Submission Form

CISO Exchange Agenda

CISO Exchange Agenda

The 2019 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the CISO Exchange will offer cyber security leaders the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security.


Download our past 2018 Agenda to see our prior speaking faculty and interactive sessions!

Sponsorship Brochure

Sponsorship Brochure

Download the CISO Exchange Sponsorship Brochure

The 2019 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the CISO Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Top Reasons To Sponsor:

 

Shorten your sales cycle by initiating relationships directly with decision-makers

 

Reduce the average cost of new business development through consolidation of T&E expenses by bringing these decision-makers to you in a captive audience

 

Accomplish 6-12 months of standard sales efforts in just three days by reaching ultimate budget decision makers

 

Promote brand & company awareness during formal and informal networking opportunities to share and exchange ideas and concepts

 

Promote your organization’s solutions during exclusive Thought Leadership Speaking Opportunities

Cyber Security Exchange 2018 - Post Event Report

Cyber Security Exchange 2018 - Post Event Report

In the 2018 Cyber Security Exchange's post event report, you will find featured speakers, session topics, attendees, top areas of investments, and much more. Feel free to download a copy!

NEW! Zero-Trust Networks: An Interview with Virginia Tech CISO Randy Marchany

NEW! Zero-Trust Networks: An Interview with Virginia Tech CISO Randy Marchany

Chief Information Security Officer, Randy Marchany, explains how Virginia Tech integrated zero-trust network architecture into its existing cyber security defense strategy.

NEW!! Exclusive Interview with Les Correia, Global Information Risk & Security Director at The Estée Lauder Company

NEW!! Exclusive Interview with Les Correia, Global Information Risk & Security Director at The Estée Lauder Company

Les Correia, Global Information Risk & Security Director at The Estée Lauder Company, discusses his analysis of the endpoint security landscape, including his vendor selection process.

NEW!! Threat Intelligence Resources: An Interview with Texas Deputy CISO Andy Bennett

NEW!! Threat Intelligence Resources: An Interview with Texas Deputy CISO Andy Bennett

In this exclusive interview State of Texas Deputy Chief Information Security Officer Andy Bennett offers advice to CISOs on partnering with leadership team to ensure proper allocation of cyber security resources.

NEW!! Exclusive Report: Cyber Security Challenges, Focuses for 2019

NEW!! Exclusive Report: Cyber Security Challenges, Focuses for 2019

Take a look at this exclusive report from Cyber Security Hub on Cyber Security Challenges and the focuses for 2019.

As more enterprises dig deeper into cyber security – knowing their security framework and different vulnerabilities – the industry has further solidified itself as both indispensable and vital to day-to-day operations. So what’s coming to cyber security in 2019?

Cyber Security Hub’s fielded a survey in October 2018 to their audience. This report combines both quantitative and qualitative data for a look at readers’ views on these pressing questions and more:

  • What is the most dangerous threat vector? 
  • What is the one area of cyber security that needs to change the most in 2019 
  • Will mobile devices pose a greater threat in 2019? 
  • Where will cyber dollars be allocated in the new year?
NEW!! 2018 Global Report: Cryptocurrency’s Role In Cyber Attacks

NEW!! 2018 Global Report: Cryptocurrency’s Role In Cyber Attacks

Cyber Security Hub has brought together four industry experts to provide an in-depth overview and analysis of burgeoning ransomware threats. Each has led various initiatives in the cyber and crypto spaces, and now they are imparting that wisdom to our readers. In this report, they cover:


  • Ransomware & Cryptocurrency: How Two Intertwined Ecosystems Grow Together
  • ‘Crypto-Haze’: Enterprise Policy Around Digital Currency Security
  • Holistic Costs Associated With A Ransomware Attack
  • Building A Better, More Secure Infrastructure To Invest In Digital Assets


Be sure to download the report for some great content and information!

NEW!! The Cost of Data Breaches

NEW!! The Cost of Data Breaches

Download this exclusive video that touches on data breaches and the costs associated with them. At the CISO Exchange network with your peers and gain insightful knowledge on what your peers are doing to help alleviate the pitfalls associated with data breaches within their organizations.

Is BYOD (Bring Your Own Device) Worth the Risk?

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?


Inside: • The case for and against BYOD • BYOD productivity, security and implementation data from over 800 IT professionals • BYOD best practices
The Human Side of Cyber Security: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

The Human Side of Cyber Security: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

Chris Gay, VP and Chief Information Security Officer of Southeastern Grocers and advocate for cyber security education, will be leading a roundtable discussion on the topic at the upcoming CISO Exchange in San Francisco CA, March 11-13, 2018. Ahead of the Exchange, we sat down with him to talk cyber security education and awareness, challenges to CISOs at large companies, mitigating risks associated with new technology and more.


6 Traits of a Great CISO

6 Traits of a Great CISO

In the c-suite, often the greatest emphasis is placed on leadership, communications skills and business savvy, among other things. As a great CISO, however, you’re multidimensional: possessing all these qualities, but adding into the mix an in-depth knowledge of and experience with the various systems, controls and tools that work together to keep an organization’s data safe. Being multidimensional isn’t all it takes, however.
Report: Companies Passing on Password Security

Report: Companies Passing on Password Security

At a time when breach incidences are higher than ever before, targeting companies of all sizes within all industries, responses like these beg the question: are lackluster password controls and the lack of even basic password security measures worth millions of dollars in damages?
The Exchange Difference

The Exchange Difference

Still not sure how the Exchange format is different from your average industry conference? Download this free PDF to explore the unique benefits including personalized agendas, capped attendance, and much more!