CISOnewyork 2015 May 11, 2015 to May 11, 2015, New York,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Clouds of Change Edward G. Amoroso Traditional perimeter defenses have stepwise degraded during the past two decades, resulting in a largely ...
We’ve Been Hacked – And Here Come the Lawyers! Joseph Demarco A steady stream of high-profile breaches and revelations in the news highlight the cybercrime and ...
Phishing for the Foolish – Why Hackers Love Gilligans and Their Best Lures Grant Asplund “When I took office, only high energy physicists had ever heard of what is called ...
Dream Defense – Designing an Ideal Cybersecurity Solution John J. Masserini , Laraine Weglarz , Brian Lozada , Peter B. Lamontagne Imagine you've built the quintessential security solution. What does it entail? Probably, it includes a ...
Preventing Data Loss and Preserving Bottom Line Value Jeffrey Brown , Robert Eggebrecht , Zouhair Guelzim Organizations are on guard when it comes to data security, and rightly so — 2014 ...
Back to the Future – Designing Data-Centric Security Andrew Stravitz CISOs spend a lot time worrying about protecting data, but data doesn’t have to be ...
The Convergence of Insider and Advanced Threats Jason Clark , Jay Leek , Derek Vadala Historically, the insider threat has been undervalued and underestimated, and combating it has been underfunded. ...
Risk Intelligence Befits Resilience Mark Connelly , Timothy Rogers , Siva Vrs With security and risk becoming increasingly frequent board of directors discussions, managing risk within the ...
An Ounce of Prevention Linda Betz With media furies following every major breach, CISOs should step into peers’ shoes to lessen ...
Elevating Security to Innovative Enabler David Cass It’s no longer a breach that kills a CISO’s career, but information security failing to ...
Incident Response – The Law Enforcement Perspective Tate Jarrow Do you know if you've been breached? Does your plan include contact with law enforcement? ...
Security's Age of Enlightenment Amit Yoran Europe’s Middle Ages — sometimes referred to as the Dark Ages — were marked by ...
On Being a CISO – The First 100 Days and Beyond Mark Viola Whether building a cybersecurity program from the ground up or stepping into a role with ...
Is Your Threat Intelligence Data Program Ready for Prime Time? Jeffrey Brown , Ken Westin , Stephen Gilmer As threat actors evade security controls at an alarming rate, how can information security professionals ...
Navigating Third Party and Supply Chain Security Joel Molinoff , Medha Bhalodkar , Avinash Rajeev In today’s diversified IT world, CISOs are looking to vendors for smarter, more cost-efficient solutions. ...
Redefining Vulnerability Discovery – Beyond Bug Bounty Gus Anagnos Companies increasingly turn to bug bounty initiatives to identify weak points and add value to ...
Is Your DDoS Mitigation Battle Tested? Sahba Kazerooni You wouldn't go to a boxing match without first sparring, so why risk everything implementing ...
Protecting Your Data Across Many Clouds Bob West When users adopt “the cloud,” they actually adopt many clouds. By learning to identify all ...
Eliminate the “Us Versus Them” Mentality Dan Reynolds , Kenneth Corriveau Technology and security teams today are under greater demands to deliver than ever before. Success ...
Mobile Security Strategies in a Post-Breach World Michael T. Raggo , Laura Jagodzinski , Ramin Safai Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...
The Board Needs You Michael Higgins , Michael Rossman , Deborah Snyder , Cindy Cullen After the breach, Institutional Shareholder Services recommended Target shareholders replace seven of 10 board directors ...