CISOseattle 2016 May 25, 2016 to May 25, 2016, seattle,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Reimagine the Startup Steve Bock Growing businesses have a lot in common, whether they are 5-year-old startups like Shinola or ...
Set Up to Fail? Sarah Bird Innovation requires risk, and failure can be career ending. The CIO sits at the intersection ...
Be Nimble, Be Quick – Adding IT Value Through Business Agility Anja Canfield-budde , Carlos Melvin , Andi Mann Many boards and executives think of revenue as the key factor in determining what is ...
Simplifying IT to Drive Business Outcomes Jeff Smith In the midst of rapid technological transformation, CIOs must deliver business value to their organizations ...
Managing Cyber Risk – Effective Communication with the Board Benjamin Beberness , Paul Moulton , Tim Bowersock , Steve Poulson CISOs are confident in what cybersecurity threat information to present to the board and what ...
Adapting to a Multigenerational Workforce Tamara Barr , Michael Schutzler , Jeetu Patel As millennials flood the workforce, one of their top demands is a reimagining of their ...
Careers to Contracts – The Changing Role of Work in IT Alex Pettit IT work is experiencing a revolution of changing responsibilities. Work has become less job-focused and ...
Stop the Breach – Use of Cloud as Powerful Game Changer in the Fight Colin Black Today’s hacktivist, criminal and nation-state adversaries have tremendous asymmetric advantage over defenders that manifests itself ...
Collaboration With the Modern Enterprise Ross Piper Technical innovation has precipitated a change in collaboration and the way organizations communicate with their ...
Cost Center or Competitive Advantage – How CXOs Can Unlock the Value of IT Investments Michael Baron , Eugene Kolker , Dave Estlick , Jesus Unzueta Technology leaders have an executive mandate to maximize IT’s value to the business and create ...
Captivating Communication – Engaging Your Audience With Improv Gary Hirsch , Brad Robertson The most effective presentations and conversations are learning experiences crafted to meet the needs of ...
Cybersecurity Due Diligence During Mergers and Acquisitions Shalima Deeljore Shalima Deeljore has overseen the largest portfolio shifts in GE over the past year — ...
The First 72 Hours Darren Challey , Lynne Pizzini , Sig Murphy The initial signs of a security incident are rarely black and white. The first questions ...
2016, Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? Jim Hansen , Earl Lumpkins , Ronald Jimerson 2016 is shaping up to be the year of the ransomware attack. As ransomware and ...
A Continuous Talent Pipeline – The Internship Advantage Chris Van Liew Talent is the lifeblood of every organization, and companies must use every available tool to ...
Head in the Cloud, Finger on the Pulse Agnes Kirk , Amit Saha , Kirk Kelly IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands ...
The Power and Potential of Predictive Analytics Daniel Spurling , Michael B Jones This discussion centers on establishing a clearer understanding of the core problem of current threat ...