Mega-Trends in Information Risk Management for 2013 and Beyond: CISO Views

  • Tuesday, February 26, 2013 | 2:30 PM – 3:30 PM | Room: Room 130

View all Sessions

Conventional information security has been invalidated by APTs and Flame-like malware, technologies such as cloud computing, mobile devices and big data; and a weak global economy. Information risk management is moving to new models involving untrusted end-points, detective & predictive analytics, automated controls assurance, data flow mapping and more. Hear from top CISOs on the latest trends.


This document was retrieved from on Tue, 11 Dec 2018 06:43:04 -0500.