CISOsanfran 2015 Dec. 7, 2015 to Dec. 7, 2015, san francisco,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Dynamic Defense for Today’s Digital Business Zulfikar Ramzan Traditional security models are failing. While the idea of a shift from prevention to detection ...
Strength in Numbers – Combatting a Common Enemy Colin Anderson , Laura Hamady , Eddie Borrero As competitive as the economy can be, CISOs generally agree that public-private sharing of security ...
Ensuring the Success of Your IAM Project Todd Peterson Identity and access management is at the front lines of security. Yet, for all its ...
Take It to the Cloud – The Evolution of Security Architecture Dan Hubbard , Thomas Borton As enterprise companies evolve their IT stack, traditional security approaches/architectures need to be reconsidered as ...
Hand-to-Hand Combat With a Targeted Attacker George Kurtz Targeted attacks and advanced adversaries continue to evolve to become increasingly more sophisticated. George Kurtz, ...
Foreign Intelligence for a Competitive Advantage Nicholas Shenkin The most effective way to defend against threat actors is to utilize every resource at ...
Start With Your People – How to Best Protect Against Insider Threats Jay Gonzales , Phillip Cantu , Ashok Sankar Managing the insider threat is not just about managing thumb drives since the insider threat ...
Don’t Settle for Crumbs – The Next Level of CISO Leadership Lou Desorbo As cybersecurity has increased in visibility, a leadership skills gap has followed it. What do ...
The First 100 Days – Creating A Roadmap With A Short Runway Tom August What are the key things for a new CISO to consider? As Tom August of ...
Moving Fragmented Security to Business Security Beyond the Perimeter Arpit Joshipura Uncover new ways to prevent breaches, as Arpit Joshipura of Prevoty shares how technologies like ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Abbas Rangwala Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
Strengthening the Signal Between Boards and CISOs Tim Mather , Elizabeth Ireland , Todd Barnum As cybersecurity glows bright in major headlines and across the business, there is more pressure ...
Hatching Unicorns – Insights on How Enterprise Accelerators Are Catalyzing Innovation Ravi Belani What makes companies attractive as prospects to become billion-dollar plus ventures? Ravi Belani, Managing Director ...
Sharing in Solidarity for a Common Defense Justin Somaini , Michael Wilson , Jack Leidecker Information sharing between the private sector and the government is the lifeblood of effective cyberdefense ...
Employees – Are They Weak Links or Security Assets? Vanessa Pegueros , Raj Patel , Tom Gibb Are your users more likely to cause or prevent your next data breach? The debate ...