CISOcincinnati 2015 June 8, 2015 to June 8, 2015, Cincinatti,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Think Epic, Be Epic – How to be a Disruptive Hero Bill Jensen Disruptions in technology represent both the future and the biggest challenges for today’s CISOs. Bill ...
The Sleep-Easy Guide to Information Security Leo Cronin You don’t have the time. You don’t have the resources. Let’s face it, your organization ...
Getting Ahead of the Threat Corey Collins Threat actors are currently very successful in obtaining access to protected systems. However, the FBI ...
Assessing Risk – IAM’s Role in Risk Decision-Making Eric Robinson , Lisa Heckler , Michael Erickson As cloud adoption and mobility transform business, the way security leaders manage system and data ...
Breach Preparedness Helen Patton , Zulfikar Ramzan , Julie Lucas , Eric W. Richardson Recent headlines confirm what CISOs already know: the question is not if, but when an ...
Grow the Talent You Need Samir Sherif Good information security professionals are in short supply in nearly every industry and market across ...
A 20/20 Vision for the 2020 CISO Kevin Mclaughlin , Leo Cronin , Jd Rogers , Vp & Cso The role of the CISO has evolved substantially over the past decade as awareness of ...
Turning Talent Into Productivity (at Last) With the New Employee Value Equation Cy Wakeman Amid the chaos that technology executives face daily, one of the key challenges is managing ...
Mapping the Insider Threat Randy Trzeciak A recent survey conducted by the U.S. Secret Service, the CERT Insider Threat Center, CSO ...
Story Telling With Metrics Dennis Acuna , Talvis Love , Mike Kelley Are your metrics just numbers? Or do they communicate a meaningful message that is clearly ...
Protecting Your Data Across Many Clouds Glenn Cobb This is the first of three concise and compelling 15-minute presentations during this breakout session. ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha This is the second of three concise and compelling 15-minute presentations during this breakout session. ...
Five Best Practices To Secure Data In The Cloud Assaf Rappaport This is the third of three concise and compelling 15-minute presentations during this breakout session. ...
Securing the Big Data Enterprise Flavio Villanustre Few would hesitate to highlight the value that Big Data represents to the future of ...
Don’t Click the Link! Jeffrey Rogers , Michael Rock Are you as inspired by the collective genius of your workforce as you are baffled ...
A New Model for Incident Response Gregory Neal Akers , Douglas Carter , Chris Mcfarland The traditional security model is collapsing. The lack of integrated defenses and deeper security visibility ...