CISOstlouis 2015 Dec. 1, 2015 to Dec. 1, 2015, st louis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Slap Shot of Leadership Chris Zimmerman As with any sports team, the St. Louis Blues’ ever-present goal is to be the ...
Understanding the Threat Landscape Gregory Touhill Faced with the reality of a “not if, but when” world, IT security experts know ...
Storming Normandy Breach Mark Carney , Eric Hlutke The breach will happen — a cybersecurity reality that calls for equal parts protection and ...
The Forest Do You See? Steven Jensen If cyberattacks are like woodpeckers boring holes into your security, historically, the CISO’s role has ...
Data Breach Prevention Strategies for Insider Threats Derek Tumulak , Mike Gibbons , Rich Noonan In the past year, household names in retail, healthcare, finance and government have suffered serious, ...
Championing a Privacy and Security Culture – From Ambivalence to Buy-In Hudson Harris Now that the wall between privacy and security is crumbling brick by brick, it is ...
Ground Control to Major Tom Karri Bach , Kari Eckelkamp , Chris Kuehl Can you hear me, Major Tom? Can you hear me, Major Tom? Can you… LaunchCode ...
Opportunities and Risks in an IoT World Chris Sawall , Jon Stanford , Justin Mcfarland The Internet of Things looms as a great new business opportunity, but also as a ...
The Leadership in Analytics Joan Pepin Analytical intelligence is a flourishing game-changing technology that will continue to help CISOs stop the ...
The Business of Security Lamont Orange So you’ve cut your teeth on breaches, security solutions and the like — and the ...
See the Enemy, Be the Enemy Dustin Wilcox , Shri Ramachandran , Dan Henke This interactive discussion centers on establishing a clearer understanding of the core problem of current ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Amit Saha Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
Holistic Security – Implement Once, Comply Many John Dimaria Adopting a holistic security approach reduces complexity and cost. Supported by a compelling case study, ...
MDM Rumble in the Jungle Kevin Hardcastle It’s a jungle out there. Kevin Hardcastle took a machete to the tropical stalks of ...