CISONewYork 2013 May 29, 2013 to May 29, 2013, New York,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The State of the Hack | Kevin Mandia | During the last 18 years, Kevin Mandia has been on the front lines assisting organizations ... | Security |
Don’t Let a Good Breach Go to Waste | Cathy Rees , Michael Higgins , Jim Butterworth | Our ‘always on’ digital culture makes it hard for a breach to go unpublicized — ... | |
The Future of PCI – Securing Payments in a Changing World | Bob Russo | The world of PCI is becoming increasingly complicated as disruptive technologies become even more unruly. ... | Security |
Increasing Complexity in the Cloud – Tackling Regulations and Misconceptions | David Cass , Shukri Khader , Dave Anderson | Regulations are complicating the cloud environment and the increasing complexity is making it harder to ... | |
Looking at the Future of Cyber Incident Response | Michael Rossman , Mark Connelly , Peter Tran | The escalation and sophistication of cyberattacks has a lot of people wondering just how safe ... | |
Focusing on Your Data to Change the Information Security Game | Jason Clark , James Robinson | CISOs must completely re-think the way they do business by transforming from being reactive and ... | |
Balancing Security Against Corporate Culture | Dan Reynolds | As security professionals, we are tasked with safeguarding our company. We should approach security so ... | Security |
Enterprise Mobile Security – The Future of MDM | Joel Molinoff , Anthony Basile | Security professionals still face limitations in allowing devices, either personal or corporate, to connect to ... | |
Maturity Security Profiles – Third Party Vendors and Protecting the Integrity of Your Organization | Jonathan Bransky , Roy Post , Mark Lobel | Security professionals are juggling an ever increasing number of service providers. Selecting the optimum vendors ... | |
Learning from the Frontlines – From Past to Present | Pamela Fusco , Robert Bigman , Stephen r. Katz , Randolph Smith | The world of the CISO has changed drastically in the past five years. Partnering with ... | |
Thinking BIG – What Every CISO Should Be Planning For | Roland Cloutier , V.jay Larosa | In this session, Roland Cloutier and V.Jay LaRosa will introduce concepts and operating capabilities, options, ... | |
Intelligent IAM – the Next Wave of Identity and Access Security | Laura Jagodzinski , Chris Sullivan | IAM technologies have historically been used to improve operational efficiency, reduce costs, enforce governance and ... | |
The New Era of CISO – Controversies and Opportunities | George Antoniou , Thomas Dunbar | The Model T is generally regarded as the first automobile affordable enough to open a ... |