Laura Sachar talks about her career in venture capital and her current role at StarVest Partners.
Chief Information Security Officers have a captive audience with the C-Suite for cyber metrics that reflect both business measures and technology metrics.
Recent news has prompted government officials to offer more and timely information to the private sector. Here's what the ACSC would like to see.
Corporate and the law enforcement leaders in security agree: more attention must be paid to proactive assessment and planning that protects against cyber threats.
Do academic-industry partnerships address the shortage of qualified educators in cybersecurity among higher education institutions?
Stronger collaborative defense is necessary to build coalitions around solving common security problems.
Digging deeper with the ACSC into information sharing to improve defensive capabilities
The ACSC collaborated with McKinsey to survey Fortune 500 CISOs about their opinions on resiliency and collaboration.
Security can be baked into daily campaign functions, here's how.
The morning sessions of the Campaign Cyber Defense Workshop.
As the White House considers leaving a key cybersecurity position open, the ACSC talks about why that role is so critical to U.S. security concerns.
We're announcing the agenda for the campaign cyber defense workshop. Read for details.
Before joining Rapid7 as the Sr. Director of Orchestration & Automation, Jen was the founder & CEO of Komand (acquired by Rapid7) and also co-founded Threat Stack. Here's her story about how she succeeded in cybersecurity.
We can create secure elections through knowledge and basic security implementations, here's how.
Chris Wysopal, the Chief Technology Officer at CA Veracode, sites down to talk about his career and the intersection of devops and security.
Bobbie Stempfley is the Director of Carnegie Mellon's Software Engineering Institute. Here she shares insight into a career in tech and cybersecurity.
Sandy discusses her 12 years in cybersecurity, and her focus on identity, PKI, key management, cryptography and security management.
A writeup of the presentations and discussions during the 2016 Annual Conference from the ACSC.