...
The Future of Authentication Rick Swenson Just say “no” to “know.” In this luminary session, Rick Swenson will share his battle ...
Dynamic Defense for Today’s Digital Business Janet Bishop-levesque Traditional security models are failing. While the idea of a shift from prevention to detection ...
Understanding and Untangling the Complexity of Risk Management Mike Coogan , Muni Chatarpal , Rene Moreda “To manage” means to have control of something, but in the world of cybersecurity and ...
Automate the Hunt Marc Othersen Haystacks are a billion-straw abyss, and examining every straw to identify an attacker puts your ...
Protect Across the Many Clouds William Leichter When users adopt the cloud, they actually adopt many clouds. Learn to identify all the ...
The Threat Still Present Keith Turpin New locks and keys? Check. New security system? Check. Doberman at the door? Check. Intruder ...
Talking Digital Risk and Impact Mario Chiock In the past year and a half, cybersecurity has been a top-of-mind question for executives ...
Prevent, Prepare, Remediate Scott Gainey As the total cost associated with data breaches surges, it is clear that organizations must ...
The Power and Potential of Predictive Analytics Marc Othersen , Kevin Richardson , Meg Diaz Dovetailing off Marc Othersen’s earlier session around establishing an automated threat hunting system, this discussion ...