
Securing IoT Devices to Avert DDoS Attacks
Will Long Sr, VP & CISO, IS Operations, Children’s Health
Reinforcing Cyber Security - What is Your Role?
Kelvin Brooks, CISO, City of Atlanta
How Corporate Travel Fits into Risk Management
Mike Eberhard, President, Concur
Leveraging ERM to drive Information Security (Cybersecurity) results
Yvette K. Connor, Chief Risk Officer, Focal Point LLC and Chris Mandel, SVP & Director, Sedgwick Institute

Organizational Cultures that Promote and Reinforce Safe...
Gregory Crabb, CISO & VP, United States Postal Service

Sitting Securely on Cloud Nine
Jeffrey Wright, SVP & CISO, Allstate

Voluntary Benefits and Data Security
Glenn Petersen, President of Business Solutions, LegalShield, Independent Associate
For DDoS-Hope is NOT a Strategy!
Jon Murphy, GVP-IT Security, Ocwen Financial Corporation
Internet of Things Exposures & Enterprise Risk
Stephanie Snyder Tomlinson, U.S. Cyber Sales Leader and Kevin P. Kalinich, Cyber Global Practice Leader, Aon Risk Solutions [NYSE:AON]
DDoS Best Practice - Can You Do It Alone?
Russel Ridgley, Head of Cloud Services, Pulsant
Overcoming the Deficits of Earth-bound Data...
Scott Sobhani, CEO and Co-founder, Cloud Constellation’s SpaceBelt
DDoS Attacks: Qualified Security Professionals...
Eric Lynch, Software Developer/Trainer, CIO CopyWriter
Is Hacktivism the New 'Lobbying' or Something...
Ravi Khatod, CEO, Agari
Role of the Modern CISO Matures
Gary Hayslip, Deputy Director, CISO, City of San Diego
The 'Ostrich Approach' Won't Work with Mobile...
Chris Doggett, Managing Director, Kaspersky Lab North America