CISOsocal 2015 June 23, 2015 to June 23, 2015, California,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The City of Los Angeles Cyber Intrusion Command Center Eileen Decker Recognizing the importance of protecting the city’s vital economic engines and critical infrastructure to be ...
IT Security Through the Eyes of the CEO Bruce Phillips , Patrick F. Stone Security’s role in the organization is constantly evolving. In a period of explosive change and ...
Dynamic Defense for Today’s Digital Business Mike Huckaby Traditional security models are failing. While the idea of a shift from prevention to detection ...
Contextual Awareness and Actionable Intelligence Arthur Lessard , Joshua Douglas Given the recent frenzy of high-profile breaches, security is squarely in the spotlight. The increasing ...
Hand-to-Hand Combat With a Targeted Attacker George Kurtz Targeted attacks and advanced adversaries continue to evolve to become increasingly more sophisticated. George Kurtz, ...
What I Have Learned as CISO – 2 Years & Counting Gary Hayslip Providing Cyber-Security for today’s modern cities with their disparate technologies and data types is not ...
Breaches are a Fact of Life Dan Meacham , Gary Loveland , Jack Miller The shadow of breaches is an everyday reality for today’s CISO. Breach detection and response ...
Employees – Are They Weak Links or Security Assets? Sudhakar Gummadi , Phil Ferraro , Allan Carey , Darrell Jones Are your users more likely to cause or prevent your next data breach? The debate ...
Zurich’s Cybersecurity Journey James Shira James Shira, former CISO and head of technology and architecture at Zurich Insurance Company, knows ...
Turning Security Strategy Inside Out Robert Justus , James Christiansen Historically, the insider threat has been undervalued and underestimated, and combating it has been underfunded. ...
Converged Security Robert Schlotfelt , William Britton Cybersecurity not only poses a problem for our nation’s defensive capabilities, but it also affects ...
Data Lost at Sea Martin Mazor , John Hester , Ken Schar As cloud and mobile technologies disintegrate the perimeter around enterprise data, the traditional firewall approach ...
Offensive Measures Through Tough-Minded Tradecraft Jeff Bardin The deployment of sensors is complete. Content filtering is interrogating encrypted channels. Next generation firewalls ...
CISO Drive and Hijacking Management Ryan Lahti While CISOs and information security leaders get things done, the question is: How do they ...
Communicating Security to the C-Suite Malcolm Harkins , Sol Cates , Jennifer Ramsey As data breaches continue to make waves across the country, many consumers have grown wary ...