CSX 2018 North America 

2017 HIGHLIGHT VIDEO

CSX 2017 North America Highlights
Watch Now

 

KEYNOTE SPEAKERS

Opening Keynote Speaker

Laura GalanteLaura Galante
Leading Cybersecurity Analyst | Senior Fellow, Atlantic Council and Founder, Galante Strategies
More >>

 

Opening Leadership Brief

Rob ClydeRob Clyde, CISM
NACD Board Leadership Fellow
More >>

 

Tuesday Keynote Speaker

Kevin PoulsenKevin Poulsen
Award-winning journalist and a contributing editor at WIRED magazine and The Daily Beast
More >>

 

Closing Keynote Speaker

P.W. SingerP.W. Singer
Strategist and Senior Fellow at the New America Foundation
More >>

 

Closing Leadership Brief

Brennan P. BaybeckBrennan P. Baybeck, CISA, CISM, CRISC, CISSP
More >>

 

CONFERENCE REPORT

Review highlights from last year’s CSX Conferences.

Download 2017 Report >>

 

Attend the Cybersecurity Event Designed for You

Be part of a dynamic and collaborative learning event coming 15-17 October—CSX 2018 North America.

Register Now

CSX 2018 enables you to:

  • Stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around the world.
  • Join a global conversation with professionals facing the same challenges as you at the nexus—where all things cybersecurity meet.
  • Embrace fresh insights, better understand your enemy and discover solutions that will help you safeguard the future of your organization.
  • Go from prevention and protection to possibilities that will add to your personal value and enterprise’s competitive advantage.

CSX 2018 Conference Brochure NOW AVAILABLE

Download the 2018 Conference Brochure below.

Brought to you by ISACA’s globally respected Cybersecurity Nexus™ (CSX), which is dedicated to helping professionals like you build timely knowledge and effective cyber skills.

 

Countdown to
CSX 2018 North America
10/15/2018

32

CPEHOURS

Earn up to 32 CPE hours by attending this conference.

CONFERENCE VENUE

Cosmopolitan of Las Vegas

Stay in the heart of the conference action at the:
Cosmopolitan of Las Vegas
3708 S Las Vegas Blvd
Las Vegas, NV 89109


See the Event Destination tab for more information.


Follow @ISACANews and join the CSX 2018 North America conversation by using the hashtag #CSXNA.
Like ISACA on Facebook to stay informed.
Follow @ISACANews on Instagram to see behind the scenes photos of the conference.
Follow ISACA’s Company page on LinkedIn for updates.


  Thank You to Our 2018 Premium Sponsors!

Vanguard Integrity Professionals

ACL

Adobe

Deloitte

OneTrust

Qadium

SecurityScorecard

Darktrace

GCA Technology Services

Thycotic

 

 

2018 CONFERENCE PROGRAM

As the program is developed, we will continue to add information to this page – check back frequently for updates!

Tracks for 2018

NEW IDEAS

Do you have a topic that you think should be offered at this conference? We want to know! Tell us about it by submitting your idea on Twitter using #CSXNA!

Workshops

Space will be limited for these workshops, so be sure to reserve your spot and register today!

2-Day Workshops; Pre-Conference (14 CPE)

Saturday 13 October – Sunday, 14 October 2018

1-Day Workshops; Pre-Conference (7 CPE)

Sunday, 14 October 2018

 

Leadership Briefs

Rob ClydeRob Clyde, CISM, NACD Board Leadership Fellow
Chair of ISACA’s board of directors and Executive Chair of Board of Directors, White Cloud Security, Board Director, Titus

 

 

Brennan P. BaybeckBrennan P. Baybeck, CISA, CISM, CRISC, CISSP
Vice Chair of ISACA’s board of directors and Vice President of Global IT Risk Management for Oracle Corporation (USA)

 

 

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

 

Opening Keynote Speaker

Laura GalanteCybersecurity in the Age of Connectivity: A Practical Guide to Protecting What’s Most Important

Laura Galante
Leading Cybersecurity Analyst | Senior Fellow, Atlantic Council and Founder, Galante Strategies

Laura Galante analyzes how states use cyberspace, or more precisely, our information space. She describes a domain where militaries, intelligence services, criminal groups, and individuals actively pursue their interests—with far fewer restraints than in the physical world. Formerly the Director of Global Intelligence at cybersecurity company FireEye, her teams investigated... More >>

 

