CISOphoenix 2016 Nov. 30, 2016 to Nov. 30, 2016, phoenix,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Case Studies in Institutional Change | Gilbert M. Orrantia | Miami. 1986. The FBI agents were well trained, and the robbery suspects were outnumbered. Agent ... | |
A Pawsitive Transformation | Mike Goodwin | CXOs know that in order to be competitive, organizations must predict customers’ needs before they ... | |
Breaching the Horizon – Building a Culture of Security Awareness | Kim Jones , Jerry Walters , Jason Lish , Jeff Miller | Anyone can do the math. An organization’s risks increase daily at an exponential rate. IT ... | |
Cyber Strategy and Delivery in the New World | Rajat Sen , Nate Smalley | Disruption and an ever-changing security landscape have presented a variety of opportunities and challenges for ... | |
How Hybrid Approaches Are Changing IT Landscapes and Transforming Businesses | Michael Baron , Todd Davis , David Jarvis | According to a recent Gartner survey, 82 percent of CIOs are taking a hybrid IT ... | |
Lockdown – How to Keep Your Important Data Safe in the Cloud | C.j. Radford , Richard Shetina | For IT security, the cloud presents a unique dilemma: How do you embrace the benefits ... | |
Adaptive Architecture | Narayanan Krishnakumar | In the ever-changing world of technology, IT architecture needs to be able to adapt to ... | |
Disrupting Incident Response – Shrinking Detection Times From Weeks to Seconds | Tina Slankas , Jeffrey Coe , Tom Gibb | Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with ... | |
Stop the Breach – Use the Cloud as a Powerful Game Changer in the Fight | Jerry Dixon | Today’s hacktivists, criminals and nation-state adversaries have tremendous advantage over defenders, which manifests daily in ... | |
The Incredible Shrinking Perimeter | Josh Pollock | Learn how a Fortune 50 company leveraged technology to shrink their perimeter, significantly reducing their ... | |
A Resilient Performance | Robert Crossley | When Robert Crossley moved into his new role at Choice Hotels International as VP, IT ... | |
Head in the Cloud, Finger on the Pulse | Marnie Wilking | IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands ... | |
The First 72 Hours | Mike Lettman , Steve Reese , Sig Murphy | The initial signs of a security incident are rarely black and white. The first questions ... | |
Scaling the Villain – How Everyday Criminals Are Expanding the Threat Landscape | Brad Wardman | What do the minds of cyber criminals look like? What choices do they make and ... | |
Defending the Enterprise | Gary Nichols | With data breaches on the rise, leaders such as Gary Nichols, Managing Director of Security ... | |
The Big Migration | Umesh Manathkar | IT leaders are looking up these days — to the cloud that is. But the ... | |
Email Attacks – Prepare Your Defenses | Jason Grovert , Rekha Reddy-sareen , Tyrin Ford | The amount of emails sent around the world each day is nearly unfathomable. One Internet ... | |
Returning Power to the Defender | Vaughn Hazen , Ashish Larivee , Keith Stocks | Advanced attacks have become everyone’s problem. Cyber criminals have greatly increased their capabilities and techniques, ... |