Star 0

Abstract

Conventional information security has been invalidated by APTs and Flame-like malware, technologies such as cloud computing, mobile devices and big data; and a weak global economy. Information risk management is moving to new models involving untrusted end-points, detective & predictive analytics, automated controls assurance, data flow mapping and more. Hear from top CISOs on the latest trends.