CISOdenver 2015 June 30, 2015 to June 30, 2015, Denver,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Technology-Driven Impact of Human Will John Fitzgibbons Technology is the second greatest force for progress in history. The first is human will. ...
Taking the Lead Shawn Hunter Referred to as "America's Race," the USA Pro Challenge is the premiere professional cycling race ...
Security of Things – The Oncoming Avalanche of Embedded Devices Rohit Sethi The Internet of Things challenges traditional enterprise security. Drawing upon lessons from software security and ...
Protecting Your Data Across Many Clouds Chenxi Wang When users adopt “the cloud,” they actually adopt many clouds. By learning to identify all ...
Transitioning to Continuous Vendor Risk Management Jacob Olcott Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
Analytics 3.0 at Intermountain Healthcare – A New Era of Quality Care Lee Pierce Intermountain Healthcare has been on a journey for many years to achieve excellence in analytics ...
Mobile Security Strategies in a Post-Breach World Brett Belding , John Everson , Dawn Roth Lindell Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...
It’s a Team Game – Leading Security Through Transformation Sheryl Rose Security is everyone’s responsibility — whether you’re a board member, IT administrator or an accountant. ...
Securing the Organization Yesterday to Make Better Business for Tomorrow Howard Haile , William Brown , Sam Masiello One of the greatest challenges facing organizations today is implementing a successful security program without ...
Discover the New Generation of Data Jim Zetwick , John Ford , Marklogic , Joel Stanley CDOs serve a vital role in setting up the organization to create an environment that ...
Leading Innovation – Empowering Employees to be Curious David Bessen IT people are naturally curious, but it takes a certain kind of leader to create ...
Make the Most of Your Data Tyler Craig A group of visionaries discover new questions they can ask their data to increase revenue. ...
The RITE Tools for Security Jacob Rubin Enabling secure user behavior is a matter of giving people the right tools for the ...
The University of the Future Jim Deters Technology and innovation are a booming business in Denver and they require a constant influx ...
Go Your Own Way Christine Vanderpool Careers don’t come with maps. And if they did, the technology career map would become ...
The Reinvention of IT – Service Creation and Empowerment as an Enterprise Game-Changer Chris Pope As traditional IT duties are replaced by outsourcing, automation and cloud, the role of IT ...
The Board Needs You Adam Towle , Deborah Blyth , Sam Monasteri After the breach, Institutional Shareholder Services recommended Target shareholders replace seven of 10 board directors ...
Transforming FedEx Systems With Modern Technologies and Methodologies Randy Gardner , Rick Olson The use of technology has been at the core of FedEx success over the past ...
Defending Against Phishing Attacks – Case Studies and Human Defenses Jim Hansen Phishing is firmly established as the top entry method for hackers trying to access corporate ...
Best Practices Aren’t Good Enough Marc Feghali , Curtis Elswick , Brett Bradshaw Many companies whose breaches have made headlines maintain well-funded, mature security programs that adhere to ...