Tuesday Keynote Speaker

Kevin PoulsenCybercrime’s Industrial Evolution

Kevin Poulsen
Award-winning journalist and a contributing editor at WIRED magazine and The Daily Beast

A one-time hacker, Poulsen was prosecuted in 1991 for using his illicit access to telephone company systems to cheat at radio station phone-in contests. He began writing in 1997, and later served as editor of SecurityFocus before joining Wired in 2005. In 2006 Poulsen conducted a computer-assisted investigation into the presence of sex offenders on social networking sites, which spawned federal legislation. In 2010, Poulsen broke the news that…More >>

 

Closing Keynote Speaker

P.W. SingerNextTech: The Future of Technology, Security, and Threats

P.W. Singer, PH.D.
Strategist and Senior Fellow at the New America Foundation

Peter Warren Singer is Strategist and Senior Fellow at the New America Foundation, the author of multiple award-winning books, and a contributing editor at Popular Science. He has been named by the Smithsonian Institution-National Portrait Gallery as one of the 100 "leading innovators in the nation," by Defense News... More >>


CONFERENCE SCHEDULE AT-A-GLANCE


Saturday, 13 October

Time  

8:00AM – 5:00PM

Registration

8:00AM – 9:00AM

Continental Breakfast

9:00AM – 5:00PM

WS1—Cybersecurity Fundamentals
WS2—COBIT 5 for NIST
WS3—Hands-on Technical Cybersecurity Training
WS4—CSXP Lab Bonanza


Sunday, 14 October

Time  

8:00AM – 7:00PM

Registration

8:00AM – 9:00AM

Continental Breakfast

9:00AM – 5:00PM

WS1—Cybersecurity Fundamentals
WS2—COBIT 5 for NIST
WS3—Hands-on Technical Cybersecurity Training
WS4—CSXP Lab Bonanza
WS5—CSX Packet Analysis Course
WS6—Develop An Effective Security Roadmap + Program

5:30PM – 6:30PM

Welcome Reception


Monday, 15 October

Time  

7:00AM – 7:15PM

Registration Desk and Innovation Exchange

7:00AM – 8:30AM

Continental Breakfast

7:30AM – 8:15AM

SheLeadsTech Networking Breakfast

8:30AM – 9:30AM

Opening General Session with Keynote Presenter
Leadership Brief | Rob Clyde
Opening Keynote | Laura Galante | Cybersecurity in the Age of Connectivity: A Practical Guide to Protecting What’s Most Important

9:30AM – 10:00AM

Morning Networking Break

10:00AM – 11:00AM

111–Analyst View: Cybersecurity Jobs, Skills, Pay Review & Forecast
112–The Truth About Machine Learning, AI and Cybersecurity, Part 1
113–Insuring Your Cyber Assets
114–Code Blue Clear: How One Hospital Survived the Largest Ransomware Attack in History
115–Implement a Security Program and Gain Executive and IT Support in a Skeptical Culture
116–Continuous Assurance Using Data Threat Modeling

11:00AM – 11:15AM

Movement Break

11:15AM – 12:15PM

121–Transforming Techie to Security Leader
122–The Truth About Machine Learning, AI and Cybersecurity, Part 2
123–Encryption: Policy to Practice, Lower Risk, Increase Compliance!
124–Crowd Sourced Security
125–ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts
126–We’re Not in Kansas Anymore: The Truth About Your Prime Vendors

12:15PM – 1:30PM

Lunch

1:30PM – 2:30PM

131–Board Director Concerns About Cyber & Technology Risk
132–Blockchain Strategic Initiatives
133–The Ocean is Full of Phish
134–Asymmetric Attacks Mandate Credible Cybersecurity Program
135–Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan
136–A Path to Achieving Network Security ZEN

2:30PM – 2:45PM

Movement Break

2:45PM – 3:45PM

142–Cloud Security Fundamentals
143–Leveraging Privacy to Improve Cybersecurity Posture
144–Hacking Closed Networks
145–Auditing Identity and Access Management Within the NIST Cybersecurity Framework
146–Thought GDPR Readiness Was Tough? Brace Yourself for the California Consumer Privacy Act

2:45PM – 5:15PM

1110–Cybersecurity Nexus Cyber Hunt, Session 1

3:45PM – 4:15PM

Refreshment Break

4:15PM – 5:15PM

152–Strategies for Governing and Managing the Use of Robotic Process Automation
153–Rise of the Machines Protecting the New Identities
154–Flatlines for Show, Exploits ‘Oh No!’
155–Transforming into a Lean Enterprise IT Security
156–Uncovering Facts and Trends in Global Cyber Security Risk

