Balance Must be Created Between Applications And Managing Security By Phil Bertolini, CIO& Deputy County Executive, Oakland County
Analytical Security: Data-driven analytics and a new information security paradigm By John Beeskow, EVP of IT & Security Strategy, CBI
Your Point-of-sale Should be a Point-of-security By Charles Henderson, VP-Managed Security Testing, Trustwave
Developing Technology to Address Big Data and Cyber-Security Challenges By Paul Liebman, CCO, The University of Texas at Austin
The Weakest Link Is Your Strongest Security Asset By Christian Anschuetz, CIO & Security Practitioner, UL
Best Practices to Create Secure Policies and Take Full Advantage of IoT Evolution By Jackson Shaw, Senior Director, Product Management, Dell
Ongoing Authorization: Changing how Government does Security Compliance By Jeff Eisensmith, CISO, DHS