CISOminneapolis 2015 Nov. 10, 2015 to Nov. 10, 2015, minneapolis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Building a Successful Audit Program to Keep Insider Threats at Bay Miles Edmundson , Bob Hansmann Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
Navigating Third Party and Supply Chain Security Jon Stanford , Jim Stephani In today’s diversified IT world, CISOs are looking to vendors for smarter, more cost-efficient solutions. ...
IAM in the Digital Age Chris Webber , Kathy Washenberger Effective identity access management can be a convoluted process in today’s digital age. Cloud and ...
The Panic Button – What’s Next? Paul Hershberger You get the call at 2:00am. There has been a security incident. Do you have ...
Orchestrating Effective Data Loss Prevention Programs Mike Johnson Effective data security isn’t a one man band; it’s a carefully tuned orchestra. CISOs know ...
Staying on Top of Vulnerabilities Chris Buse The process of finding, assessing and remediating vulnerabilities in a network requires constant vigilance. As ...
Leveraging the Power of Metrics Becky Macdonald Well-executed security metrics initiatives can massively influence many other aspects of a security program. Whether ...
Balancing the Risks and Rewards of Information Governance Douglas Degrote A growing concern for privacy protection and the proliferation of both internal and external risks ...
No More Bullies – Managing Against Cyber Threats on the Digital Landscape James Carder , Scott Mccoy The looming specter of cyber attackers and the vulnerability of organizations exposed by recent high-profile ...
Countering the Advanced Persistent Threat Michael l. Kearn , John Bloomer The battle lines have been drawn for a long time, but the bad guys are ...
Become a Fraud Management Maestro Heather Hanscom Just as any brimming reservoir will find the crack in its dam, the relentless and ...
The Need for NAC Danielle Taylor Thanks to mobile, cloud and virtual technologies, business can now be done from anywhere. Unfortunately, ...
Mastering the Regulatory Balancing Act Barry Caplin Prioritizing information security resources has never been easy, but given the increasing pressures of regulatory ...
The No Trade-Offs Approach to Innovation Bernie Rominski It’s commonly believed that innovation, risk and resources are a triangle of tradeoffs. Sacrificing in ...
Cloudy, With a Chance of Breach N/a , Matt Keil , Jason Newman The evolution of cloud technologies, advanced third-party solutions and software-as-a-service offerings have been steadily transforming ...
Endpoints – Productivity Tools or Security Blindspots? Lance Mueller , Tony Taylor Although most organizations do a good job of layering different technologies to secure their data, ...