CISOcharlotte 2015 Nov. 17, 2015 to Nov. 17, 2015, charlotte,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
What Makes the Great Ones Great? Don Yaeger Perhaps no one knows greatness quite like Don Yaeger. As a sports writer and author ...
Reality Based Leadership – Ditch the Drama and Focus on Personal Accountability Nicole Price Take a look at your role through the lens of personal accountability and become a ...
CIO 2.0 – A Glimpse Into the Future Mark Slaga The role of IT in the business has changed dramatically and will only continue to ...
Building a Successful Audit Program to Keep Insider Threats at Bay Brandon Champion , Bob Hansmann Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Vibhuti Sinha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
Security as a Business Enabler Tony Gambacorta Tony Gambacorta shares the latest developments in cybersecurity and how enterprise security can drive an ...
M&As – Leading Through the Many Challenges of Mergers and Acquisitions Christopher Heck , Joshua Jewett When companies grow through acquisition, there are often competing priorities between the business and IT ...
Security Assurance in the Boardroom Matt Alderman Are your security investments optimized and fully deployed? How do you measure security success? Can ...
It's Time to Embrace the Cloud to Secure the Cloud Ben Hall , Gary Howell , Kevin Peterson Traditionally, firms have adopted a “do it yourself” approach to perimeter security, procuring best-of-breed appliances ...
The New Data-Driven Ecosystem – Converging Requirements of Cloud and Big Data Patricia Florissi IT leadership has witnessed a simultaneous transformation of operations — through cloud and application development ...
Down to the Foundation – Lessons Learned from a Complete Security Transformation Scott Frost When he joined the retail giant 18 months ago, Belk CISO Scott Frost was given ...
Cracking the Big Data Analytics Code James Tyo , Dan Faile With the emergence of Hadoop, Spark, NoSQL and other Big Data technologies, the myriad of ...
The Human Nature of Security – Pink Elephants, Power Rangers and the U.S. Marine Corps Kim Jones As security technology and frameworks continue to mature, the security profession still finds itself struggling ...
Blurred Lines Advance IT Ames Flynn , Duke Prestridge , Michael Solberg Building strong and resilient relationships based on trust requires intention, hard work and results. The ...
Sometimes Being Hacked is a Good Thing Chase Cabanillas For the last three years, the top tech talent in the Carolinas have gathered at ...
Bridging the CyberSecurity Talent Divide at Clemson University Kevin Mckenzie Why is it so hard to find the next generation of qualified security professionals? Learn ...