SeattleCISOExecutiveSummitQ2 2019 June 26, 2019 to June 26, 2019, Seattle, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Art of Innovation — Creativity at Work Noah Scalin N/A
Security Orchestration Automation — Hours to Minutes Zeke Ross In a hyper-connected world, incident response at machine speed and enterprise scale are now required ...
Digital Transformation and Blockchain are More Important Than Ever Pritam Parvatkar As numerous organizations have seen, digital transformation isn’t a technology trend – it’s a customer ...
Aligning Cloud Strategy to Achieve Digital Transformation B.j. Weaver Today, companies have migrated only about 20% of their workloads to the Cloud. How are ...
Tapping the Power of Security Data Bob Grant How does a security leader find insight in the constantly growing volumes of data coming ...
The Strategy Behind the Business Tamara Barr , Sue Wernli ITs growing voice across the business is influencing revenue channels, organizational processes, defining and restructuring ...
How to Keep Good Software from Behaving Badly David Damato As security teams mature, attackers are adapting their tradecraft to avoid detection. The most alarming ...
Evolution of an Integrated Cybersecurity Office – A CIO-CISO Perspective Ronald Melvin The hyper-growth of IoT across the enterprise is forcing leaders to reassess how they secure ...
Modern Approaches to Protecting Your Third-Party Ecosystem Jeff Person N/A
Diversify Defense — Improving Cybersecurity Through Smart Consolidation John Matthews The rush to innovate has resulted in more sophisticated threat defenses, but it has also ...
Mind the Gap – Overcoming the Talent Crunch Kelli Nellams The expanding technology and threat landscape has led to increased demand for top talent. This ...
Protecting Your VIPs, and Your VAPs (Very Attacked People) Too David Melnick For years, we’ve seen attackers target organizations via their people. Now with fewer reliable exploits ...
Driving Smart Automation for Business Results Saad Richard The role of IT is shifting from a traditional focus responding to technical issues to ...
Maintaining Efficiency in the Secure Enterprise Rich Kellen , William Nather What tactics and technologies are effective in securing the enterprise without putting up barriers to ...
Cybersecurity Partnership — Government and Industry Daniel Kroese The National Risk Management Center was established in 2018 as something unique in the federal ...
Resolve and Evolve – Machine Learning for Threat Protection Dena Bauckman As email threats become more advanced, machine learning is being used to detect the daily ...
Connecting With Customers in the Digital Ecosystem Laurent Rotival Not long ago, the flow of technological innovation ran from the enterprise to the consumer, ...
The Changing Landscape of Endpoint Cybersecurity Ronald Cochran The connected endpoint landscape continues to evolve, introducing increased business productivity, data, analytics and improved ...
The Digital Experiment Irwan Tjan How can a 120-year-old retail survive in a digital economy? In a fast-moving climate, organizations ...