Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top CISO talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with networking and social activities including the RSAC Codebreakers bash at AT&T Park featuring Sheryl Crow, Walk off the Earth and Tony Hawk. Keynotes, sessions and debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, healthcare, automotive, and more, with many reflecting current industry news. (Source: RSA Conference USA 2016)

8669808064?profile=original

image courtesy: https://www.flickr.com/photos/purpleslog/2870445260

1) Super CISO 2020: How to Keep Your Job

Speaker: Todd Fitzgerald ( @securityfitz )

This presentation gives some great insights on the present 2016 security scenario. Find content like security leadership in leading organizations, the C-Level stakeholders CISO needs to balance with, the workforce today, behavioral trends & more.

>> Go To Presentation


8669806080?profile=original

2) How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience

Speaker: Jan Nys ( @Jankbc777 )

This presentation gives you an understanding of the present security industry with key insights and also a roadmap to move ahead, threat landscape etc.

>> Go To Presentation


8669802465?profile=original

3) Security Program Development for the Hipster Company

Speaker: Robert Wood ( @robertwood50 )

Cloud services have evolved and can now replace nearly every facet of traditional infrastructure. This movement has enabled rapid scale while introducing a considerable element of risk. This session will discuss a framework for getting started building a security program in an organization that is built purely on cloud services, covering the contradictions and opportunities of that business model.

>> Go To Presentation

8669807700?profile=original

4) Partnership with a CFO: On the Front Line of Cybersecurity

Speaker: Dr. Christopher Pierson ( @DrChrisPierson )

'Many CFO's know that they need to spend more on cyber risk management', many such facts can help us understand the cyber security industry today. Communicating properly to the CFO can solve many pain points and this presentation helps us do so. Learn about Drivers, Compelling Arguments and more.

>> Go To Presentation

8669801079?profile=original

5) The Measure of Success: Security Metrics to Tell Your Story

Speaker: Julie Bernard@juliein10A ), Wendy Frank , Lisa Lee@lisainmiami )

Information Security as a problem is rather complex and it gets more difficult in terms of quantification. This presentation helps us with some metrics that will help us make security more understandable.

>> Go To Presentation

8669806872?profile=original

6) From Cave Man to Business Man, the Evolution of the CISO to CIRO

Speaker: James Christiansen ( @Riskydata )

The CISO is evolving to CIRO. Successful IT security leaders are transforming their skills to meet the demands for today and future needs of their organization. A CIRO understands how to prepare board presentations, information risk management, third-party risk and regulatory requirements, and how to balance those with the needs of the business. Earn your seat at the table by becoming a CIRO!

>> Go To Presentation

8669811868?profile=original

Image source: https://www.flickr.com/photos/christianmesiano/2826827826

7) Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Speaker: Sounil Yu ( @sounilyu )

The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.

>> Go To Presentation


8669806299?profile=original

image courtesy: https://www.flickr.com/photos/hernanpc/7115374283

8) Vendor Security Practices: Turn the Rocks Over Early and Often

Speaker: Martin Andrews; Michael Hammer ( @MichaelHammer )

Too often security is reviewed at the end of the vendor selection process. It ends up blocking projects moving forward as you identify issues with already selected vendors. Reverse the process with security considered early and business teams can avoid investing precious time on unsuitable vendor candidates and get rankings for suitable ones. This session will show you how using real examples.

>> Go To Presentation


8669805679?profile=original

image courtesy: https://www.flickr.com/photos/rueful/8538388071

9) Adjusting Your Security Controls: It’s the New Normal

Speaker: Jim Routh ( @jmrouth1 )

Most of us learned cybersecurity practices based on the application of controls that were part of a framework. Once the framework was implemented then the controls didn’t change often. It’s time to adjust our thinking and recognize that on-going adjustment of controls may be a better indicator of cyber-maturity than adherence to any framework.

>> Go To Presentation

8669806491?profile=original

10) Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards

Speaker: Lakshmi Hanspal ( @lakshmihanspal )

There is more to outsourcing than just the bottom line and running lean. Any organization embarking on this journey needs to (1) clearly identify and articulate the compelling narrative for steering in this direction, (2) have risk transparency on associated risks when someone else is running your critical part of the business and (3) enumerate the benefits expected to be reaped.

>> Go To Presentation

8669805055?profile=original

Your Complete Guide To Top Talks @RSA Conference 2016 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2016 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)