Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Sponsored Panel Sign Up Form: 2016 ISSA International Conference

Confirmed ISSA International Conference Gold Sponsors are eligible to have one participant speak on one 45-minute conference presentation. Speaker and presentation are subject to approval. Please submit your presentation content no later than August 31, 2016. You will receive a confirmation email within one week regarding the status of your proposed session which will include information on how to register your speaker(s).

The two options of sponsored panels to participate in are:

OPTION A: How Effective are Incident Response Plans?
November 2, 2016
4:00 pm - 4:45 pm
Room: Cumberland A/B
Moderator: Jim Robison: Director of Sales and Marketing, Anitian

Abstract:
Every day we see a new story about a sophisticated new attack or big breach. The attackers are no longer just stealing data, they are holding it for ransom. In 2015 an Experian study said 81% of organizations had an incident response plan, which was an 8% increase from 2014. All these breaches point to an inevitable fact, we all need an effective Incident Response Plan.
It has been said, the ultimate measure of a security team’s capabilities, is their ability to respond to a breach. As such, let’s explore what makes up an effective IRP, and how we can optimize them to go beyond reaction, to truly build a sustainable defense against attack.

OPTION B: Culture Changes, Communicating Cyber Risk in Business Terms
November 3, 2016
11:30 am - 12:15 pm
Room: Cumberland A/B
Moderator: Dr. Shawn Murray: Principal Scientist, United States Missile Defense Agency
Abstract:
Cyber Security is gaining the required attention of business executives worldwide. One of the ongoing challenges is communicating what cyber security initiatives take precedence over other business unit priorities. From a business perspective, cyber security projects should align with the overall business strategy and allow the business to run more efficiently while reducing risk to the organization overall. Cyber security and risk management should be part of the business culture. The CIO and CISO should have a strong relationship with other business units to identify key processes, personnel and IT resource requirements so risk can be properly assessed and cyber related solutions can be planned, funded and implemented. It is vital that the CIO & CISO be able to communicate justification in business terms, how they address risk and bring value to the organization. This panel will discuss the requirement for CIOs, CISOs and IT leaders to have the ability to confidently justify and articulate risk related to IT and cyber security projects in a language that is understood by everyone. We will also discuss strategies on how to ensure executives back these initiatives as part of the organizational culture as well.

 

For any questions, please contact Leah Lewis.

Please use the following form to submit your content:

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event

10/12/2016 » 10/13/2016
Hawaii's 23rd Annual Discover Security Conference 2016




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information