CISOboston 2015 Nov. 30, 2015 to Nov. 30, 2015, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Staying Secure in a Global Enterprise Dale Buckner Enterprises expanding into international markets encounter fundamental differences in education, religion, societal interaction, security threats ...
Cyberthreat Sharing – A Core Component of Cybersecurity Mick Costa Adversaries continue to find new techniques and approaches to exploit weaknesses and vulnerabilities in organizations. ...
Plan For a Sprint, Train For a Marathon Sergey Mironov Relentless cyberattacks have left businesses scrambling to pinpoint system vulnerabilities and flaws before cyber criminals ...
Employees – Weak Links or Security Assets? Jim Hansen , Adam Glick , Larry Jarvis Are your users more likely to cause or prevent your next data breach? The debate ...
Privacy by Design for the Connected World Peter Lefkowitz Privacy by Design, which focuses on assuring that products and systems are designed to avoid ...
Defining Risk Appetite and Aligning Your Strategy Paul Davis It’s hard to implement business-appropriate security controls without a clear understanding of how much risk, ...
Detect, Contain, and Control – Next Generation Threat Protection Kevin Burns , John Schramm , Joshua Douglas Trying to fix every vulnerability is an unreasonable goal, but prioritizing mitigation efforts based on ...
Shoring Up Your Cybersecurity Environment Brian Haugli Maximizing cybersecurity in any organization requires having a model tailored to that business’ needs. Having ...
CISO 3.0 – Agile and Leading Change Sumit Sehgal A CISO's role is more than technology implementation and risk management. Understanding sociology, anthropology, workforce ...
Ensuring the Success of Your IAM Project Todd Peterson Identity and access management are at the front lines of security. Yet, for all its ...
Data Breach Prevention Strategies for Insider Threats Bruce Forman , Patricia Enfanto , Alan Kessler In the past year, household names in retail, healthcare, finance and government have suffered serious, ...
The Next Wave – Massing the IT Troops Kevin Burns IT leaders everywhere are looking to recruit, develop and retain the right employees. CISOs need ...
The Big Data Approach to Network Security Lorna Koppel , Jeffrey Lemmo With the massive amount of daily traffic traveling through network devices effectively distinguishing a network ...
Transitioning to Continuous Vendor Risk Management Stephen Boyer Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
Wicked Secure: The Synack Approach to Exploitation Intelligence Jay Kaplan Security is no longer a feature but a requirement. This is an opportunity to hear ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...