IT Security Operations: Successful Transformation

Keynote Hall October 20, 2015 - Feedback     

Bookmark and Share

Kristin Lovejoy

As technologies like Cloud and Mobility and processes like Agile Development have become mainstream, many enterprises large and small, have challenges not only keeping pace and leveraging these technologies to grow their business but also reducing risk to the business in an interconnected world. This session will provide best practices and experience from a CISO’s vantage point on mobile BYOD, Cloud, Identity and Access management, data governance and protection. Learn how to develop a proactive strategy and ensure IT security is seen as a business enabler.