CISOToronto 2015 Nov. 16, 2015 to Nov. 16, 2015, Toronto,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Acting in Concert, When All the World’s a Vulnerable Stage Adrian Abramovici The threat environment for organizations has rapidly evolved, facing targeted, business-data oriented attacks from professional ...
Business Continuity Fundamentals, Or How We Learned to Survive the Bomb Michael R. Galin , Cbcp , Mbci & Crisc Security without business continuity is like a bomb shelter without food and water — they’re ...
Exposing Secrets of the Hidden World Raheel Qureshi With cyberthreats on the rise, security is often on the front page in the media ...
The Convergence of Insider and Advanced Threats Stephen Weston , Craig Delmage , Greig Arnold Historically, the insider threat has been undervalued and underestimated, and combating it has been underfunded. ...
Sharing in Solidarity – Working With the Government to Curb Attacks Dave Black , Kent Schramm , Gwen Beauchemin With cyberthreats coming from all angles, security leaders alone can’t impede attacks. There are plethora ...
Security's Age of Enlightenment Brian Fitzgerald Europe’s Middle Ages — sometimes referred to as the Dark Ages — were marked by ...
Risk – Balancing Security With Productivity and IAM’s Role in Risk Decision-Making Bill Evans , Robert Hofstatter , Mugino Saeki As cloud adoption and mobility transform business, the way security leaders manage access to applications ...
The Insider/Outsider Threat – A Personal Account of the Snowden Case Chris Inglis One of the today’s biggest concerns across the cyber threat landscape is the insider threat. ...
Define “Reasonable” – A Snapshot of Security Safeguards Adam Kardash An expanding array of privacy, legal and regulatory risks are arising from cybersecurity threats in ...
Securing Everything in a Future of Insecurity Stewart Wolfe The Internet of Everything is creating unprecedented opportunities to realize dramatically greater value from networked ...
Employees – Weak Links or Security Assets? Jim Hansen , Ana Andreasian , Richard Godsmark Are your users more likely to cause or prevent your next data breach? The debate ...
Risk Management – It’s Not Just Dollars and Cents Tracy Dallaire , Rick Haier How does cybersecurity risk affect the day-to-day operations of an organization? With a practical application ...
Mobile Security Strategies in a Post-Breach World Alan Beveridge , Susan Berezny , James Plouffe Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...