CISOsocal 2015 Dec. 7, 2015 to Dec. 7, 2015, california,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Human Element of Information Security William Britton The human element is one of the most critical vulnerabilities for security professionals, and often ...
Leveraging the Power of Metrics Geoff Aranoff Well-executed security metrics initiatives can massively influence many other aspects of a security program. Whether ...
The Modern CISO – A Seat at the C-Suite Table Todd Friedman With data breach headlines a seemingly constant in today’s news, the need for high visibility ...
Locking Out Risk While Letting In Opportunity Mitchell Sherman , Ray Zadjmool Locking the doors may protect the store, but it can also stop customers from coming ...
Partnering With the FBI to Protect the Enterprise Steven Babitch , Emily Ianacone , Erren Lester , Brian Abellera The FBI recently launched an enterprise effort to refine its approach to partnering and collaborating ...
Locking the Door Behind Hackers Marty Simmons , Corey White You’ve just experienced a breach…again. You’re not sure if it’s a backdoor from the last ...
Maximizing the Rewards of Information Governance Stephen Alford A growing concern for privacy protection and the proliferation of both internal and external risks ...
Rapid Cloud Adoption Drives Encrypted Traffic – New Approaches to Breach Preparedness Sasi Murthy Massive shifts in the usage of cloud applications and services are driving dramatic new requirements, ...
An Innovative Approach to Effective Data Loss Prevention Programs Robert Eggebrecht , Juan Martinez Cybersecurity as we know it is broken. The escalating technology arms race forced on many ...
Navigating Third Party and Supply Chain Security Kyong An , Boulton Fernando , Rohit Gupta In today’s diversified IT world, CISOs are looking to vendors for smarter, more cost-efficient solutions. ...
Critical Components of a Comprehensive Application Security Strategy Kunal Anand , Doug Murray Enterprise data, and in particular personal identifiable information, is the pot of gold at the ...
IAM in the Digital Age Chris Webber , Matt Lehman Effective identity access management can be a convoluted process in today’s digital age. Cloud and ...
Preparing and Sharing the Security Road Map Matthew Yarbrough Data governance, security and privacy are the most paramount issues today for the enterprise. A ...
Taking Action – The Risks and Reality of Cybersecurity Andy Kim All organizations place cybersecurity at the top of the priority list, however, translating that priority ...
Countering the Advanced Persistent Threat Martin Mazor , Lynn Strand The battle lines have been drawn for a long time, but the bad guys are ...
Fostering Innovation Through Collaboration Gary Hayslip , Julian Waits Cybersecurity is a team sport, and many in the information security community are committed to ...