CISOnewyork 2015 Dec. 9, 2015 to Dec. 9, 2015, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Critical Components of a Comprehensive Application Security Strategy Hari Shah , Kunal Anand Enterprise data, and in particular personal identifiable information, is the pot of gold at the ...
Building a Successful Audit Program to Keep Insider Threats at Bay Tatiana Pezzoli , Dan Velez Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
The Panic Button – What’s Next? Marty Leidner , Mike Buratowski You get the call at 2:00am. There has been a security incident. Do you have ...
Hack Me If You Can – The Cyber Attacker's Perspective Mark Viola , Brian Harman IT security must be perfect 100 percent of the time to protect the company — ...
Cloudy, With a Chance of Breach David Cass The evolution of cloud technologies, advanced third-party solutions and software-as-a-service offerings have been steadily transforming ...
Endpoint Security – Is it a Myth? Michael Higgins , Art Hathaway , Daniel Galligan On the Internet, there are only victims and potential victims. Everyone has exposure, from individuals ...
The Mandatory Evolution of Vulnerability Management Richard Moore , John Sekevitch Most organizations couldn’t survive without the Internet. But with so many systems, applications and processes ...
Leveraging the Power of Metrics Kylie Watson Well-executed security metrics initiatives can massively influence many other aspects of a security program. Whether ...
Endpoints – Productivity Tools or Security Blindspots? John Mccaffrey , Geoff Glave Although most organizations do a good job of layering different technologies to secure their data, ...
Access and User Behavior Analytics in Hybrid Environments Laraine Weglarz , Ken Brothers , Craig Cooper Today’s cybersecurity landscape requires a combination of user behavior analytics, identity access intelligence and cloud ...
Countering the Advanced Persistent Threat Josh Goldfarb , Shukri Khader The battle lines have been drawn for a long time, but the bad guys are ...
No More Bullies – Managing Against Cyber Threats on the Digital Landscape Daniel Galligan , Joerg Sieber , Tariq Habib The looming specter of cyber attackers and the vulnerability of organizations exposed by recent high-profile ...
Baking a Three-Layer Cake – Multifactor Solutions Unite Steven Santamorena , Sean Dyon Secure passwords, formidable firewalls, antivirus software, encryption — who could argue the basics? But, sadly, ...
The Need for Network Access Controls Leo Taddeo , Neal Kirschner Thanks to mobile, cloud and virtual technologies, business can now be done from anywhere. Unfortunately, ...
Security Beyond Ambiguity and Anecdote Sean Convery “Are we secure, and are things getting better or worse?” This is a hard question ...
The No Trade-Offs Approach to Innovation Michael Dube , Christopher Hall It’s commonly believed that innovation, risk and resources are a triangle of tradeoffs. Sacrificing in ...