CISOGlobalExecSummit 2015 Oct. 11, 2015 to Oct. 13, 2015, houston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
It's Our Ship Michael Abrashoff For organizations that seek a deeper understanding of grassroots leadership and want to take those ...
Out of the Shadows and Into the Board’s Spotlight Myrna Soto As boards become more hip to information security, CISOs must respond in kind by being ...
CISOs on the Move Sara Andrews There’s a flurry of movement in the CISO ranks. As executives jump between companies and ...
Safeguarding Critical Assets in the Age of the Mega-Breach Robert Eggebrecht A well-designed security program understands how to prioritize and protect an organization’s critical data assets ...
Tackling Insider Threat Jim Connelly , Stephen Agar , Steven Harvey , Josh Ablett In the past two years, insider threat has taken on an increased level of priority ...
Swimming With Sharks – Detect and Respond or Prevent the Bite? Simon Crosby , Linda Betz , Jim O'conner , Mark Carney If you want to swim with sharks, nerves of steel are not enough. Powerful forces ...
Protecting Your Data Center From the Inside Out Tom Corn , Lou Desorbo , Steve Slawson , John Valente As perimeters disappear and more end users are given greater access to company data, CISOs ...
Agile Security – Using Threat Intelligence to Minimize Attack Surface David Meltzer , Dan Chisum , Tim Callahan , Chet Davis Combating modern cyberattacks requires security strategies that can be adapted to the unique risks facing ...
Bridge the Gap Julien Bellanger Security and developers are out of sync, and the friction between creating and protecting an ...
Awareness Training Ought Not Be Boring Roy Mellinger One-size-fits-all, computer-based training is a major snooze fest. Hear how one IT department collaborated with ...
Mobile Productivity vs. Mobile Risk John Michelsen Perimeters are increasingly fluid as workforces become more mobile and more productive. Explore how enterprises ...
Modern Data Breaches and Their Long-Term Effects Vijay Balasubramaniyan Information acquired in breaches at the IRS, Target and Home Depot resulted in cross-channel and ...
The Power of Peer-to-Peer Collaboration Marc Varner , Tim Callahan , Dave Estlick In this session, CISO Coalition Board Members will provide an inside look at tools and ...
It’s Time for Top-Notch Tabletops Derek Benz Your CEO gets it. Your board gets it. From operations on up — everyone gets ...
Insider Threat 360 – Expert Insight on Protection From Internal Dangers Scott Weber , Steven Harvey , Jamie Herman , Jb Rambaud , Mark Sutton Much cyberthreat talk in the boardroom and the popular press is focused on thwarting external ...
Future Crimes – Everything is Connected, Everyone is Vulnerable Marc Goodman Technology’s exponential advances are creating unimaginable opportunities. Yet, just over the horizon is a tidal ...
Lessons From the Gridiron Jamey Rootes , Marvin Marcell CISOs are sometimes still seen as the newest edition to the executive table. Jamey Rootes ...
A Keynote With Dr. Andy Ozment Andy Ozment How DHS Can Help You NOW! With free bonus: current gov policy state of play
The New Security Mindset Zulfikar Ramzan Guarding perimeters used to be the “in” thing in security, but that approach hasn’t worked ...
Moving From Binary to Behavioral Authentication Kurt Lieber Sophisticated threat actors are concentrating on attacking people through phishing and Man-in-the-Browser attacks, which enable ...
Communication Breakdown Roy Mellinger , Sol Cates , Dave Estlick , Bernie Cowens In order to prioritize a secure organization and maintain consumer confidence, CISOs must communicate the ...
Leveraging the Power of Metrics John Johnson , John Schramm , Keith Moss , Anshuman Seth Well-executed security metrics initiatives can massively influence many other aspects of a security program. Whether ...