The real TikTok challenge: Trojan horse freemium apps

The real TikTok challenge: Trojan horse freemium apps

Harvey Boulter, Chairman, Communication Security Group Inc.

Does your VPN policy reflect the new reality, and what risks do you face?

Does your VPN policy reflect the new reality, and what risks do you...

Adam Such II, President and Chief Operating Officer, Communication Security Group Inc.

Facial recognition is the tip of the spear in the assault on your privacy

Facial recognition is the tip of the spear in the assault on your...

Harvey Boulter, Chairman, Communication Security Group

Cybersecurity and Responsibility in the Organization

Cybersecurity and Responsibility in the Organization

Robert McFarlane, Chief Revenue Officer, Mosaic451

Cybersecurity Today, 2020 and Beyond

Cybersecurity Today, 2020 and Beyond

Rizwan Hafeez, Managing Director, Information Technology, Blue Cross Blue Shield Association

Importance of Awareness, Automation and Relationship for Security Assurance

Importance of Awareness, Automation and Relationship for...

Jon Rogers, CISO, Continental Resources

Your It Is Transforming, Is Your Security Keeping Up?

Your It Is Transforming, Is Your Security Keeping Up?

Alex J Attumalil, Deputy CISO, Under Armour

THE “BIG THREE”

THE “BIG THREE”

Leon Ravenna, CISO, KAR Auction Services Inc.

Technology Evolution: A Higher Ed Ciso's Journey From Concept To Reality…

Technology Evolution: A Higher Ed Ciso's...

Bob Turner, CISO, University of Wisconsin-Madison

Choose Security You Can Count On

Choose Security You Can Count On

Gary Eppinger, Global Chief Information Security Officer (CISO) and Corporate Privacy Officer, Carnival Corporationy

Why Don’t We Defend Better? Data Breaches and the Lack of Information Problem

Why Don’t We Defend Better? Data Breaches and...

Robert H. Sloan, Professor and Head, Computer Science, University of Illinois and Richard Warner, Professor and Freehling Scholar, Faculty Director, Center for Law and Computers, Chicago-Kent College of Law, Illinois Institute of Technology

Security Reviews in a SaaS World

Security Reviews in a SaaS World

Rajan Kapoor, Director of Security, Dropbox

AIOps: The Power to Transform IT Operations and enhance Cybersecurity

AIOps: The Power to Transform IT Operations and...

Ken Corless, CTO of Cloud Practice and Principal, Deloitte Consulting LLP and Irfan Saif, Principal, Deloitte & Touche LLP, and Scott Keoseyan, Managing Director, Deloitte & Touche LLP

Does the Digital Enterprise Require Agile Security?

Does the Digital Enterprise Require Agile...

James M. Kaplan, Partner and Co-leader, McKinsey & Company

A Focused Approach to Cybersecurity

A Focused Approach to Cybersecurity

Zachary Tudor, Associate Laboratory Director for National and Homeland Security, Idaho National Laboratory