CISOminneapolis 2015 June 2, 2015 to June 2, 2015, Minneapolis,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cracking the Code – How Security Leaders Earn Respect Michael Santarcangelo Your challenge isn’t technology. Your opportunity is outstanding IT leadership. Michael Santarcangelo believes the pathway ...
A Fresh Perspective on Forging a Cohesive Security Organization Heather Hanscom Heather Hanscom offers a new perspective on building a team and maintaining a positive security ...
Winning Strategies for Detecting and Defeating Cyberattacks Brian Fitzgerald In today’s world of advanced threats and complex compliance issues, it’s no longer feasible for ...
Mobile Security Strategies in a Post-Breach World Barry Caplin , Brett Belding , Danielle Taylor Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...
Securing the Human Through Education and Awareness Mike Warner Whether it’s calculated or unwitting, humans are the biggest threat to an organization’s cybersecurity. But ...
Cybersecurity and the Legal Reality Eran Kahana The law has a significant impact on how businesses deal with cybersecurity. It drives the ...
Turning the Tables on Adversaries Michael l. Kearn , Shawn Henry , Douglas Degrote Aggressive adversaries are launching successful targeted attacks against public and private sector computer systems with ...
There Will Be Cyberwar Richard Stiennon Chief Research Analyst & Author "There Will Be Cyberwar" The U.S. and other militaries discovered ...
Square One – Skillful Communication with Stakeholders Jim O'conner In today’s breach-obsessed climate, it’s easy for CISOs to feel isolated, even as everyone seems ...
Disrupting Incident Response – Shrinking Attack Detection Times From Weeks to Seconds Allan Carey Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ...
Operational Strategies for Intelligence-Driven Security Paul Hershberger , Jim Stephani , Blake Huebner As threat intelligence becomes more prevalent in the solution marketplace, too many security professionals dismiss ...
Application Security Can No Longer Be Neglected Kunal Anand For hackers, the pot of gold is enterprise data. Since applications are the easiest way ...
Protecting Your Data Across Many Clouds Dos Dosanjh When users adopt “the cloud,” they actually adopt many clouds. By learning to identify all ...
Is Your DDoS Mitigation Battle Tested? Sahba Kazerooni You wouldn’t go to a boxing match without first sparring, so why risk everything implementing ...
One Company’s Journey Into the Future of Connected Devices Bill Aerts The Internet of Things is slowly trickling into the consciousness of every industry, and CISOs ...
Finding and Implementing the Metrics That Matter Scott Mccoy , Michael Frederick , Betty Holte Building a security metrics program can inform a CISO’s daily decisions and further their ability ...