CISOdallas 2015 Dec. 1, 2015 to Dec. 1, 2015, dallas,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Behind the Curtains – Why Common Security Gaps are Still Pervasive in the Enterprise Kevin Beaver Finally, it appears information security is starting to get the attention it deserves. Yet, still, ...
Hand-to-Hand Combat With a Targeted Attacker Colin Black Targeted attacks and advanced adversaries continue to evolve to become increasingly more sophisticated. Colin Black, ...
Securing the IoT Kc Condit The Internet of Things is the latest technology craze; and for good reason — it’s ...
Getting it Right – Discussing the Many Factors of Security Solution Selection Dov Yoran , Jack Key , Scott Bonneau Selecting the right security vendor requires a CISO to assess countless variables, each as distinct ...
The Grim Reality of Security and What We Can Do About It Randy Gainer As a longtime attorney specializing in privacy and data protection, Randy Gainer has seen the ...
Security Analytics – the Future of Information Security Jason Frugé , Sonya Wickel , Rich Bakos Every CISO knows that technology’s rapid ascent is raising the stakes, and as a result, ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Sachin Nayyar Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
Adversarial Alignment – A Hacker’s Perspective Tony Gambacorta Understanding how our adversaries operate and what perspective they bring to our best-laid plans is ...
The Power of Collaboration Sara Andrews One is the loneliest number, and the most risky. CISOs must come together to leverage ...
Security's Age of Enlightenment Zulfikar Ramzan Europe’s Middle Ages — sometimes referred to as the Dark Ages — were marked by ...
Toxic Leadership – How Not to Lead Curt Craig Although they may not always recognize it, most employees have experienced toxic leadership. A toxic ...
Analytics – No Longer a Business Curveball Becky Kimbro , Sarah Stone From ballparks and big business to soccer pitches and politics, the analytics craze has captured ...
Overcoming Shadow IT Eric A. Fisch , Brian Kenyon , Adam Maslow The unprecedented power of cloud applications have opened up amazing new possibilities for IT organizations, ...
From Blocker to Enabler – Rebooting IT Culture Ken Waterman Today’s technology and business landscape faces more security risks than ever before. The same old ...
Driving Business Transformation With Human Capital Strategies Gunjan Aggarwal When the C-suite develops strategy, their workforce needs to be able to understand it in ...
Start With Your People – How to Best Protect Against Insider Threats Joseph D'agostino , Kelly Harward , Alex Nehlebaeff Going beyond simple data theft, controlling insider threats requires more than just managing thumb drives. ...