Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS — this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximizing networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
Designing Information Security Strategies to Suit Business Needs
- Engaging with senior leaders to inform business priorities for information security policies
- Collaborating with staff to improve the usability of cyber security controls as part of working processes
- Guidance on using cyber security measures to create a competitive advantage against competitors
Implementing Company Updates to Meet National Information Security Standards
- Working with all departments to understand changes required to adhere to new SEC regulations
- Tools and resources to increase efficiency in data collection processes as part of improving transparency around cyber security measures
- Regular reviews of information security measures to ensure they meet new national requirements
Richard Mendoza, Senior Director, Privacy & Regulatory Compliance, Anywhere Real Estate
Addressing Workforce Security Skills Shortages to Ensure Cyber Resilience
- Evaluating team capabilities to identify gaps in cyber security knowledge and inform training schemes
- Adapting security resilience initiatives to tackle human error incidents
- Key tips on securing resources from senior leaders to provide security skills training
Sajed Naseem , CISO, NJ Judiciary
Coffee break & networking
Workshop 1
Workshop 2
Workshop 3
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
Expanding Detection Capabilities to Prevent Cyber Security Threats Escalating into Incidents
- Ensuring all staff understand their responsibilities in identifying and reporting security threats
- Evaluating security incident data to identify emerging trends in cyber threats
- Regular reviews of detection tools to tackle increasingly sophisticated attacks
Adapting Recruitment Strategies to Ensure Diverse Teams and Expand Workforce Capabilities
- Designing recruitment schemes to create teams with a broader range of backgrounds and experiences
- Creating entry points at different levels of seniority to attract more applicants for cyber security roles
- Key tips on using diverse hiring panels to tackle unconscious biases in recruitment processes
Strengthening Digital Trust as part of Cyber Security Policies
- Key advice on using accessible language to increase transparency around cyber security measures
- Utilizing data visualisation tools to share and evaluate the impact of security policies
- Resources to support staff improve their understanding of digital terminology
Leadership Strategies to Support Talent Development and Retention Policies
- Working with employees to establish professional goals and ensure internal progression opportunities for all staff
- Professional development schemes to expand staff skillsets and reduce employee turnover
- Designing interventions to identify and support employees struggling with their workload
Coffee break & networking
Workshop 4
Workshop 5
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: Developing Response Plans to Manage the Impact of Ransomware Attacks
- Engaging with all staff to recognize and report potential cyber security events
- Embedding joined-up procedures in response to ransomware attacks to recover damaged assets
- Crisis leadership strategies to ensure all employees understand and fulfil their role in tackling ransomware attacks
Morning registration & breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Roundtable wrap-up by the Chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Workshop 6
Workshop 7
Workshop 8
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
Working Across All Departments to Strengthen Organization-Wide Security
- Guidance on sharing security information to identify gaps in company-wide defenses
- Implementing joined-up processes for all staff to appropriately raise concerns about security risks
- Engaging with senior leaders to secure resources for strengthening security measures
James Kim, Director of Strategy and Programs, City National Bank
Embedding New Security Technology to Improve Operational Resilience
- Evaluating security technology options to ensure new software contributes towards cyber resilience objectives
- Engaging with teams to incorporate new technology into working processes
- Key advice on utilizing new software to tackle risks with user authentication in working systems
Working in Partnership to Tackle Cyber Risk within Supply Chains
- Utilizing risk management measures as part of procurement processes for new suppliers
- Incorporating data sharing agreements into supplier contracts to tackle cyber risks in partnerships
- Supporting venders to evaluate their security measures and improve cyber resilience within supply chains
Establishing Benchmarks to Monitor the Performance of Security Controls
- Adapting security benchmarks to suit the size and priorities of an organization
- Tools to collect benchmark data and monitor trends in the performance of security measures
- Evaluating the performance of security controls to inform future benchmarks
Panel Discussion: Developing Governance & Accountability Policies to Strengthen Organization-Wide Cyber Resilience
- Embedding information security into decision-making processes to develop cyber resilient working practices
- Aligning security governance strategies to support other company objectives and priorities
- Implementing accountability frameworks to determine the impact and responsibility of risk decisions made by senior leaders