Many organizations do not manage risk in a holistic way. Rather, they maintain silos of risk management activity that often use completely different methodologies and tools to model and treat risk. Security Operations, Audit/Compliance and Business (think CFO and Board of Directors) are the silos most seen in the wild. This structure may have worked in the old world when being the guy that said “NO” was enough but that is not the case in the age of Bring Your Own Device (BYOD), Cloud Computing and Regulatory Compliance. However, it does provide a unique opportunity for the savvy security professional to bring the silos together by normalizing the way they express, communicate and treat risk. By adopting common risk management metrics, innovative controls and trust management techniques CSO’s and other security practitioners can survive and prosper in the age of Cloud Computing and BYOD. Learn how to gain a holistic view of risk across your organization with the ultimate goal to determine your organization’s appetite for risk and to facilitate the cultural move from a “Zero Risk” mentality to a “Risk Resilient” mentality.
- Introduce trust metrics into a risk management practice
- Manage limited security budgets more effectively
- become a more effective security and business leader
About Bryan FIte

Bryan K. Fite: A committed security practitioner and entrepreneur, Bryan is currently the US&C Security and Mobility Portfolio Manager for British Telecom (BT). Having spent over 20 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn’t. Bryan has worked with organizations in every major vertical throughout the world and has established himself as a trusted advisor. “The challenges facing organizations today require a business reasonable approach to managing risk and protecting information assets.”
Optional BIO bits
Professional Highlights:
• Creator & Host of the “Non-Con” Day-Con Hacker Conference
• Founded Meshco™ Producers of PacketWars™
• Introduced Forensix™ computer forensics collection, analysis and visualization suite
• Released AFIRM: Active Forensic Intelligent Response Method to the general public
• Founded GETSecure™ a full service security practice; products, professional services, managed servi