CISOSocal 2013 June 13, 2013 to June 13, 2013, California,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Path to Alignment – The CIO and CISO Relationship Mario Leone , Martin Mazor The relationship between the CIO and CISO is critical to an effective enterprise information security ...
Learning from Cross Industry Collaboration David Lam , Ed Pagett From advanced persistent threats, to cyber security legislation, to managing mobile security in the enterprise ...
Cyber Security Defense– Establishing an Action Plan Matthew Yarbrough Today’s headlines are filled with reports of cyber attacks, breaches and data loss at our ... Security
Building a Secure Perimeter for Today’s MDM Solutions Sean Convery , Tony Lucich , Robert Schlotfelt The standard desktop model is quickly becoming obsolete in today’s “always-on, always connected” workforce. The ...
Starting from Scratch – A CISO’s Journey Jonathan Chow The “N-th Year Itch” is a phenomenon that has been widely documented — whether in ... Security
Private and Public Partnerships – Creating an Effective Strategy Yulin Bingle , Deron Mcelroy "Security breaches are part of the new norm and CISOs must have an actionable plan ...
Data Privacy and Protection – One Size Does Not Fit All Todd Friedman , Andrew Kim , Jim Koenig In today’s information centric business world, protecting your organizations data is the key element of ...
The Threat Landscape – Staying Ahead of Change Marc Maiffret The threat landscape has shifted and what was once a safe place to peruse and ... Security
Security By and For the People Josh Davis When it comes to protecting your organization from security threats, your greatest and most important ... Security
Focusing on Your Data to Change the Information Security Game Lamont Orange CISOs must completely re-think the way they do business by transforming from being reactive and ... Security
Moving Beyond Rhetoric – Protecting Your Network Geoff Aranoff , Marty Simmons The escalation and sophistication of cyberattacks has a lot of security organizations wondering just how ...