CISOBoston 2012 Nov. 27, 2012 to Nov. 27, 2012, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Other 48 Cyber Sharing for the Rest of Us Jeff Brown When a cyber-attack occurs against 50 companies, two always detect the attack. The other 48 ... Security
The Transformed and Transforming CISO Thornton May Rather than calculating ROIs on security spending, Thornton May believes CISOs should be working to ... Security
Risk Management and Communicating with the BOD Bruce Forman The upsurge in infosec threats is creating an intense focus on CISO leadership in the ... Security
A Call to Arms Bolstering Enterprise Information Security Through Safety in Numbers David Saul , Lee Warren Long before humans walked the earth, animals understood a profound truth that still holds today ...
A Flexible Framework for Effective Risk Management Ron Ross , Thornton May , Candy Alexander CISOs are exploring new and dynamic risk management frameworks to more effectively manage information system-related ...
Global Cyber Resilience The Science and Economies of Security Phyllis Schneck Cyber criminals have a great profit model. Low barriers to entry, large rewards and little ...
Balancing Productivity and Protection Brian Tokuyoshi , Mark Olson You are invited to join CISO discussion leader Mark Olson and moderator Brian Tokuyoshi in ...
Big Data Opportunity or Vulnerability? Jason Clark , John Mccormack Nothing gets the security industry in a frenzy like a good buzzword, and Big Data ...
Securely Enabling Mobility and BYOD Across the Enterprise Denny Dean , Chauncey Holden , Patricia Enfanto As the new world of handheld, connected technologies continues to offer increasingly limitless business capabilities, ...
Enabling Your Business to Safely, Swiftly and Securely Use Cloud Rob Cryan , Punit Minocha "As a growing number of enterprises adopt cloud to improve business productivity, CISOs have to ...