Submission Form

2018 CISO Exchange East Agenda

2018 CISO Exchange East Agenda

Cyber crime can be perpetrated from anywhere in the world that permits a link between cyber space and physical computing devices and networks. With the digital landscape expanding, the enterprise has historically invested in strengthening their cyber security postures with diverse security controls. Yet the productivity of security teams is complicated by an abundance of alerts, legacy systems, evolving technologies and growing compliance mandates. Join this interactive three-day forum in Boston, where impactful and practical information will provide insights to heads of cyber security.  The program includes instilling security-first thinking with a focus on collaboration across the business and with external partners while integrating and maximizing automation and emerging technologies. Download the agenda and learn more about this year's topics of discussions including:

  • Automation/Artificial Intelligence/ Machine Learning in Security (the evolving Internet of Everything)
  • Regulatory/Legislative Compliance—managing, interpreting, implementing (using established risk frameworks
  • The Human Element—Talent Shortages, Insider Threats, Security Culture
  • Cyber Resiliency-  Utilizing Threat Intelligence and Business Continuity and Recovery (proactive about ransomware and other changing threats)         
  • Handling Breach Notification in a Timely Fashion (as well as patching, application testing and other cyber hygiene)

Request an Invitation

Request an Invitation

The 2018 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the CISO Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Key Topics This Year Include:

 

Managing corporate expectations and the skills gap.

 

Navigating the role of automation and linking legacy systems and emerging systems

 

Fostering security culture, behavior and attitudes

 

Leveraging lessons from outside of cyber security

 

Effective Ways to Brief the Board

2018 Sponsorship Brochure

2018 Sponsorship Brochure

Download the CISO Exchange Sponsorship Brochure

The 2018 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the CISO Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Top Reasons To Sponsor:

 

Shorten your sales cycle by initiating relationships directly with decision-makers

 

Reduce the average cost of new business development through consolidation of T&E expenses by bringing these decision-makers to you in a captive audience

 

Accomplish 3-12 months of standard sales efforts in just three days by reaching ultimate budget decision makers

 

Promote brand & company awareness during formal and informal networking opportunities to share and exchange ideas and concepts

 

Promote your organization’s solutions during exclusive Thought Leadership Speaking Opportunities

Is BYOD (Bring Your Own Device) Worth the Risk?

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?

Inside: 
• The case for and against BYOD
• BYOD productivity, security and implementation data from over 800 IT professionals 
• BYOD best practices

Six Traits of a Great CISO

Six Traits of a Great CISO

In the c-suite, often the greatest emphasis is placed on leadership, communications skills, and business savvy. A great CISO, however, needs to bring much more to the table. They’re multidimensional: possessing all these qualities, but adding into the mix an in-depth knowledge of and experience with the various systems, controls, and tools that work together to keep an organization’s data safe. 

Discover the six traits that great Chief Information Security Officers share.

NEW! CISO March 2018 Post Event Report

NEW! CISO March 2018 Post Event Report

The new CISO March post-event report features speaker interviews, attendee profile data, list of attending organizations and much more!

NEW! 2018 CISO East Exchange Attendee List

NEW! 2018 CISO East Exchange Attendee List

View the list of attendees you'll meet at the 2018 CISO East Exchange!