CISOExchangeEast 2019 Aug. 21, 2019 to Aug. 23, 2019, Columbus, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
True Security Partnerships- Speaking the Language of Business and Technology Robert Mahajan Cyber security needs to be aligned with the business with accountability across the organization. Audit, ...
Creating a Culture of Data Security & Privacy Chris Mussell Learn how innovative and dynamic leaders are leading the way by having courageous conversations within ...
Overcoming Security Challenges Created by the Internet of Things David Saklad The sheer number of connected devices continues to grow and with it so do the ...
The Path to Transformation via ML John Schrader Director In this session you will be exposed to lessons learned by QOMPLX on how to ...
The Human Deception Problem: Understanding and Defending Against Social Engineering Attacks Erich Kron The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions ...
Adversary Oriented Security David Mcguire In modern environments, the corporate security program utilizes an increasingly complex inter-relationship of people, processes, ...
Reactive vs Proactive Security – A Balancing Act for CISOs Mark Ramsey Reactive and proactive security methods do not have to be mutually exclusive — we must ...
SOARing above Security Operations’ Biggest Challenges Dennis Shaya N/A
The Industrial Revolution of Penetration Testing Aviv Cohen All the drawbacks of manual penetration testing, cost-efficiency, time, and scope limitations, have now been ...
Cloud AI, Jet Packs and Minority Report Keyboards: Critical Cyber Leadership Priorities and Issues from 2020 to 2025 Brett Mueller The global cyber security market is expected to reach $169 billion by 2020, so how ...
Making the Case for Deception as Practical Cyber Defense Solution N/a Deception is a potentially powerful, but underutilized cyber security technology. Currently, many CISOs evaluating cyber ...
Malware Protection: Staying Ahead of Hackers Douglas Stasko Despite the heavy investment in cybersecurity, protection from never-seen-before cyber threats is still a key ...
How to Better Prepare for Sophisticated Cyber Heists Eran Abramovitz , Michael Phillips , Robert Lautsch , Leo Howell Due to their multi-vector nature, defending against sophisticated cyber heists launched as Advanced Persistent Threats, ...
How Real-Time Asset Intelligence Enables Full Posture Control Ellen Sundra In order to understand the business risk associated with critical systems and applications one needs ...
Security or Revenue? Aligning Security to Business Strategy to Drive Success Courtney Modecki N/A
Cyber Criminals Have an Ally- You Shalabh Mohan Phishing is big business. Threat actors easily craft attacks that impersonate executives, evade the best ...
CMMI® Institute: Building Resilience Through a Risk-Based ‘Cybermaturity’ Approach Doug Grindstaff The CMMI Institute interviewed CISOs/CSOs seekingto identify common themes in the challenges organizations are facing ...
Planning for the Future- The Next-Gen CISO Kirsten Davies It’s no secret that we need more cybersecurity professionals to keep our organizations safe and ...
Zero Trust Access: Five Steps to Securing the Extended Enterprise Zoe Lindsey The perimeter-based security approach of the last century is no longer adequate for securing the ...
Protecting Your VIPs and VAPs (Very Attacked People) in the Cloud Ashan Willy There has been a material shift toward attacks that exploit people, with threat actors tricking ...
Internet Isolation: A Key Requirement for the Modern Security Architecture Garrett Bechler Modern security technologies are unable to protect companies. The industry seems to have accepted that ...
How Programmable Data Security and Governance Addresses Insider Breach and Privacy Threats Doug Wick With the DevSecOps movement, security is moving more and more into the world of application ...
Evaluation Criteria for Cloud Access Security Brokers (CASBs) Les Correia Cloud computing is ubiquitous and forms the foundation for digital transformation to facilitate business change. ...
Women In IT Michele thomas , Kirsten Davies , Jothi Dugar Chief , Stephanie Derdouri When it comes to the lack of women in technology fields, the focus often turns ...
Navigating Budgets and Reducing Risk with Diverse Stakeholders Holly Torres Spending on cybersecurity technologies involves engaging the board of directors and the rest of the ...
The Holistic Integrative Medicine (H.I.M) Approach to Cyber Jothi Dugar Change is inevitable, and one is desperately needed in the complex world of Cyber and ...