CISOwashington 2015 Dec. 2, 2015 to Dec. 2, 2015, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Miles to Go Anthony Johnson We’ve all heard the mantra, “you can’t manage what you don’t measure.” In this talk, ...
Achieving Global Network Visibility With Adaptive Network Forensics Jason Tant Network-related incidents are usually first detected using tools other than network forensic capabilities, and the ...
Dynamic Defense for Today’s Digital Business Ben Smith Traditional security models are failing. While the idea of a shift from prevention to detection ...
Plan for a Sprint, Train for a Marathon Colin Kibler , Benjamin Eason , Nishchal Bhalla Relentless cyberattacks have left businesses scrambling to pinpoint system vulnerabilities and flaws before cyber criminals ...
From Prey to Predator Chad Spitters After Target was breached, CISOs across the country re-evaluated their cybersecurity programs. For Chad Spitters, ...
SWOT Analysis of the Digital Ecosystem – Weaknesses and Threats Rick Howard , Sara Hall , Brian Wilkinson In this SWOT analysis boardroom, discussion will focus on the “weaknesses” and “threats” elements of ...
Data Breach Prevention Strategies for Insider Threats Sol Cates , Arlette Hart , Chris Tignor In the past year, household names in retail, healthcare, finance and government have suffered serious, ...
Advancing Leadership, Advancing Impact Susan Kerr Cybersecurity is newsworthy, meaning CISOs are constantly under the microscope. Fulfilling many roles, CISOs are ...
Sleep Like a Log – Securing Your Management Platform Spencer Wilcox When selecting a log management platform, scalability and flexibility are paramount. Additionally, a flexible platform ...
Mobile Security Strategies in a Post-Breach World Joseph Lee , Rodrigo Loureiro , Alexander Romero Recent cyberattacks have plagued organizations across industries. As companies move into the digital age with ...
Identity and Access Governance 2.0 for Cloud, Big Data and Enterprise Sachin Nayyar Reboot IAG by incorporating analytics, integrated controls and risk-based processes. Learn how organizations are embracing ...
The Synack Approach to Exploitation Intelligence Jay Kaplan Security is no longer a feature but a requirement, and this is an opportunity to ...
The Power of Collaboration Anthony Johnson One is the loneliest number, and the most risky. CISOs must come together to leverage ...
SharkSeer Zero Day Net Defense Ronald Nielson In a world of high-profile breaches, the need for better collaboration is apparent. Partnerships among ...
In the Spotlight, What's a CISO to Do? Chris Nims Do you lay awake at night wondering when it’ll be your turn to be in ...
Getting it Right – Discussing the Many Factors of Security Solution Selection Dov Yoran , Jack O'meara , Terry Chapman Selecting the right security vendor requires a CISO to assess countless variables, each as distinct ...