2019 Cyber Security Exchange Agenda Brochure
The CISO Exchange format is an exclusive, invitation-only event designed for global Chief Information Security Officers and senior cybersecurity leaders. During these two and a half-days, you will earn up to 12 CPE credits while engaging in meaningful conversations, benchmarking security strategi ...
The Exchange Difference
Still not sure how the Exchange format is different from your average industry conference? Download this free PDF to explore the unique benefits including personalized agendas, capped attendance, and much ...
Request an Invitation
Q&A with David Sheidlower, CISO at Turner Construction Company
Ahead of the CISO Exchange, we sat down with our featured speaker, David Sheidlower, CISO at Turner Construction Company to discuss his challenges, initiatives and his outlook on the future of cybersecurity.
12th CISO Exchange Post Event Report
Download our Post Event Report to get an exclusive look at what happened at the CISO Exchange in August 2019, including featured speakers, session topics, who attended, top areas of investment, and much more.
2019 CISO Exchange March Post Event Report
Download our Post Event Report to get an exclusive look at what happened at the CISO Exchange in March 2019, including featured speakers, session topics, who attended, top areas of investment, and much more.
Download our 2019 Solution Provider Pack
Interested in learning more about Sponsorship Opportunities for the 7th CISO Exchange? Download our 2019 Solution Provider Pack and get an introduction to our Exchange model, see some of the options we offer, and learn why this is a wise investment all in one place. The 2019 Exchange will provide...
2018 Global Report: Cryptocurrency’s Role In Cyber Attacks
Cyber Security Hub has brought together four industry experts to provide an in-depth overview and analysis of burgeoning ransomware threats. Each has led various initiatives in the cyber and crypto spaces, and now they are imparting that wisdom to our readers. In this report, they cover:Ransomware & Cryptocurrency: How Two...