CisoMiami 2015 Dec. 9, 2015 to Dec. 9, 2015, miami,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Sustaining High Performance in Today's New Normal Jon Defriese Is your team thriving or just surviving? As every business becomes a “digital business” there ...
Disrupting the Market With a Disruptive Workforce Jim Mckelvey Companies know there’s a problem — and enterprise organizations are beginning to see it, too. ...
There Is No “I” in Team Gary Eppinger While individuality is something to be celebrated in everyday life, conformity is necessary when bringing ...
Hybrid Clouds Come of Age – Ultimate Agility Thomas Roloff Public cloud providers have raised the bar on delivering IT-as-a-service to the business, and enterprise ...
Mobile – Risk and Reward Gee Chow , Will Perez Mobile computing is not slowing down, and it’s not waiting on governance policies. Consumers are ...
Analytics – The Silver Bullet Raj Datt , Mudit Bajaj Realizing the full potential of analytics could be the silver business bullet, or at least ...
Brick by Brick – Building Next-Generation Security That Thrives Juan Gomez-sanchez Juan Gomez-Sanchez has made it habit to create security programs from the ground up, and ...
Breach point. Breach point. Breach point. William Mendez , Kelly Harward , Connie Barrera Counting your employees can be the same as counting your potential breach points. As the ...
Is Fort Knox Too Secure? Gary Cantrell , Kevin Burns , Jon West , Will Perez Risk and security present a precarious balancing act. How do you assess your organization’s risk ...
A Marriage of Minds Christopher Rogers , Mike Clarkin Like any good marriage, business partners are going to have their share of disagreements. With ...
A Courtship of Rivals – Unifying IT and the Business Brad Dettmer Turning your greatest critic into your greatest advocate is a tall order for anyone, but ...
One Size Does Not Fit All in Security Gary Cantrell , Jon West , Deborah Karcher Taking a one-size-fits-all approach to security can lead to resource inefficiencies and poor availability for ...
Predictive Analytics – Frontiers and the Impossible Sergo Grigalashvili Predictive analytics are no crystal ball, but they can help demystify the future for organizations ...
Defending Against Phishing Attacks – Case Studies and Human Defenses Scott Gréaux Phishing is firmly established as the top entry method for hackers trying to access corporate ...
Internet of Things – Friend or Foe? Raj Datt , Eric Palacio , Timothy Ramsay The Internet of Things opens the door to enormous value-add opportunities, but it also threatens ...