Thought-leadership discussions –gain rare insights into what leading CISOs are doing – how and why. What works and what doesn’t.
CISO Innovate sessions – a % of the agenda is dedicated to future-facing technical areas to enable the CISO to ask the right questions of their technical teams.
Rare cross-functional CxO dimension –the international speaker panel includes CIOs, CTOs, CROs, GCs, CPOs, CDOs and business strategists to reflect the ever-increasing multi-faceted interactions of today’s security leaders.
Designed ‘by and for’ CISOs, directors of cybersecurity and cyber threat intelligence – compare practical ways in which information security and risk leaders tell us they are adding tangible business value.
Meet top quality technology R&D innovatorsand developerswho deliver ‘security by design’ – offers a peak into the future of digital innovation, IoT, AI and cloud technologies.
Designed for interaction…
Enduring connections guaranteed –dedicated networking schedule and a single track programme will ensure you depart at the end of the event with new professional contacts and friends.
Real-time benchmarking and results-driven –integrated event technology to gain real measures on pertinent questions.
Real-time benchmarking and results-driven – integrated event technology to gain real measures on pertinent questions
Open sharing of experiences – the entire event is held under the Chatham House Rule
Community-focused – partners are welcome to enjoy the networking events
CISO technology innovation – see live demos
Rare cross-functional CxO dimension – the speaker panel includes CIOs, CTOs, CROs, GCs, CPOs, CDOs and business strategists to reflect the ever-increasing multi-faceted interactions of today’s security leaders
Designed by and for CISOs – a multi-faceted ‘tool kit’ engaging a 360 view from architects, business owners, developers, investors and innovators
Privacy, risk and governance
Jonathan Armstrong, Partner, Cordery will put to bed some of the GDPR “fake news” as well as predictions that are likely to grab the attention in 2018
Dr. Victoria Baines, Trust & Safety Manager, EMEA, Facebook shares expert insights into the changing dynamics of security and privacy
Graham Edwards, Head of Group Security, Nationwide will share rare insights into how Nationwide is approaching GDPR risk-reward
Case study by Stephen Khan, Head of Security Architecture and Transformation, Royal Bank of Scotland who will share results, challenges on successes on effective supply chain management for security
Further GDPR perspectives from Europe from CISOs of HC Starck (Germany) and Almirall (Spain)…
Cyber threat intelligence, resilience and response landscape
Don’t miss the fireside chat with John Scimone, SVP, Chief Security Officer, Dell, who was former SVP, Global Chief Information Security Officer at Sony Group, as he talks about how CISOs can prepare for destructive cyberattacks
Anomali will lead a breakfast discussion on the practicalities and realities of threat feeds
Case studies by Juan Ramón Caravaca Sánchez, CCO, CISO, Verne Group; Ray Stanton, Group CiSO & Director Digital Risk, National Grid
Gadi Evron, Chairman, Israeli CERT & CEO, Cymmetria will divulge what works and what doesn’t in relation to threat risk assessments
Gain rare insights into a day in the life of an Interim Security Director – Dexter Casey, currently with Willis Towers Watson, interacts on threat-hunting
What does the integrated cyber-physical security space look like today – invited c-level executives
Response, latest exploits and attack techniques
Hear practical approaches from Irene Corpuz, Section Head – Planning & IT Security, UAE Government on malware Shamoon 2 as it affected some entities in the GCC
Michael Colao, Head of Security, AXA UK shares tips on how we can avoid getting our data locked down and responses
Practical strategies in response to the emerging landscape – insights to simplify, automate and reduce response time in incidents or malicious activity by Alex Quintieri, Head of Cyber Security, AIA Insurance Hong Kong
Followed by scenario planning exploits on insider exploits by Dr. Sally Leivesley, Director, NewRisk Ltd, and latest exploits seen by Daniel Brunner, Head of Security and Architecture, RUAG AG Switzerland
Brand protection / securing online commerce / security as an investment in the age of IoT and digital innovation
New case studies on secure agile development – Dr. John Meakin, Chief Risk & Security Officer, Burberry and Malcolm Kelly, Global Head of Application Security, HSBC
What does a world-class transformation strategy look like? What are effective world-class enterprise awareness and collaboration models?
How can we take current security practices to create new models and strategies to build security value?
What best practice security strategy looks like now and how is this rapidly evolving with digital transformation?
CISO Boardroom – How to reposition cybersecurity as a robust business investment strategy
Dr. Robert Coles Chief Information Security Officer/
Head of Information Protection & Privacy GSK
08:00 Coffee and registration
10:00 Short coffee break
Gain rare insights into the what, where, how and why.
Pre-event:you shape the final agenda. Upon registration you will be asked to subit your top 3 priorities, challenges or questions that you would like to see discussed during the CISO 360 Congress and CISO 360 Boardroom. We thank you in advance for your input. Feedback is confidential and ensures that we directly address your most critical requirements for a fully immersive experience.
Post-event: anoutput report capturing the key points from the interactive boardroom discussions will be shared after the event. Participants, and a wider group of senior executives with a special interest in these areas, will receive the report not more than 10 days after the event. The report will reflect that the discussions are held under The Chatham House Rule.