12 top talks from the 2016 r-cisc summit
TRANSCRIPT
![Page 1: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/1.jpg)
12 from the Top Talks
Chicago, IL – 2016
BROUGHT TO YOU BY
R-CISC Summit
![Page 2: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/2.jpg)
A Vision for the Future: How Retailers
Will Reshape the Industry
@RetailCISC
The R-CISC Board of Directors discuss how the organization is leading the
industry to coordinate information sharing,
influence current policy and government programs to change the status quo, and build task forces to lift
the bar.
![Page 3: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/3.jpg)
Becoming the Borg: Strategies for
Collective Threat Defense
Panelists discuss the topic of ‘shared
consciousness,’ an approach that unites retailers and their key partners in a common purpose, strengthens security strategies and unmasks threat actors.
By Daniel Conroy, Bill Dennings & David McLeod
![Page 4: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/4.jpg)
A Primer on Cyber Geopolitics for
Retailers
Cybersecurity has become a tangled web of global geopolitical risks, with retailers sitting as the
principle target of adversaries; state and federal legislators;
global regulators and the like. What does the landscape look like for retail security leaders
to manage new and emerging requirements from numerous
diverse players?
By Norma Krayem
![Page 5: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/5.jpg)
The IoT Challenge: Influence, Innovate,
Secure
IoT is changing the consumer landscape—and
retail is the new horizon. How are retail security leaders thinking about IoT? And how can they
prepare for this innovation? The key, Howitt says, is to get
ahead.
By Scott L. Howitt
![Page 6: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/6.jpg)
Restoring Trust After a Breach
While many organizations take preventive methods to
reduce the risk of data breaches, even the most
prepared establishments are still at risk. The moments
following a breach are crucial, and organizations must quickly identify the
extent of the compromise, as well as which systems can be
trusted.
By Dwayne Melancon
@ThatDwayne
![Page 7: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/7.jpg)
Disrupting the Economics of Cybercrime
By Brian Krebs
@briankrebs
Security journalist Brian Krebs offers a roadmap
to disrupting cybercrime in a financially fluid world
—starting with bridge-building between
retailers and financial service providers.
![Page 8: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/8.jpg)
Risktocracy Rising: Lessons Learned on
the Front Lines of Fraud
By Allison Miller
@selenakyle
Where money moves, so too do threats and
exposures—ask anyone on your fraud prevention team.
Allison Miller shares perspectives for improving
security defenses by borrowing ideas and
techniques from fraud detection.
![Page 9: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/9.jpg)
Applying Security at Scale to Your Business
By Alex Stamos
@alexstamos
What’s it like leading the diverse, fast-moving team
responsible for securing the data of more than 1.6
billion people? Alex Stamos shares lessons for securing systems at scale against the
most skilled adversaries and addressing some of the common problems facing
all CISOs.
![Page 10: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/10.jpg)
The Talent Strain: A Conversation in
Creative Recruitment and Retention
By Amy Bogac & Steven Young
Amy and Steven share strategies and tips for
how to grow and enhance your cybersecurity team,
from engaging young and unconventional talent, to building creative hiring
packages and employee enrichment programs.
![Page 11: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/11.jpg)
Disaster Response in the Digital Age
By Desi Matel-Anderson
@FITReadyToGo
From the use of virtual reality in the Syrian
Refugee Crisis to the creation of a robotic zoo in the US/Mexico border crisis, Desi uncovers how
technologies are empowering humans to
create cutting-edge disaster solutions.
![Page 12: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/12.jpg)
Rethinking Security in the Era of Mobile Device
Payment By Jamie Wallace
To attract and keep savvy consumers, retailers are
getting creative with ways to pay – from personal device
payments and iPod touch to Square and Apple Pay. What
is the business impact of this evolution? How must teams rethink security to
adjust?
@jamiemw
![Page 13: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/13.jpg)
Retail 2020: Securing Subjective Technologies
By Brian Sathianathan
@BrianVision
The rise of emerging technologies like AI and
virtual reality is taking the retail world by storm, and spurring retailers to get
ahead of (or at least on top of) the curve. How can
industry security leaders prepare for ever smarter,
more subject-driven systems?
![Page 14: 12 Top Talks from the 2016 R-CISC Summit](https://reader034.vdocument.in/reader034/viewer/2022042706/58a497071a28ab741b8b5a5b/html5/thumbnails/14.jpg)
For the latest security news, trends and insights, visit:
www.tripwire.com/blog @TripwireInc
To learn more about the Retail Cyber Intelligence Sharing Center, visit:
https://r-cisc.org