CisoMiami 2015 Dec. 9, 2015 to Dec. 9, 2015, miami,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Sustaining High Performance in Today's New Normal | Jon Defriese | Is your team thriving or just surviving? As every business becomes a “digital business” there ... | |
Disrupting the Market With a Disruptive Workforce | Jim Mckelvey | Companies know there’s a problem — and enterprise organizations are beginning to see it, too. ... | |
There Is No “I” in Team | Gary Eppinger | While individuality is something to be celebrated in everyday life, conformity is necessary when bringing ... | |
Hybrid Clouds Come of Age – Ultimate Agility | Thomas Roloff | Public cloud providers have raised the bar on delivering IT-as-a-service to the business, and enterprise ... | |
Mobile – Risk and Reward | Will Perez , Gee Chow | Mobile computing is not slowing down, and it’s not waiting on governance policies. Consumers are ... | |
Analytics – The Silver Bullet | Raj Datt , Mudit Bajaj | Realizing the full potential of analytics could be the silver business bullet, or at least ... | |
Brick by Brick – Building Next-Generation Security That Thrives | Juan Gomez-sanchez | Juan Gomez-Sanchez has made it habit to create security programs from the ground up, and ... | |
Breach point. Breach point. Breach point. | William Mendez , Kelly Harward , Connie Barrera | Counting your employees can be the same as counting your potential breach points. As the ... | |
Is Fort Knox Too Secure? | Gary Cantrell , Kevin Burns , Jon West , Will Perez | Risk and security present a precarious balancing act. How do you assess your organization’s risk ... | |
A Marriage of Minds | Christopher Rogers , Mike Clarkin | Like any good marriage, business partners are going to have their share of disagreements. With ... | |
A Courtship of Rivals – Unifying IT and the Business | Brad Dettmer | Turning your greatest critic into your greatest advocate is a tall order for anyone, but ... | |
One Size Does Not Fit All in Security | Gary Cantrell , Jon West , Deborah Karcher | Taking a one-size-fits-all approach to security can lead to resource inefficiencies and poor availability for ... | |
Predictive Analytics – Frontiers and the Impossible | Sergo Grigalashvili | Predictive analytics are no crystal ball, but they can help demystify the future for organizations ... | |
Defending Against Phishing Attacks – Case Studies and Human Defenses | Scott Gréaux | Phishing is firmly established as the top entry method for hackers trying to access corporate ... | |
Internet of Things – Friend or Foe? | Raj Datt , Eric Palacio , Timothy Ramsay | The Internet of Things opens the door to enormous value-add opportunities, but it also threatens ... |