CISOphiladelphia 2016 May 23, 2016 to May 23, 2016, philadelphia,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
There Will be Cyberwar | Richard Stiennon | The U.S. and other militaries discovered the power of networking in 1995 and quickly kicked ... | |
In Hot Pursuit – Faster and Smarter Security | Wade Baker | With adversaries moving at the speed of digital, every moment counts. CISOs must create organizational ... | |
Protect and Partner – Paving the Path to Collaborative Innovation | Anahi Santiago , Randy Gaboriault | At Christiana Care Health System, a passion to be the industry gold-standard underpins a commitment ... | |
2016, Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? | Jim Hansen , Chet Davis , Mitchell Brett Parker | 2016 is shaping up to be the year of the ransomware attack. As ransomware and ... | |
Mind the Gap – Overcoming the Security Talent Crunch | Cindy Miceli | The expanding threat landscape has led to increased demand for top cybersecurity talent. This “gap” ... | |
By Data, For Data – Creating Data-centric Security | Cindy Cullen , Stephen Hendrie | In today’s enterprise environment, data is king and can be the difference between success and ... | |
Driving Real Protection – The Operational Integration of Information Security & Global Privacy Programs | Roland Cloutier | In the world of cybersecurity and risk management, the concept of data protection is often ... | |
After the Breach – Incident Response and Your Next Move | Dave Mertz , Anthony Mostak | The mounting sophistication and capability of the cyber threat means that, in spite of the ... | |
Think Your Network is Safe? Check Your Printers | Jason O'keeffe | Where do printers fall in your current endpoint security practices? Most companies invest millions in ... | |
Keeping Insider Threats at Bay: Key Steps to Building a Successful Audit Program | Anahi Santiago , Doug Copley , Michael Ansel | Malicious insiders have the upper hand in many organizations, and IT security staffs can be ... |