5:15PM – 7:15PM

Networking Reception

5:30PM – 6:00PM

SS1–See What a Hacker Sees. Translate Cybersecurity Findings into Compliance Risks.
SS2–Goodbye Yellow Bricked Road: The Convergence of Cybersecurity and Business Continuity
SS3–Making Sense of the Data from your Cybersecurity Tools

6:15PM – 6:45PM

SS4–Quantitative Methods for Assessing Cyber Risk


Tuesday, 16 October

Time  

7:30AM – 4:15PM

Innovation Exchange

7:30AM – 5:15PM

Registration Desk

7:30AM – 8:30AM

Continental Breakfast

8:30AM – 9:30AM

General Session Panel
Building a Culture of Cybersecurity

9:30AM – 10:00AM

Refreshment Break

10:00AM – 11:00AM

211–CISO for Hire: How to Lose Your Job in 10 Months
212–Why Awareness Efforts Fail
213–Tackling Risk and Compliance in a Global Context
214–The Five "P"s of Breach Response
215–Get Control of SSL/TLS Cert Security
216–How to Tackle the GDPR: A Typical Privacy & Security Roadmap

11:00AM – 11:15AM

Movement Break

11:15AM – 12:15PM

221–The Journey to Become a CISO and Why They Don't Run with Scissors
222–Blockchain Technology - Beyond the Hype
223–It's Not About the Data, It's About The People Who Protect the Data
224–Adaptive Response is the New Black in Today's Security Landscape
225–Getting Your Hands Dirty with the NIST Cybersecurity Framework
226–Turning Corporate Compliance into a Competitive Advantage

12:15PM – 1:30PM

Lunch

1:30PM – 2:30PM

Lunch General Session with Keynote Presenter
Tuesday Lunch Keynote | Kevin Poulsen | Cybercrime’s Industrial Evolution

2:30PM – 2:45PM

Movement Break

2:45PM – 3:45PM

231–Cybersecurity Capability and Resilience
232–Threat Hunting Primer: Moving from a Reactive to a Proactive Mindset
233–My Privacy, Your Risk, Their ROI
234–Understanding Deep & Dark Web
235–Embedding Cybersecurity into the Software Development Lifecycle
236–Harmonizing Insights from your Cybersecurity Ecosystem

3:45PM – 4:15PM

Refreshment Break

4:15PM – 5:15PM

241–Cyber Risk Management: Protecting Your Business While Fueling Performance
242–The Future of Identity Access Management
243–Gambling with PII? Beat the House with Risk Assessment
244–Practical Application of Risk Assessments for Your Cybersecurity Program
245–Communicating Risk Through Automated Metrics
246–Cyber Crisis Management Tabletop Simulation for Senior Management / Board of Directors

5:30PM – 6:00PM

SS7–Bringing Digital Disruption in Internal Audit to Life
SS8–Adobe’s Open Source CCF Enables Quick Adoption of New Compliance Standards


Wednesday, 17 October

Time  

7:30AM – 12:15PM

Registration Desk

7:30AM – 8:30AM

Continental Breakfast

8:30AM – 9:30AM

312–Prepare Against Ransomware
313–SSH Keys—Lowest Cost, Highest Risk Tool
314–Threat Intelligence Sharing: Trusted Circle & ISACs
315–Cyber Analytics: Visualizing Vulnerabilities
316–Cyber Event Recovery: What Are Your Plans?

8:30AM – 10:45AM

3110–Cybersecurity Nexus Cyber Hunt, Session 2

9:30AM – 9:45AM

Movement Break

9:45AM – 10:45AM

322–The Future of Cybersecurity Defence: Cognitive Security
323–Obscurity in Cloud Security
324–Taking Down the Cyber Criminal-Post Breach Incident Analysis & Investigation
325–DevSecOps-Bringing the Security-The Missing Link in Delivering on the Promise of Business Velocity and Quality to DevOps
326–The Life Cycle of a Woman in Tech

10:45AM – 11:00AM

Movement Break

11:00AM – 12:15PM

Closing General Session with Keynote Presenter
Leadership Brief | Brennan Baybeck
Closing Keynote | P.W. Singer | NextTech: The Future of Technology, Security, and Threats

 

Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a three-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 32 CPE credits; 18 by attending CSX 2018 North America, 14 for the pre-conference workshops. ISACA conferences are Group Live and do not require any advanced preparation.

