CISOhouston 2015 Dec. 8, 2015 to Dec. 8, 2015, houston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Balancing the Risks and Rewards of Information Governance Charles Layton A growing concern for privacy protection and the proliferation of both internal and external risks ...
The Human Element of Information Security Nikk Gilbert , Scott Gréaux The human element is one of the most critical vulnerabilities for security professionals, and often ...
The Panic Button – Persistent Threats and What Happens Next Stuart Wagner , Josh Applebaum You get the call at 2:00am. There has been a security incident. Do you have ...
Building a Successful Audit Program to Keep Insider Threats at Bay Bob Hansmann , Julie Boehl Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
IAM in the Digital Age Catharina Budiharto Effective identity access management can be a convoluted process in today’s digital age. Cloud and ...
The Modern CISO – A New Kind of Hero Glenn Dally With data breach headlines a seeming constant in today’s news, the impetus for corporate leadership ...
Navigating Third Party and Supply Chain Security Robert Shaffer In today’s diversified IT world, CISOs are looking to vendors for smarter, more cost-efficient solutions. ...
Managing Mobile Yunique Demann The human factor will always be one of the biggest threats to security within an ...
Endpoints – Productivity Tools or Security Blindspots? Aric Getman , Lance Mueller Although most organizations do a good job of layering different technologies to secure their data, ...
Orchestrating Effective Data Loss Prevention Programs Mario Chiock , Dale Zabriskie Effective data security isn’t a one man band; it’s a carefully tuned orchestra. CISOs know ...
Cloudy, With a Chance of Breach Mark W. Johnson , Kyong An The evolution of cloud technologies, advanced third-party solutions and software-as-a-service offerings have been steadily transforming ...
The No Trade-Offs Approach to Innovation Mary Dickerson It’s commonly believed that innovation, risk and resources are a triangle of tradeoffs. Sacrificing in ...
Baking a Three-Layer Cake – Multifactor Solutions Unite Anthony Caruso Secure passwords, formidable firewalls, antivirus software, encryption — who could argue the basics? But, sadly, ...
Staying on Top of Vulnerabilities Octavio Herrera The process of finding, assessing and remediating vulnerabilities in a network requires constant vigilance. As ...