OhioCISOExecutiveSummitQ2 2019 June 25, 2019 to June 25, 2019, Columbus, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Creating a Company of Owners in IT | Dr. Daren Martin | Business leaders are always hunting for ways to squash culture killers, cultivate a fun business ... | |
Lessons Learned From an Industrial Digital Transformation | David Burns | In recent years, GE Aviation embraced the opportunities created by digital technology to change how ... | |
Securing an Ever Expanding Network of Vendors | Marc Moesse | Is your organization prepared to handle the additional threat exposure that comes from expanding business ... | |
Lead, Don’t Follow – Getting Ahead in the Data Game | Deval Motka | CIOs have endless data at their fingertips, but these leaders understand that leveraging data requires ... | |
Next-Generation Cloud Security | Mike Kelley | As organizations increasingly turn to cloud-based services, security leaders face the immense challenge of ensuring ... | |
When the Customer Holds the Cards | Brian Schramm | Emerging technologies are reshaping the digital landscape and businesses are exploring new ways to create ... | |
Doing Everything Right and Still Getting Hacked | James Cabe | Why do organizations still get breached when they are performing pen tests, auditing networks, following ... | |
Transforming the IT Value Chain | Kiran Fancher | As technology continues to be the primary driver of business capability, CIOs have stopped being ... | |
The Current Privacy Policy Landscape | Michael Varner | Since the rollout of GDPR, many countries and U.S. states have been developing their own ... | |
Securing Endpoints Using Analytics and a Proven Framework | Loren Roberts | As the number of connected devices continues to increase, so does the number of potential ... | |
DevOps — Scaling Agility Across the Enterprise | Guru Vasudeva | While the concept of agility has been around for over two decades, organizations now want ... | |
Cybersecurity as a Strategic Enabler | Michael Erickson | Business leaders have increasingly high expectations for cybersecurity programs. CIOs and CISOs are expected to ... | |
Journey to the Cloud — One Size Doesn't Fit All | Chris Lett | As enterprises continue to use next-gen tools to facilitate digitalization, they must consider how technologies ... | |
Risky Business — Driving Better Security through Risk Quantification | Elias Heckler | From justifying ROI of security investments, to prioritizing response based on financial risk and weighing ... | |
How to Speed up and Scale Your Innovation Efforts | Ajay Nair | By applying microservices powered by serverless, you can innovate faster, at scale. Ajay Nair shares ... | |
The Art of Communicating Risk | James Wenerstrom | When the board struggles to articulate the data they need, determining what information to share ... | |
Leveraging New Technologies in Healthcare | Michael Love | With increased pricing and patient demands, it is imperative for IT and security leaders in ... | |
Developing and Deploying an IAM Governance Program | Matt Patton | Identity and Access Management (IAM) serves as a foundational piece of the enterprise security puzzle, ... | |
Navigating the Wake of Data Exploitation | Marc Varner | Data exploitation has left a deep wake of privacy nightmares, thrusting data protection into the ... |