Please note that the session scanners at the Conference  do not track CPE credit hours. You will still need to allocate your CPE hours in “My ISACA” following the conference. Certificates of Attendance will be accessible via your MyISACA account. To view your certificate, log into your account and navigate to the “myDOWNLOADS & CERTIFICATES” tab. There you will find a “MY CPE CERTIFICATES” section where all of your ISACA event CPE Certificates will live.

Your Certificate of Attendance details the maximum number of CPE hours you could have earned by attending this event. CPE policies for each ISACA certification, as well as details on how to report your CPE hours, are available here on ISACA’s website. Reporting can also be done by submitting information on the annual renewal invoice.

Conference Registration Fees


ONSITE REGISTRATION RATE
Register and pay after Friday, 5 October 2018
Member US $1,950 Non-member US $2,150

Two-Day Workshop (Cybersecurity Fundamentals only)
Member: US $850 Non-Member: US $1,050

Two-Day Workshop
Member: US $1,150 Non-Member: US $1,350

One-Day Workshop
Member: US $850 Non-Member: US $1,050
   

Cancellation Deadline:

Friday, 14 September 2018

 

 


Registration and Payment Policy

Registration submissions for this conference and any additional workshops are not processed, and a seat is not confirmed or reserved, until full payment is received. All submissions not paid in full will be placed on a waitlist and priority will be given to paid registrants in a payment first-come, first-serve basis. Space is limited, so it is highly recommended that payment is provided at the time of submission to guarantee a seat within the conference and all related events.

Registration rate is determined by the date payment is received by ISACA HQ and current membership status. Please plan accordingly, as it may take 10 or more business days for a wire transfer or mailed check to reach ISACA. Should we receive payment after a registration rate deadline, your account will be adjusted to reflect the current due amount. Entrance to the conference and all related events is contingent upon full payment.

Discounts for the Conference are available, detailed below. To verify eligibility for any of these discounts, please contact https://support.isaca.org or +1.847.660.5505. Note that discounts cannot be applied retroactively. All discounts are applied to the main conference registration fee, and cannot be applied to workshop registrations.

You must be 21 years of age or older to attend this event.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Group registrations must be processed in a single registration transaction. Please contact the ISACA Conference department for more details at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Government Discounts

ISACA offers a $350 conference registration discount to government employees. Please contact the ISACA Conference department for more details and eligibility verification at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Academic and Student Discounts

ISACA offers a $350 discount to academic institution employees and students. Please note that you must be an ISACA Student member in order to receive the student discount; additional membership and qualification details can be found here. For additional registration details and eligibility verification, please contact ISACA’s Conference Department at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Cancellation Policy

All cancellations must be received by the published deadline to receive a refund of registration fees. A cancellation charge of US $295 will be subtracted from conference refunds, and US $50 per workshop from workshop refunds. No refunds can be given after the cancellation deadline above. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5505
Fax: +1.847.253.1443
E-mail: https://support.isaca.org

 

Payment Methods

  1. Pay online at www.isaca.org/invoices
  2. Mail your payment to:
    ISACA
    1055 Paysphere Circle
    Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America
    135 S. LaSalle St.
    Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    * Please include attendees name on the Advice of Transfer.

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.


Consent Language for Photos, Audio and Video Recordings Taken at Events or for Marketing Purposes

I agree irrevocably and free of charge that ISACA or any third party who is acting on ISACA’s behalf may create images, videos and/or sound recordings of me (“works”) at the event for marketing purposes. For these purposes, the granting of rights in the works also includes the rights to adapt, reproduce, distribute, perform, making available to the public, broadcast, retransmit or sublicense the works to ISACA’s affiliates. The granting of rights in the works also includes all current and future media, goes beyond the repetition of an event and is not restricted to time or territory. View ISACA’s Privacy Notice >>


Dress

Business casual is appropriate for this and all ISACA conference events.

Conference Venue

The CSX 2018 North America rooming block is now closed. To make reservations at The Cosmopolitan of Las Vegas and to see current room rates, please visit their official website.

The Cosmopolitan of Las Vegas

3708 S. Las Vegas Blvd
Las Vegas, NV 89109
Phone: 702.698.7000
Toll Free: 855.435.0005

 

 

  The Cosmopolitan of Las Vegas

Thank you to our 2018 sponsors!

