CISOPhiladelphia 2015 May 18, 2015 to May 18, 2015, Philadelphia,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Intelligence-Driven Defense and the Cyber Kill Chain Jim Connelly To defeat persistent threats, organizations must identify patterns to group individual attacks, understand adversary supply ...
Mapping the Insider Threat Randy Trzeciak A recent survey conducted by the U.S. Secret Service, the CERT Insider Threat Center, CSO ...
Privacy for Security Leaders David Cass The digital era is globalizing operations and disintegrating parameters around enterprise data, yet privacy regulations ...
Employees – Are They Weak Links or Security Assets? Rohyt Belani , Larry Brandolph Are your users more likely to cause or prevent your next data breach? The debate ...
A Risk-Based Approach to Mergers and Acquisitions Stephen Hendrie Hershey has a long history of mergers and acquisitions, and a relatively new approach to ...
Breach Liability, Vendors and Cyber Insurance, Oh My! Thornton May , Amy Mushahwar Amy Mushahwar is both a CISO and an attorney who councils Fortune 1000 companies through ...
New Strategies for Addressing Emerging Threats and Targeted Attacks Dave Snyder , Mitch Parker , Ron Burkett Today’s unknown malware, "one day wonder" websites and zero-day threats continue to evade even the ...
Figuring Out How to Figure Out What Comes After What Comes Next Thornton May Confederate cavalry raider Nathan Bedford Forest thought he encapsulated the secret of strategy when he ...
Get Them on Board John Kiger John Kiger’s risk assessment resulted in a multiyear, multimillion-dollar cybersecurity investment from the board. He’ll ...
Isolation and Air Gap – Is it Really Possible? Jay Weinstein Gartner claims that isolation, air gap and containment will become common elements of defense-in-depth protection ...
Protecting Your Data Across Many Clouds Bob West When users adopt “the cloud,” they actually adopt many clouds. By learning to identify all ...
Breach Coaching – Contain the Damage Fast Steven Caponi Steven Caponi has seen his share of breaches and advised many executives through their breach ...
Do You Need A New Security Stack? Cathy Beech , Keith Morales , Bobby Guhasarkar The volume of threat intelligence is growing exponentially faster than security stacks are evolving in ...
From the Lab to the Market – Next-Level Security Innovation Michael Pozmantier , Matthew Breiner , Roderick Riensche Government R&D labs have been developing next-generation cybersecurity tools using technologies the open market has ...
Defining Risk Appetite and Aligning Your Strategy David Cass , Kevin Sullivan , Dennis Rayfield It’s hard to implement business-appropriate security controls without a clear understanding of how much risk, ...
Security of Things – The Oncoming Avalanche of Embedded Devices Rohit Sethi The Internet of Things challenges traditional enterprise security. Drawing upon lessons from software security and ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...