CISOHouston 2013 May 1, 2013 to May 1, 2013, Houston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Operating Within the “New Normal” – Managing Cyber Risks Samara Moore As cyber threats become more prevalent, CISOs are faced with the reality that cyber incidents ... Security
Next-Generation Attacks Need Next-Generation Network Security Mario Chiock , Chris King Modern attackers don’t adhere to a single technique — well-funded, highly—skilled attackers use a sophisticated ...
The CISO's Role in Risk Mitigation Robert Shaffer "There are many aspects of business operations that affect the organization's risk posture, making the ... Security
SCADA, DCS and PCN, Oh My: Securing Operational Technology Arthur Conklin Operational technology networks are not quite the same as IT networks, yet securing them is ... Security
Using Big Data and Analytics to Think Like an Attacker Ravi Srinivasan Thinking like an attacker means driving new insights and predictions for detecting, analyzing and remediating ... Security
You’re Only as Strong as Your Response Plan Doug Jacoby , Brian Engle , Derek Rude The threat landscape is ever-changing and may be evolving quicker than any security team can ...
Driving Your Organization’s Security Matthew Harper , Cynthia Soares , Laura Mather As the threat landscape evolves to produce more high-profi le breaches, security concepts that are ...
Information Security as a Business Function Mike Coogan Information security is often viewed, at best, as a necessary evil. In order to truly ... Security
Focusing on Data to Change the Information Security Game Brenda Santos , Lamont Orange CISOs must transform themselves from reactive and infrastructure-focused, to proactive data and risk-centric business leaders. ...
The Threat Landscape – What’s Out There and What’s Next? Angela Haun , Eric Decarlos The number of attacks on cyber networks is growing, making it more important than ever ...
Freedom and Accountability – Establishing a Balance in Your BYOD Policy Ryan Hutson , Jim Guinn Employees appreciate the flexibility of using their personal mobile devices for work related activities; what ...