DallasCISOExecutiveSummitQ2 2019 June 24, 2019 to June 24, 2019, Dallas, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Develop an Eye for ROI Jason Kebbeh In this interactive session, CISOs from organizations across the size spectrum will split into small ...
Leading in the C-Suite — Bolster Your Executive Presence Andrew Albrecht , Chuck Tiddy Caught in the crosshairs of leadership and information security, CISOs often are expected to act ...
Think Differently About Data — Succeed at Threat Hunting & IR Tom Roeh Two pillars of a successful and proactive SOC are threat hunting and incident response. The ...
Cyber-Risk Management — New Approaches for Reducing Your Cyber-Exposure Mustapha Kebbeh When it comes to reducing cyber risk, overcoming vulnerability overload is critical. Find out how ...
The Continual Shifting of Threats David Bell , Gary Gasaway Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private ...
You’ve Been Compromised – Now What? Sailaja Styles When an incident happens, things unfold in a frenzy. The board wants to know what ...
Phishing Defense — The Art of Human Intuitive Repulsion Andy Spencer As intuitive human beings we often somehow sense when things aren’t quite right. When a ...
Modernizing Your SOC George Finney , Gary Gulati When it comes to taking your data from you, cyber criminals never rest. If they ...
Dissecting Recent Breaches and Ensuring Cyber Resiliency Alex Horan , Jason Frugé , Jessica Nemmers In April 2019, the Department of Homeland Security issued an alert citing "New Exploits for ...
Forward Focus – Is Your Role Changing? Taren Rodabaugh The notion that the role of the CIO is in constant evolution is nothing new, ...
Cyber Defense in the Age of Retail Digital Fraud Shamoun Siddiqui Retail digital fraud is on the rise. As more and more companies adopt the EMV ...
Cloud Care — Tracking Assets at Your Network Edge Marshall Kuypers The proliferation of cloud technologies has created new classes of risk for organizations. It’s easier ...
Connecting Security, Risk and IT to Enable a Best-in-Class Program Ajay Gupta , Jeff Siegrist The breaches of the past few years continue to show us that organizations are overwhelmed ...
Managing the Convergence of Global Data Regulations Kc Condit , Alex Little Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. ...
Gaining Organizational Acceptance of Access Management Lauren Heyndrickx Introducing a new access management controls to an organization is rife with technological challenges. But ...
Develop Metrics That Influence Business Decision Making Royce Maddimsetty Security leaders are always trying to improve their metrics to better inform organizational decision making. ...
The Zero Trust Approach Bill Edevane , Sonya Barrett Mobile devices and cloud services have dissolved the enterprise IT perimeter. Business data flows freely ...
Coffee Table Talk – How To Partner with Your CHRO and CIO Gregory Ericson , Sonja Leemaster An organization’s security strategy is only as good as the team supporting it.That’s why collaboration ...