CISOSeattle 2015 June 3, 2015 to June 3, 2015, Seattle,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Promoting Innovation – The Huskies’ Way Vikram Jandhyala Establishing a culture of innovation is never an easy task, no matter the industry. A ...
The 60-Second Airline Veresh Sita At Alaska Airlines, we “go beyond” to create extraordinary journeys and memorable customer experiences. Through ...
Disrupting Incident Response – Shrinking Attack Detection Times From Weeks to Seconds Allan Carey Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ...
Piloting and Deploying Data Visualizations at the University of Washington Anja Canfield-budde , Bart Pietrzak The University of Washington is rich with data — data with enormous potential for insight. ...
The Board Needs You Earl Lumpkins , Paul Moulton , Neil Bryden After the breach, Institutional Shareholder Services recommended Target shareholders replace seven of 10 board directors ...
Untethered Transformation – Strategies for IT Process Innovation Michael Baron , Benjamin Beberness , David Edwards , Kirk Kelly Technology leaders are consistently challenged to leverage emerging technologies like social mobile, cloud and Big ...
The Intersection of People, Patients, Security and Privacy Carolyn Barton , Chris Grant The CISO and chief privacy officer must closely align to achieve privacy, security and business ...
Incident Response – How to Give the Advantage to Hackers James Christiansen , Dave Estlick Every CISO understands the essential need for a cyber incident response plan. Successfully managing an ...
Mobile Security Strategies in a Post-Breach World Brett Belding , Kris Kutchera , Chris Van Liew Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...
Discover the New Generation of Data Marklogic , Daniel Spurling , Matt Allen CDOs serve a vital role in setting up the organization to create an environment that ...
IT Transformation – Lessons Learned Jon Peirce The mandate for IT transformation is clear, and data is the key. Even in traditional ...
CISO 101 – Back to Basics Darren Challey With more than 150 travel booking sites in 40 countries and 140 mobile websites in ...
Security of Things – Planning for the oncoming avalanche of embedded devices Rohit Sethi The Internet of Things challenges traditional enterprise security processes. Drawing upon lessons from software security ...
Protecting Your Data Across Many Clouds Dos Dosanjh When users adopt “the cloud,” they actually adopt many clouds. By learning to identify all ...
Compliance and Controls – A Hacker's View Tony Gambacorta Focusing on implemented common controls and protections and their impact on hacker activities, Tony Gambacorta ...
The Scarcity of Security Talent – How Does Technology Fit In? Gregg Braunton , Vanessa Pegueros , Lior Div The increased complexity of the threat landscape has significantly increased the demand for security talent. ...
Let’s Work Together Vanessa Pegueros , Eugene Kolker , Dave Estlick , Jesus Unzueta With three verticals in attendance, this is a unique opportunity to hear from each other ...
The Hackers are Coming – A Midnight Ride With Paul Grabow Paul Grabow Paul Grabow recounts the story of how he and his team injected cybersecurity change and ...
Cyber Intelligence – Then, Now and Why Agnes Kirk , Cris V. Ewell , Joel Garza Where did cyber intelligence originate? Growing out of governmental organizations such as the DOD, intelligence, ...