CISOSoCal 2014 May 8, 2014 to May 8, 2014, SouthCalifornia,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Operating Within the “New Normal” – Managing Cyber Risks Samara Moore As cyber threats become more prevalent, CISOs are faced with the reality that cyber incidents ...
Best-in-Class Security Awareness Tom Clark While the technical sophistication of both attackers and defenders continues to mature, human vulnerability remains ...
Attackers, Plateaus and the Future of Information Security Hugh Thompson There has been a major shift in the threat landscape: new actors, different targets, and ...
Discussing the Latest Challenges in Mobile Security Jeff Blair , John Hester , Vittorio Viarengo Today’s mobile society is transforming policies designed to fulfill their operational and employee technology needs. ...
Security Risk Management for the 21st Century Geoff Aranoff , Arthur Lessard , Bently Au , Jason Hicks Today’s enterprise technologies enable organizations to operate in entirely new ways. Focused on enabling work ...
Big Data Meets Security – Operationalizing an Intelligence-Driven Security Program Tim Belcher Big Data and intelligence-driven security are currently touted as the right solution for detecting and ...
Insider Threats – Thwarting Sophisticated Cyber Adversaries and Attacks on Privileged Users Derek Tumulak , Georges De Moura , Sudhakar Gummadi The profile of insider threats is changing. Traditionally, insider risk came from disgruntled or malicious ...
The New Security Paradigm – Best Practices Are Not Enough Phil Ferraro In the wake of more high-profile, broad-scale security breaches, the question being asked around the ...
Transition to Practice – Next-Level Security Innovation Elena Peterson , Michael Pozmantier , Margaret Lospinuso While government R&D labs have been producing next-generation cybersecurity technologies for a while now, few ...
Resurrection of the Data Entry Attack Aaron Higbee Since the 1990s, data entry-based attacks have been utilized to socially engineer credentials from users ...
Navigating Third Party Vendor Assessment Dan Meacham , Todd Friedman , Gary Loveland Issues such as risk management, cybersecurity and access governance are becoming more critical in the ...