CISOnewyork 2016 May 23, 2016 to May 23, 2016, ny,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Lessons Learned in the New Era of Security Chris Inglis As deputy director of the U.S. National Security Agency at the time of the country’s ...
Application Self-Protection – Revolutionizing Application Security Jeff Williams Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches ...
Behaving Badly – Analyzing Insider Threats Kurt Stammberger Learn how to end insider threats with a new generation of autonomous, rule-free user behavior ...
In Hot Pursuit – Faster and Smarter Security Adam Vincent With adversaries moving at the speed of digital, every moment counts. CISOs must create organizational ...
Business Value and Security – No Longer an Either/Or Mark Connelly In today’s business world, information security and risk management are at the nexus of business ...
The First 72 Hours Stephen Gilmer , Mike Buratowski The initial signs of a security incident are rarely black and white. The first questions ...
Security Process Improvement – How to Stop Worrying and Love Maturity Models Ramin Safai , Mark Viola , Gabriel Gumbs There is no shortage of information security maturity models — COBIT, C2M2, Cybersecurity Capability Maturity ...
The Security/Regulation Juggling Act John Mccaffrey , Stephen Gilmer , Jim Connelly While regulatory compliance does not guarantee security, having a strategy around it is still integral ...
Managing Cyber Risk – Effective Communication with the Board David Cass , Marty Leidner , Joe Quigg CISOs are confident in what cybersecurity threat information to present to the board and what ...
Addressing Cybersecurity Challenges With Applied Security Analytics Pat Stack , Brian Contos Data-driven artificial intelligence and unsupervised machine learning can now answer the question that has plagued ...
Game Changing Strategy to Stop the Breach Shawn Henry Today’s hacktivist, criminal and nation-state adversaries have a tremendous asymmetric advantage over defenders that manifests ...
Cyber Risk is Business Risk – Changing the Security Narrative Kylie Watson As the world of cybersecurity grows scarier by the moment, the CISO is becoming an ...
Building a Successful Audit Program to Keep Insider Threats at Bay Mark Goldstein Insider threats encompass more than just the obvious data thief. According to the CERT Insider ...
Securing Your Software Supply Chain Sam King , Glenn Watt , John Whiting Enterprises are increasingly reliant on third-parties to speed innovation. But as recent breaches have shown, ...
Defending Against the Rising Trend of SAP Cyberattacks Mariano Nunez , Zouhair Guelzim , Brendan Conway Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost ...
Beyond IAM – Moving the Needle on User Provisioning and Identity Management John J. Masserini It’s one of the oldest problems in the security industry, and yet, it has few ...
From CISO to CIRO – Evolving Skills for the Future Greig Arnold , Tomas Maldonado , Michael Palmer The past year has seen a tidal shift from infrastructure-based to risk-based security programs. Board ...
2016, Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? Brian Lozada , Allan Carey , Vikrant Arora 2016 is shaping up to be the year of the ransomware attack. As ransomware and ...