Barcelona

5 reasons to attend CISO 360 Congress…

  1. Thought-leadership discussions  gain rare insights into what leading CISOs are doing – how and why. What works and what doesn’t.
  2. CISO Innovate sessions – a % of the agenda is dedicated to future-facing technical areas to enable the CISO to ask the right questions of their technical teams.
  3. Rare cross-functional CxO dimension  the international speaker panel includes CIOs, CTOs, CROs, GCs, CPOs, CDOs and business strategists to reflect the ever-increasing multi-faceted interactions of today’s security leaders.
  4. Designed ‘by and for’ CISOs, directors of cybersecurity and cyber threat intelligence – compare practical ways in which information security and risk leaders tell us they are adding tangible business value.
  5. Meet top quality technology R&D innovators and developers who deliver ‘security by design’ – offers a peak into the future of digital innovation, IoT, AI and cloud technologies.

Designed for interaction…

  • Enduring connections guaranteed  dedicated networking schedule and a single track programme will ensure you depart at the end of the event with new professional contacts and friends.
  • Real-time benchmarking and results-driven  integrated event technology to gain real measures on pertinent questions.
  • Fully immersive and interactive  dynamic debates, think tanks, contests, on-stage interviews, fireside chats.
  • Open sharing of experiences – the entire event is held under the Chatham House Rule. No press is present.
  • Highly researched agenda – stay ahead on how key areas of cybersecurity are maturing.
  • Community-focused  partners are welcome to enjoy the included networking events and partner programme.
  • Practical take-aways  focus groups will produce best practice output reports delivering an ongoing value-add.

Format

  • CISO  360 Boardroom – gain rare insights into what leading CISOs are doing, how, why and what works, and what doesn’t
  • Fully immersive and interactive – dynamic debates, think tanks, contests, on-stage interviews, fireside chats
  • Real-time benchmarking and results-driven – integrated event technology to gain real measures on pertinent questions
  • Open sharing of experiences – the entire event is held under the Chatham House Rule
  • Community-focused – partners are welcome to enjoy the networking events
  • CISO technology innovation – see live demos
  • Rare cross-functional CxO dimension – the speaker panel includes CIOs, CTOs, CROs, GCs, CPOs, CDOs and business strategists to reflect the ever-increasing multi-faceted interactions of today’s security leaders
  • Designed by and for CISOs – a multi-faceted ‘tool kit’ engaging a 360 view from architects, business owners, developers, investors and innovators

Privacy, risk and governance

  • Jonathan Armstrong, Partner, Cordery will put to bed some of the GDPR “fake news” as well as predictions that are likely to grab the attention in 2018
  • Dr. Victoria Baines, Trust & Safety Manager, EMEA, Facebook shares expert insights into the changing dynamics of security and privacy
  • Graham Edwards, Head of Group Security, Nationwide will share rare insights into how Nationwide is approaching GDPR risk-reward
  • Case study by Stephen Khan, Head of Security Architecture and Transformation, Royal Bank of Scotland who will share results, challenges on successes on effective supply chain management for security
  • Further GDPR perspectives from Europe from CISOs of HC Starck (Germany) and Almirall (Spain)…

Cyber threat intelligence, resilience and response landscape

  • Don’t miss the fireside chat with John Scimone, SVP, Chief Security Officer, Dell, who was former SVP, Global Chief Information Security Officer at Sony Group, as he talks about how CISOs can prepare for destructive cyberattacks
  • Anomali will lead a breakfast discussion on the practicalities and realities of threat feeds
  • Case studies by Juan Ramón Caravaca Sánchez, CCO, CISO, Verne Group; Ray Stanton, Group CiSO & Director Digital Risk, National Grid
  • Gadi Evron, Chairman, Israeli CERT & CEO, Cymmetria will divulge what works and what doesn’t in relation to threat risk assessments
  • Gain rare insights into a day in the life of an Interim Security Director – Dexter Casey, currently with Willis Towers Watson, interacts on threat-hunting
  • What does the integrated cyber-physical security space look like today –  invited c-level executives

Response, latest exploits and attack techniques

  • Hear practical approaches from Irene Corpuz, Section Head – Planning & IT Security, UAE Government on malware Shamoon 2 as it affected some entities in the GCC
  • Michael Colao, Head of Security, AXA UK shares tips on how we can avoid getting our data locked down and responses
  • Practical strategies in response to the emerging landscape – insights to simplify, automate and reduce response time in incidents or malicious activity by Alex Quintieri, Head of Cyber Security, AIA Insurance Hong Kong
  • Followed by scenario planning exploits on insider exploits by Dr. Sally Leivesley, Director, NewRisk Ltd, and latest exploits seen by Daniel Brunner, Head of Security and Architecture, RUAG AG Switzerland

Brand protection / securing online commerce / security as an investment in the age of IoT and digital innovation

  • New case studies on secure agile development – Dr. John Meakin, Chief Risk & Security Officer, Burberry and Malcolm Kelly, Global Head of Application Security, HSBC
  • What does a world-class transformation strategy look like? What are effective world-class enterprise awareness and collaboration models?
  • How can we take current security practices to create new models and strategies to build security value?
  • What best practice security strategy looks like now and how is this rapidly evolving with digital transformation?

CISO Boardroom – How to reposition cybersecurity as a robust business investment strategy

Led by:

Dr. Robert Coles
Chief Information Security Officer/
Head of Information Protection & Privacy
GSK

Timings:

08:00   Coffee and registration
10:00   Short coffee break
13:00   Lunch

Gain rare insights into the what, where, how and why.

Pre-event: you shape the final agenda. Upon registration you will be asked to subit your top 3 priorities, challenges or questions that you would like to see discussed during the CISO 360 Congress and CISO 360 Boardroom. We thank you in advance for your input. Feedback is confidential and ensures that we directly address your most critical requirements for a fully immersive experience.

Post-event: an output report capturing the key points from the interactive boardroom discussions will be shared after the event. Participants, and a wider group of senior executives with a special interest in these areas, will receive the report not more than 10 days after the event.  The report will reflect that the discussions are held under The Chatham House Rule.

Back to Pulse Conferences

You currently have JavaScript disabled!

This site requires JavaScript to be enabled. Some functions of the site may not be usable or the site may not look correct until you enable JavaScript. You can enable JavaScript by following this tutorial. Once JavaScript is enabled, this message will be removed.