CISOchicago 2015 Dec. 2, 2015 to Dec. 2, 2015, Chicago,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Understanding the Threat Landscape Gregory Touhill Faced with the reality of a “not if, but when” world, IT security experts know ...
Transitioning to Continuous Vendor Risk Management Jacob Olcott Organizations can transform their vendor risk management through monitoring. Discover new insights from ongoing assessments, ...
Detect Today’s Cyberthreats Using a Time Machine Kelly Brazil Threat intelligence improves every day, but are previously undiscovered threats still lurking? If only your ...
The Power of Collaboration Marc Varner One is the loneliest number, and the most risky. CISOs must come together to leverage ...
Hand-to-Hand Combat With a Targeted Attacker Colin Black Targeted attacks and advanced adversaries continue to evolve to become increasingly more sophisticated. George Kurtz, ...
Game of Threats Arlan Mcmillan , Joe Nocera , Jeff Pearl Being breached is no game, but what if you could play one to become a ...
The 90-Day Game Plan Dana Wolf , Jj Markee , Larry Lidz Leading CISOs are always up for the next big challenge, but the ongoing desire to ...
Embedding Risk Management Into the Culture of Business John Germain Embedding Risk Management Into the Culture of Business
Dynamic Defense for Today’s Digital Business Zulfikar Ramzan Traditional security models are failing. While the idea of a shift from prevention to detection ...
Strengthening the Signal Between Boards and CISOs Tim Erlin , Greg Bee , Danny Garza As cybersecurity glows bright in major headlines and across the business, there is more pressure ...
Detect, Contain and Control – Next Generation Threat Protection Stephan Hundley , Mike Pflieger , Justin Haney Trying to fix every vulnerability is an unreasonable goal, but prioritizing mitigation efforts based on ...
It’s Not Your Father’s Security Team Anymore Marc Varner , Stacy Mill , Suzie Smibert , Linsey Rubenstein Look around the room. How many women do you see? While the numbers are slowly ...
The CISO Swami Richard Rushing Making meaningful metrics without understanding your business is like sending an email without an Internet ...
One (Private) Life to Live Todd Fitzgerald , Mary Ellen Callahan , Waqas Akkawi , Jacob Springer Data. Privacy. Governance. Characters, on their own, that may not be as buzz worthy as ...
A New Look at Advanced Threats Joseph Burkard , Paul Bivian , Brian Kenyon Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, ...
United in Defense – Building a World-Class Security Team Steven Young The current fight to protect your corporation is more intense than ever and your team ...
Protecting the Endpoint and Adopting an Adversary-Centric Security Strategy Blake Huebner Targeted attacks continue to become increasingly complex and sophisticated. Adversaries are moving away from malware ...
Employees - Are They Weak Links or Security Assets? Jim Cameli , Rob Olejnicki , Gordon Lawson Are your users more likely to cause or prevent your next data breach? The debate ...