CISOPhiladelphia 2013 March 18, 2013 to March 18, 2013, Philadelphia,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Simplifying BYOD | Dave Snyder | With each new smartphone, tablet and laptop entering the marketplace, the clamoring of employees to ... | Security |
Rethinking the Web Application Certification and Accreditation Process | Erik Avakian | Following a series of breaches and subsequent attacks stemming from insecure code, the necessity for ... | Security |
Intelligent IAM – The Next Wave of Identity and Access Security | Kurt Johnson , Ray Hawkins , Randy Nitowski | IAM technologies have historically been used to improve operational efficiency, reduce costs, enforce governance and ... | |
What Are We Missing? Evasive Trends in Malware and Applications | Wade Williamson | Applications of all types, including malware, have become far more sophisticated and capable of traversing ... | Security |
Navigating the Challenging World of BYOD | Lucas Burke , Dave Lingenfelter | Life as we know it — both in and outside of the workplace — is ... | |
Digital Disruptors – Generation D’s Profound Impact on Enterprise Information Security | Ari Lightman | Information security leaders have made great strides in their efforts to become business enablers. They ... | Security |
Information Security Culture – Myth or Fact | Cathy Beech | Even within highly structured organizations, establishing an information security culture has become increasing challenging. Every ... | Security |
Third-Party Vendor Assessments – Accelerating Best Practices and Mitigating Enterprise Risk | Chester Davis | To compete in today’s marketplace, organizations are searching for quicker and less expensive IT applications ... | Security |