CSO40 2014 April 2, 2014 to April 3, 2014, Georgia,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Bob Bragdon N/A
Opening Keynote: CyberSecurity - The Executive Order and Defining the Future of Information Security Phil Agcaoili With the Cybersecurity Act still in congressional limbo, President Obama enacted an executive order for ...
Connecting Security to the Business Dwayne Melançon Now that information security is a boardroom topic, how can CISOs show value to their ...
Boxing Outside the Think: Conducting Creative Vulnerability Assessments Roger G. Johnston Argonne National Laboratory is one of the U.S. Department of Energy's largest national labs for ...
Modernizing Security Assessments to Meet the Needs of Organizational and Application Growth Jerry Walters Expansion, regardless of the cause, requires organizations to rethink existing security initiatives. With multiple hospitals ...
Best Practices in Security and Vulnerability Assessment: A Q&A Panel Discussion Roger G. Johnston , Bob Bragdon , Jerry Walters N/A
The Value of Actionable Threat Intelligence Don Gray When security teams understand the threat landscape, they can demonstrate the value of security programs ...
Managing Trade Controls and Compliance with Access Security Tom Rohling Like many global enterprises, GE Aviation must navigate numerous trade controls and regulations, and the ...
Harnessing Security to Drive Business Mark Coderre , Jonathan Swanson Aetna’s global presence is growing, but with growth comes complexity. Each country has its own ...
Compliance in the Global Economy: A Q&A Panel Discussion Bob Bragdon , Tom Rohling , Mark Coderre , Jonathan Swanson N/A
Enabling Secure Mobile and Cloud Collaboration Hormazd Romer Today’s enterprises need to make content available to all employees to access anytime, anywhere, and ...
Improving Security Operations with Cyber Intelligence and Insider Threat Reporting Bob Cheong N/A
Effective Strategies for Improving Risk Awareness Andy Ellis N/A
The Evolution of Information Security Within Organizational Workflows Stephen Gay N/A
Creative Approaches to Vulnerability Assessment Roger G. Johnston N/A
Cybersecurity Threat Management to Protect Customer Data Jack Key N/A
Information Risk Management Karolyn Maloney N/A
Governance and the Importance of Senior Leadership Engagement Gene Oliver , William Lisse N/A
Managing Ecosystem Security Risks: Phishing, Malware and the DNS System as a Whole Andy Steingruebl N/A
International Privacy and Security Challenges for U.S.- Based Organizations Jonathan Swanson , Mark Coderre N/A
Effectively Managing Regional Security Command Center Operations Mike Yong N/A
Security Metrics Aligned with Business Initiatives Elizabeth Ireland Business initiatives often require investments in IT security, yet those investments are not always well-understood ...
Yes to IS – Gaining Consensus on a Comprehensive Budget for Information Security, Risk Management and Compliance Stoddard Manikin Hired to shape a next-generation, five-year information security program for Children’s Healthcare of Atlanta, Stoddard ...
Yes, Better Risk Management is Like Herding Lizards -- But It Can Be Done Andy Ellis Ever watch lizards scatter haphazardly when they are threatened, or when they simply recognize something ...
How Do We Create and Enable Better Risk Management?: A Q&A Panel Discussion Andy Ellis , Bob Bragdon , Stoddard Manikin N/A
Protecting Data in the Post-PC World Jennifer Cheng As the use of tablets and mobile devices has proliferated in enterprises, the issue of ...
Focusing Company Management on Appropriate Risk Mitigation Strategies Greg Bell A key focus today for our boards of directors and senior leadership is “ Cyber ...
Identity and Access Management for the Real World Marc Potter It seems like security, governance and compliance are the hot topics these days, but have ...
Vulnerability Management for the Cloud Andrew Wild Vulnerability management is a critical security control, and while it's generally well understood, cloud computing ...
The Predictive Nature of Security Analytics Charles King Enterprises have plenty to worry about with the rise of APTs, multiple mobile devices latching ...
