CISODetroit 2015 Oct. 21, 2015 to Oct. 21, 2015, detroit,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Presenting to the Board Alissa Johnson The board — words that can send even a veteran CISO into cold sweats. With ...
Always Be Pen Testing Ethan Steiger Dynamic leadership in today’s threat landscape demands a more aggressive approach to cybersecurity. To ensure ...
Opportunities and Risks in an IoT World Brent Cieszynski , Maurice Stebila , Pankil Vyas , Jon Stanford The Internet of Things looms as a great new business opportunity for customers, but also ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
Defensive Intelligence – Leveling the Playing Field Ron Ulko Sites like Facebook, Twitter and Linkedin, and places like Tor and Freenet have enterprises leaking ...
The Power of Collaboration Keith Moss One is the loneliest number, and the most risky. CISOs must come together to leverage ...
Homegrown Security Awareness – Strengthening Your Weakest Link Karla Thomas It seems that behind every major, highly publicized breach, human error has played a major ...
Are You Being Out-Innovated? Grady Summers Organizations spend billions of dollars each year on security technology and services, yet attackers continue ...
Building a Successful Audit Program to Keep Insider Threats at Bay Robert Slocum , Martin Bally , Brad Barton Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
A Data-Driven Approach to Managing a Cybersecurity Crisis Nicole Miller Cybersecurity events can be extremely disorienting and often come as a surprise to executives normally ...
The Changeover Generation – How Gen Z Will Revolutionize the Workplace Melissa Lavigne-delville Generation Z will take a decidedly different approach to work than their millennial counterparts. Nearly ...
The New Security Reality – Protecting Data in a Perimeterless World Mauricio Guerra The recent explosion of cloud, mobile and IoT technologies has rendered the concept of network ...
What Will the Future Workforce Look Like? John Carr Technology’s progression is reshaping the business landscape and completely changing the future workforce’s makeup. John ...
Addressing the Homogenous Elephant in the Room Meredith Phillips There is a striking lack of diversity in security. Meredith Phillips believes that she and ...
Next-Generation Security Metrics Maureen Niemiec Many organizations have started, staffed and subsequently abandoned security metrics programs. Yet, as organizations become ...
Navigating the Cyber Gauntlet Ron Ulko , Grant Harris , Craig Wilder Technology’s exponential growth has CISOs struggling to keep up in the cyberwar. Tasked with securing ...