Mega-Trends in Information Risk Management for 2013 and Beyond: CISO Views

  • Tuesday, February 26, 2013 | 2:30 PM – 3:30 PM | Room: Room 130

View all Sessions

Conventional information security has been invalidated by APTs and Flame-like malware, technologies such as cloud computing, mobile devices and big data; and a weak global economy. Information risk management is moving to new models involving untrusted end-points, detective & predictive analytics, automated controls assurance, data flow mapping and more. Hear from top CISOs on the latest trends.


This document was retrieved from on Mon, 17 Jun 2019 09:09:33 -0400.