The Critical Role of Security Maturity to Your Organization’s Future Gary Warzala The concept of security maturity holds the promise to measure security performance to meet critical ...
Security Intelligence as the Next Frontier -- Why It Matters: A Q&A Panel Discussion Bob Bragdon , William Lisse , Charles King , Gary Warzala N/A
Opening Remarks and a Brief Announcement About the Cyber Security School Challenge Joyce Brocaglia , Bob Bragdon The Cyber Security School Challenge is a collaborative outreach program to teach kids how to ...
The Rising Risks of Advanced Persistent Threats and Mobile Computing Aaron Turner Whether employees are commuting locally to the workplace -- or traveling to other regions of ...
Your Data Center is Vulnerable: How Do you Achieve Physical Access Audit and Compliance? Andy Kuchel Data center vulnerabilities come in many forms, including manual, error-prone processes and inadequate authentication. In ...
Building the Trusted Platform Security Infrastructure (TPSI) Program Denise Hucke , Vjay Larosa Three years ago, ADP took a hard look at its security risk and management roadmap, ...
Leveraging the Client Security Management Office Portal (CSMO) Devon Bryan , Phani Dasari When managing the world’s largest software-as-a-service platform, ADP is no stranger to the high volume ...
How to Build Better Security Intelligence: A Q&A Panel Discussion Bob Bragdon , Roland Cloutier , Denise Hucke , Vjay Larosa , Devon Bryan , Phani Dasari N/A
APT Protection Via Data-Centric Security Alan Kessler The APT tornado is getting larger, is gathering speed, and we're all in its path ...
Transforming to a Next-Generation and Business-Enabling Security Organization Jason Clark , James Robinson Today's CISOs must completely re-think the way they do business by transforming from reactive and ...
Driving Security Innovation Through Partnerships Dennis Treece The Massachusetts Port Authority (Massport) is testing a cargo scanning system so powerful and accurate ...
Turning Technology Into A Business Traveler’s Watchdog Richard Gunthner People are a company’s greatest asset, so it follows that companies want and need to ...
Optimizing the Intersection of Physical and Information Security: A Q&A Panel Discussion Bob Bragdon , Dennis Treece , Richard Gunthner N/A
An Effective Cloud Security Assessment Methodology Jack Baker N/A
Best Practices for Building a Successful Security Operations Center Tonya Byers , Angela Williams N/A
The Critical Intersection of Information and Physical Security Richard Gunthner N/A
Reputational Risk Management: Protecting the Brand Through Security and Corporate Communications Team Cooperation Jim Hutton N/A
International Governance, Risk and Compliance James Kidd N/A
Effective Information Risk Management and Security: Enhancing Visibility and Response Jay Leek N/A
Conducting a Global IT General Control Assessment Audrey Mydosh N/A
Modernizing Security for a Digital Native Workforce James Beeson Digital natives – those who were born during or after the introduction of digital technologies ...
The Evolution of Today’s Advanced Threat Actor’s Capabilities and Its Impact on Future Security and Risk Barry Hensley In just 15 minutes, you will learn evolving Threat Actor Tactics, Techniques and Procedures associated ...
How the Cloud is Transforming Enterprise Security to Enable Mobility, Cloud Apps and Social Media Jay Chaudhry As tablets and smartphones outpace PCs as the device of choice in the enterprise, CIOs ...
ID and Access Management: How to Cut Costs, Streamline Processes and Achieve Scalability Wyatt Macmanus Managing user IDs and access controls is a necessity of any reliable information security program. ...
A Security Evolution: Leveraging ID and Access Management for Business Value Stephen Gay , Mccree Lake Identity and access management solutions promise to create more effective security by synchronizing passwords, streamlining ...
The Sure-Fire Way to Privileged ID Management Julia Ford It can take just one privileged ID management misstep to bring down multiple systems, and ...