CISOwashington 2016 Nov. 29, 2016 to Nov. 29, 2016, washington,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Safeguarding FBI Information from Foreign and Domestic Cyberthreats | Arlette Hart | Even with our nation’s top law enforcement resources and privileged cyberthreat information at her fingertips, ... | |
Developing VT-Shaped Talent and Doing Good with Good Data | Rafael Diaz , Linda Oldham | Linda Oldham is developing “minds-on, hands-on” talent and producing actionable data for Rafael Diaz at ... | |
Mind the Gap – Integrating IT and Security | Rob Pickering | Despite the hype and promise behind the latest next generation security technologies, organizations continue to ... | |
Ushering in The Era of Big Data Security Analytics | Chris Tignor , Christopher Porter , Vincent Bodner | Security leaders have accepted the realistic but pessimistic outlook of “it’s not if, but when” ... | |
Beyond the Hype Towards Authentic Enterprise Innovation | Bruce Lee , André Mendes , Kevin Poe | The innovation hype curve has flattened out and all of those start-up playbooks and Silicon-Valley ... | |
Value-Laden Cybersecurity – Partnership and Communication | Vinit Duggal | Step 1: Gain executive buy-in for a security-first approach. Step 2: Create a message and ... | |
The First 72 Hours | Mike Buratowski , Michael Castagna , Chris Lugo | The initial signs of a security incident are rarely black and white. The first questions ... | |
The Talent Pipeline Fuels Innovation and Accelerates Execution | Amy Doherty , Georgette Kiser , Mark Morneau | People are the lifeblood of every function within an organization, but nowhere is this more ... | |
Thriving in the Age of Digital Transformation | Josh Bernstein | The seminal challenge facing all enterprise CIOs is creating the digital DNA needed to compete ... | |
Data Governance Takes a Village | Loretta Ibanez , Jodi Morton | A pillar of the modern enterprise is data. It fuels every function, helping to innovate, ... | |
Activating Human Power | Gordon Lawson , Rodrigo Loureiro , Jeff Lolley | Phishing is well-established as hackers’ top entry method when trying to access corporate networks. Yet, ... | |
Emerging Provider sponsored by: Contrast Security | Arshan Dabirsiaghi | Insecure applications have been the leading cause of breaches over the last eight years. Deep ... | |
Getting Sentimental with Security Analytics | Rob Rachwald | Security teams sit on massive amounts of data — but don't know what to do ... | |
Does That Cloud Look Like a Strategy to You? | Lee Congdon | Opinions and viewpoints on the cloud are as diverse as the shapes of clouds themselves. ... | |
The Jury Is Out on Privacy and Cybersecurity Frameworks | Janine Hiller | Organizations continue to gain a competitive edge and make smarter decisions using enterprise data and ... | |
Managing Cyber Risk – Effective Communication with the Board | David Stender , Brian Wilkinson , Steven Grossman | CISOs are confident in what cybersecurity threat information to present to the board and what ... |