Become a VIP Delegate at the CISO Summit

Become a VIP delegate at the CISO Summit and move your organisation forward on current goals. If you are interested in attending the event, fill out the form below and an event representative will contact you with more information.

Lend Your Voice

The CISO Summit features presentations on critical topics in various industries, designed and led by the executive attendees themselves. The event seeks to cultivate each attendee's individual expertise, employing an agenda of thought-provoking sessions featuring speakers capable of offering real insight to their chosen topics. If you are interested in speaking at the summit, follow the link below to our Call for Speakers page and weigh in on the issues that matter most to you.

Heed our Call for Speakers

If you would like to speak directly with someone about the event, contact or +1 312.374.0805.


All Fields Marked With * Are Required

*Mobile Phone
*State / Province
*Zip / Postal Code
Keep me updated about CISO Summit news and content.
Please indicate speaking opportunities you would be interested in:
Keynote Speech
Panel Discussion
Educational Workshop
Case Study Presentation


Box Security More than 100,000 businesses use Box for sharing and accessing their data, and we work continuously to earn their trust. Box invests heavily in the security and resiliency of our data center, software, and our entire business operation. We recognize that security has to be integrated in every phase of product development and daily operations. This paper describes some of the many measures and practices that we implement on a daily basis to ensure the security of your business data.

Carbon Black for Immediate Incident Response: Rapid Response to Advanced Attacks Enterprises are now realizing it is no longer a matter of IF they will get breached, but rather a matter of WHEN they will be breached. Learn more in this Incident Response 2.0 whitepaper.

IT Security- Fighting the silent threat Kaspersky Lab’s Global IT Risks survey, conducted by research consultancy B2B International, is now in its third year. This survey speaks to IT professionals across the world, looking to understand their attitudes, opinions and beliefs about IT security and its impact on their organization. By doing this, we hope to establish a global benchmark for the industry, to help businesses of all sizes and types gain a broader perspective of IT security thinking.

Fusing Vulnerability Data and Actionable User Intelligence BeyondTrust is an industry leader in vulnerability management and privileged account management. We have close to two decades of experience helping sophisticated organizations protect themselves from cyber attacks.

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion.

Executive Content

CSC CSC offers the WAVE™ so that you can discover the CSC cloud of opportunity™. Using the WAVE, you will be able to identify the opportunities that, when deployed, provide - improved time to value, defense against competitive threats, reduced risk to the client’s mission, potentially lower costs, and freedom to innovate.

Designing an Adaptive Security Architecture to Protect Against  Advanced Threats Today's security threats are more advanced than traditional security solutions. Attacks in malware continue to evolve faster than traditional solutions can block them. What your organization needs is an adaptive security architecture as well as security solutions that fulfill these growing needs.

Moving Beyond BYOD to Mobile First: A Three-Step Strategic Approach for CIOs Mobile is changing the way business gets done today. Empowering employees with the tools they need and prefer to accomplish their work in the field or on the road, backed by a rock-solid infrastructure for supporting mobile apps and services, is now considered a competitive edge. Companies that shift to a “mobile first” strategy can improve productivity, customer satisfaction, and time to market, resulting in a dramatic effect on revenue.

Box General Overview Manage your content in the cloud by combining the core features of traditional content management with the usability of typical online collaboration software, Box is reinventing how businesses share, manage, and access all of their content with Cloud Content Management.

CSC Infographic - Updated 2014 CSC is a global powerhouse in business and technology transformation. Our people help businesses, governments and communities solve their toughest challenges. Market shifts and technology trends demand fresh thinking. We help clients capitalize on trends and anticipate what’s ahead.

More Solution Spotlight Content...