OhioCISOExecutiveSummitQ2 2019 June 25, 2019 to June 25, 2019, Columbus, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Creating a Company of Owners in IT Dr. Daren Martin Business leaders are always hunting for ways to squash culture killers, cultivate a fun business ...
Lessons Learned From an Industrial Digital Transformation David Burns In recent years, GE Aviation embraced the opportunities created by digital technology to change how ...
Securing an Ever Expanding Network of Vendors Marc Moesse Is your organization prepared to handle the additional threat exposure that comes from expanding business ...
Lead, Don’t Follow – Getting Ahead in the Data Game Deval Motka CIOs have endless data at their fingertips, but these leaders understand that leveraging data requires ...
Next-Generation Cloud Security Mike Kelley As organizations increasingly turn to cloud-based services, security leaders face the immense challenge of ensuring ...
When the Customer Holds the Cards Brian Schramm Emerging technologies are reshaping the digital landscape and businesses are exploring new ways to create ...
Doing Everything Right and Still Getting Hacked James Cabe Why do organizations still get breached when they are performing pen tests, auditing networks, following ...
Transforming the IT Value Chain Kiran Fancher As technology continues to be the primary driver of business capability, CIOs have stopped being ...
The Current Privacy Policy Landscape Michael Varner Since the rollout of GDPR, many countries and U.S. states have been developing their own ...
Securing Endpoints Using Analytics and a Proven Framework Loren Roberts As the number of connected devices continues to increase, so does the number of potential ...
DevOps — Scaling Agility Across the Enterprise Guru Vasudeva While the concept of agility has been around for over two decades, organizations now want ...
Cybersecurity as a Strategic Enabler Michael Erickson Business leaders have increasingly high expectations for cybersecurity programs. CIOs and CISOs are expected to ...
Journey to the Cloud — One Size Doesn't Fit All Chris Lett As enterprises continue to use next-gen tools to facilitate digitalization, they must consider how technologies ...
Risky Business — Driving Better Security through Risk Quantification Elias Heckler From justifying ROI of security investments, to prioritizing response based on financial risk and weighing ...
How to Speed up and Scale Your Innovation Efforts Ajay Nair By applying microservices powered by serverless, you can innovate faster, at scale. Ajay Nair shares ...
The Art of Communicating Risk James Wenerstrom When the board struggles to articulate the data they need, determining what information to share ...
Leveraging New Technologies in Healthcare Michael Love With increased pricing and patient demands, it is imperative for IT and security leaders in ...
Developing and Deploying an IAM Governance Program Matt Patton Identity and Access Management (IAM) serves as a foundational piece of the enterprise security puzzle, ...
Navigating the Wake of Data Exploitation Marc Varner Data exploitation has left a deep wake of privacy nightmares, thrusting data protection into the ...