CISOphoenix 2015 Nov. 20, 2015 to Nov. 20, 2015, phoenix,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
High-Flying Leadership for Turbulent Times Michael Mcguire The loss of public confidence in federal agencies due to internal scandals is real. Such ...
Data MBA for CIOs – Moving From Monitoring to Optimization Bill Schmarzo The amount of data collected daily has reached an unprecedented volume, and data sets have ...
Partners in Risk – Transforming the Vendor Relationship Vaughn Hazen , Jim Huddleston , David Jahne , Bill Phelps The complexity of the cyberattack space is fostering an indirect problem: vendor risk. Whether by ...
Hold the Umbrella of Security and Let the Business Pour Mike Lettman , Tina Thorstenson , Michael Moshiri As businesses adopt the cloud to leverage long-term success, thorny issues arise for IT and ...
The Suns Revolve Around the Game Steve Reese A unique merger of departments empowers IT to augment and enhancethe overall fan experienceof the ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
From Chaos to Confidence – Proactively Reducing Cyber Risk Srinivas Mukkamala It’s time to make sense of the nonstop flood of security posture data and threat ...
The Intersection of Agencies and Industry in the City of Cyber Donald Good Deputy Assistant Director Donald Good will discuss the mission of the FBI’s Cyber Division, and ...
Untethered Transformation – Strategies of IT Process Innovation Bryce Peterson , Hari Candadai , Alex Deshuk Technology leaders are consistently challenged to leverage emerging technologies like social, mobile, cloud and Big ...
Security Assurance in the Boardroom Matt Alderman , David Boynton , Todd Redfoot Certainly, the investments made in security products need to safeguard the organization. But are the ...
Needle-in-a-Haystack World Jeff Miller The haystack of data poses a challenge for monitoring and identifying the needle of nefarious ...
The CMO and CIO – Capturing the Customer Bill Halnon , Jon Vander Ark The business world is going through a fundamental change, thanks in large part to the ...
Capitalizing on Cloud and Mobility – Strategies in the Digital Ecosystem Rich Owen , Richard Shetina , Dario Debenedetti Changes are coming to the enterprise regarding how employees collaborate and how technology gives them ...
Rethinking IT Orthodoxy Umesh Manathkar Transformation, change management and aligning strategy all capture elements of the business of IT. This ...
Always Faithful – Targeted Threat Assessments Yield Results Donald Mayo “He who defends everything defends nothing.” — Frederick the Great Borrowing experience from the U.S. ...
Building a Successful Audit Program to Keep Insider Threats at Bay Jason Lish , Jeffrey Coe , Kelly Harward Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...