  Platinum

SAI Global


SAI Global helps organizations proactively manage risk to create trust and achieve business excellence, growth, and sustainability. Our integrated risk management solutions are a combination of leading capabilities, services and advisory offerings that operate across the entire risk lifecycle allowing businesses to focus elsewhere. Together, these tools and knowledge enable clients to develop a holistic, integrated view of risk.

We have global reach with locations across Europe, the Middle East, Africa, the Americas, Asia and the Pacific. For more visit www.saiglobal.com.

 

Vanguard Integrity Professionals

Vanguard Integrity Professionals provides enterprise security software and services that solve complex security and regulatory compliance challenges for financial, insurance, healthcare, education, transportation and government agencies around the world. Vanguard provides Cybersecurity Solutions Securing any Enterprise. The world’s largest Financial, Insurance, Government Agencies and Retailers entrust their security to Vanguard Integrity Professionals. Vanguard is committed to protecting and securing the Cloud, zOS Security Server and Enterprise environments. Vanguard provides 24/7/365 live customer support from the United States of America.

 

 

  Gold

ACL


ACL delivers enterprise governance SaaS solutions that help IT professionals manage the complex challenges of today’s everchanging IT regulatory landscape. Our integrated family of products – including our cloud-based governance, risk management, and compliance (GRC) solution and flagship data analytics products – are used at all levels of the enterprise to help maximize growth opportunities by identifying and mitigating risks, keep processes aligned, while keeping your organization’s reputation secure. Learn more at www.acl.com.

 

Adobe


Make It an Experience.
Only Adobe gives everyone — from emerging artists to global brands — everything they need to design and deliver exceptional digital experiences.

 

Deloitte


Deloitte Risk and Financial Advisory helps organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries.

 

OneTrust

OneTrust
OneTrust is the global leader in privacy management software. More than 1,500 customers, including 200 of the Global 2,000, use OneTrust to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and ePrivacy (Cookie Law). The software, available in 50+ languages, is backed by over 16 awarded patents and can be deployed in an EU cloud or on-premise. The comprehensive platform is based on a combination of intelligent scanning, regulator guidance-based questionnaires, automated workflows and developer plugins used together to automatically generate the record keeping required for an organisation to demonstrate compliance to regulators and auditors.

Qadium


Qadium empowers organizations to define and secure their global network edges. Our global-scale, near-realtime Internet intelligence platform offers large organizations complete visibility into and actionable insights about their true global network edge to mitigate information security risks – including beyond-the-firewall “unknown unknowns” like shadow IT in cloud hosting, assets lost during M&A events, regional offices violating policy, and more. Our platform continually monitors the global Internet, constantly re-maps, and characterizes behavior of all public Internet-connected devices. F1000 organizations like Capital One, CVS, Allergan, Fluor and many more trust Qadium to define and secure their global network edges.

 


SecurityScorecard


SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company’s approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Web, Application Security, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Credentials, DNS Health, Endpoint Security, IP Reputation and Cubit Score. To receive an email with your company’s current score, please visit instant.securityscorecard.com.

 

  Silver

 

 

 

  Bronze

Darktrace


Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide. For more information, visit www.darktrace.com

 

GCA Technology Services


For over 15 years, GCA Technology Services has helped our clients assess, deploy and manage enterprise-wide governance, compliance and identity & access management (IAM) programs. We are true consultants and can manage any size program, from assessments through implementations, as well as providing co-managed services for those programs on an on-going basis.

 

Qualys, Inc.


Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.

 

RSA


RSA Archer Suite empowers organizations of all sizes to manage multiple dimensions of risk on one configurable, integrated software platform. With RSA Archer, organizations can quickly implement risk management processes based on industry standards and best practices—leading to improved risk management maturity, more informed decision-making and enhanced business performance.

 

Thycotic


 The easiest to manage and most readily adopted privilege management solutions, Thycotic’s security tools limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control.

 

 

  Supporting Sponsors

CMMI

CyberVista

The Federal Reserve Bank of Atlanta

GreyCastle Security

Keeper Security

LastPass

MIS Training Institute

Office of the Comptroller of the Currency

SAINT

TEEX

 

For Exhibitor and Sponsorship Opportunities

Please contact: 

Sean Stringer
Director, Sponsorship
Phone: +1.847.660.5729
Fax: +1.847.253.1443
sstringer@isaca.org

 

 

Questions

Contact ISACA's Learning Solutions Department:
Tel: +1.847.660.5670
Fax: +1.847.253.1443
Click here to submit a question.

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or
+1.847.660.5564
news@isaca.org

Please address Sponsorship questions to: sstringer@isaca.org