CISONewYork 2013 May 29, 2013 to May 29, 2013, New York,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The State of the Hack Kevin Mandia During the last 18 years, Kevin Mandia has been on the front lines assisting organizations ... Security
Don’t Let a Good Breach Go to Waste Cathy Rees , Michael Higgins , Jim Butterworth Our ‘always on’ digital culture makes it hard for a breach to go unpublicized — ...
The Future of PCI – Securing Payments in a Changing World Bob Russo The world of PCI is becoming increasingly complicated as disruptive technologies become even more unruly. ... Security
Increasing Complexity in the Cloud – Tackling Regulations and Misconceptions David Cass , Shukri Khader , Dave Anderson Regulations are complicating the cloud environment and the increasing complexity is making it harder to ...
Looking at the Future of Cyber Incident Response Michael Rossman , Mark Connelly , Peter Tran The escalation and sophistication of cyberattacks has a lot of people wondering just how safe ...
Focusing on Your Data to Change the Information Security Game Jason Clark , James Robinson CISOs must completely re-think the way they do business by transforming from being reactive and ...
Balancing Security Against Corporate Culture Dan Reynolds As security professionals, we are tasked with safeguarding our company. We should approach security so ... Security
Enterprise Mobile Security – The Future of MDM Joel Molinoff , Anthony Basile Security professionals still face limitations in allowing devices, either personal or corporate, to connect to ...
Maturity Security Profiles – Third Party Vendors and Protecting the Integrity of Your Organization Jonathan Bransky , Roy Post , Mark Lobel Security professionals are juggling an ever increasing number of service providers. Selecting the optimum vendors ...
Learning from the Frontlines – From Past to Present Pamela Fusco , Robert Bigman , Stephen r. Katz , Randolph Smith The world of the CISO has changed drastically in the past five years. Partnering with ...
Thinking BIG – What Every CISO Should Be Planning For Roland Cloutier , V.jay Larosa In this session, Roland Cloutier and V.Jay LaRosa will introduce concepts and operating capabilities, options, ...
Intelligent IAM – the Next Wave of Identity and Access Security Laura Jagodzinski , Chris Sullivan IAM technologies have historically been used to improve operational efficiency, reduce costs, enforce governance and ...
The New Era of CISO – Controversies and Opportunities George Antoniou , Thomas Dunbar The Model T is generally regarded as the first automobile affordable enough to open a ...