Security From The Boardroom: Presentations
Every day businesses are exposed to threats and vulnerability. Chief Information Security Officers know what challenges they are facing, but other business imperatives may take priority over security programs. How can leaders prioritize scarce funding to protect assets of highest impact? How do they determine what those assets are? Learn how you can use an economic impact analysis to answer these questions and much more.
The mantra of Security and Privacy by Design has been well socialized amongst those of us responsible for assuring our products deliver on these principles. How do we translate the ‘by Design’ culture into our products? What are the practical implications to our engineering teams for architecture and process? Hear tactics and lessons learned from the pursuit to integrate Security and Privacy principles into LinkedIn’s product development life cycle.
Security breaches, state sponsored hacking, and device vulnerabilities are in the news every day. It is like a game and has become a Board of Directors level discussion at most corporations today. For any company to effectively play the game of Information Security, it must rely on intelligent technical minds with strong problem solving skills, within teams who effectively collaborate. Is Information Security a team you want to be on?