CISO Summit

Tactics and best practices for taking on enterprise IT security threats

With the media covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility to protect customer and company data.

A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives must always have this in mind, as well as a host of other evolving concerns, from curbing Bring-Your-Own-Device (BYOD) risk to controlling vulnerable social media data. In order for today's leading enterprises to operate smoothly, information security must be ahead of the hackers and kept abreast of the latest IT security topics and trends.

The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include engaging Keynote Presentations, Thought Leadership sessions, CISO Think Tanks, Analyst Q&As and much more.

We at CDM Media know that in order for you to take time out of the office, it must be time well spent. The CISO Summit agenda offers a balanced schedule that will maximize your time and efforts, providing you with ideas and strategies truly capable of changing business practices.

Subscribe to the CISO Summit newsletter to stay up-to-date on the latest summit news.

 
call_for_speakers
 
Become a delegate

session videos

why_attend

meetings-networking

partners

summit venue

cio podcasts

 

Whitepapers

Fusing Vulnerability Data and Actionable User Intelligence BeyondTrust is an industry leader in vulnerability management and privileged account management. We have close to two decades of experience helping sophisticated organizations protect themselves from cyber attacks.

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion.

IT Security- Fighting the silent threat Kaspersky Lab’s Global IT Risks survey, conducted by research consultancy B2B International, is now in its third year. This survey speaks to IT professionals across the world, looking to understand their attitudes, opinions and beliefs about IT security and its impact on their organization. By doing this, we hope to establish a global benchmark for the industry, to help businesses of all sizes and types gain a broader perspective of IT security thinking.

Box Security More than 100,000 businesses use Box for sharing and accessing their data, and we work continuously to earn their trust. Box invests heavily in the security and resiliency of our data center, software, and our entire business operation. We recognize that security has to be integrated in every phase of product development and daily operations. This paper describes some of the many measures and practices that we implement on a daily basis to ensure the security of your business data.

Carbon Black for Immediate Incident Response: Rapid Response to Advanced Attacks Enterprises are now realizing it is no longer a matter of IF they will get breached, but rather a matter of WHEN they will be breached. Learn more in this Incident Response 2.0 whitepaper.

Executive Content

Box General Overview Manage your content in the cloud by combining the core features of traditional content management with the usability of typical online collaboration software, Box is reinventing how businesses share, manage, and access all of their content with Cloud Content Management.

CSC Infographic - Updated 2014 CSC is a global powerhouse in business and technology transformation. Our people help businesses, governments and communities solve their toughest challenges. Market shifts and technology trends demand fresh thinking. We help clients capitalize on trends and anticipate what’s ahead.

Moving Beyond BYOD to Mobile First: A Three-Step Strategic Approach for CIOs Mobile is changing the way business gets done today. Empowering employees with the tools they need and prefer to accomplish their work in the field or on the road, backed by a rock-solid infrastructure for supporting mobile apps and services, is now considered a competitive edge. Companies that shift to a “mobile first” strategy can improve productivity, customer satisfaction, and time to market, resulting in a dramatic effect on revenue.

CSC CSC offers the WAVE™ so that you can discover the CSC cloud of opportunity™. Using the WAVE, you will be able to identify the opportunities that, when deployed, provide - improved time to value, defense against competitive threats, reduced risk to the client’s mission, potentially lower costs, and freedom to innovate.

Designing an Adaptive Security Architecture to Protect Against  Advanced Threats Today's security threats are more advanced than traditional security solutions. Attacks in malware continue to evolve faster than traditional solutions can block them. What your organization needs is an adaptive security architecture as well as security solutions that fulfill these growing needs.

 
More Solution Spotlight Content...