Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS — this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximizing networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
Jeevan Lobo, VP – Security & Governance, Citi
Designing Information Security Strategies to Suit Business Needs
- Engaging with senior leaders to inform business priorities for information security policies
- Collaborating with staff to improve the usability of cyber security controls as part of working processes
- Guidance on using cyber security measures to create a competitive advantage against competitors
Michael Holcomb, Fellow & Director of Cyber Security, Fluor
Implementing Company Updates to Meet National Information Security Standards
- Working with all departments to understand changes required to adhere to new SEC regulations
- Tools and resources to increase efficiency in data collection processes as part of improving transparency around cyber security measures
- Regular reviews of information security measures to ensure they meet new national requirements
Richard Mendoza, Senior Director, Privacy & Regulatory Compliance, Anywhere Real Estate
Addressing Workforce Security Skills Shortages to Ensure Cyber Resilience
- Evaluating team capabilities to identify gaps in cyber security knowledge and inform training schemes
- Adapting security resilience initiatives to tackle human error incidents
- Key tips on securing resources from senior leaders to provide security skills training
Sajed Naseem, CISO, NJ Judiciary
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
Expanding Detection Capabilities to Prevent Cyber Security Threats Escalating into Incidents
- Ensuring all staff understand their responsibilities in identifying and reporting security threats
- Evaluating security incident data to identify emerging trends in cyber threats
- Regular reviews of detection tools to tackle increasingly sophisticated attacks
Mehan Kasinath, VP, Enterprise Information Security, IAC
Adapting Recruitment Strategies to Ensure Diverse Teams & Expand Workforce Capabilities
- Designing recruitment schemes to create teams with a broader range of backgrounds and experiences
- Creating entry points at different levels of seniority to attract more applicants for cyber security roles
- Key tips on using diverse hiring panels to tackle unconscious biases in recruitment processes
Andrew Stravitz, Regional CISO, Veolia
Zero Trust: It’s a Concept, Not a Product
- Doing good security does not mean buying a security product
- Security needs to be baked in, not added on
- Real security is everyone’s job, not just the security department!
Joel Rosenblatt, Director, Computer & Network Security, Columbia University
Leadership Strategies to Support Talent Development & Retention Policies
- Working with employees to establish professional goals and ensure internal progression opportunities for all staff
- Professional development schemes to expand staff skillsets and reduce employee turnover
- Designing interventions to identify and support employees struggling with their workload
Tamika Bass, Director, Cyber Security, Gannett Fleming
Coffee break & networking
Workshop 4
SOC Renovation: 3 principles to adapt to detection & response at the scale of threats
Workshop 5
Defense against the hidden supply chain: Uncovering third-party risk to the Nth tier
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel Discussion: Developing Response Plans to Manage the Impact of Ransomware Attacks
- Engaging with all staff to recognize and report potential cyber security events
- Embedding joined-up procedures in response to ransomware attacks to recover damaged assets
- Crisis leadership strategies to ensure all employees understand and fulfil their role in tackling ransomware attacks
Amit Basu, VP, CIO & CISO, International Seaways
Steve Rocco, Director, Information Technology Security, Matthews International Corporation
Morning registration & breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Ajith Edakandi, Director, Managed Security Services of Product Management, Hughes Network Systems
Alex Bermudez, CISO & Product Security Officer, Fisker
Michael Holcomb, Fellow and Director of Cyber Security, Fluor
Jajati Samal, Director, Cyber Security, Bristol-Myers Squibb
Kwadwo Buachie, Director, Information Security, Inova
Roundtable wrap-up by the Chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Workshop 6
Overcoming the disconnect between what you see & what attackers see
Workshop 7
Best practices for effectively addressing third-party security risk
Workshop 8
Advanced endpoint protection
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
Working Across All Departments to Strengthen Organization-Wide Security
- Guidance on sharing security information to identify gaps in company-wide defenses
- Implementing joined-up processes for all staff to appropriately raise concerns about security risks
- Engaging with senior leaders to secure resources for strengthening security measures
James Kim, Director of Strategy & Programs, City National Bank
Embedding New Security Technology to Improve Operational Resilience
- Evaluating security technology options to ensure new software contributes towards cyber resilience objectives
- Engaging with teams to incorporate new technology into working processes
- Key advice on utilizing new software to tackle risks with user authentication in working systems
Ramachandra Hegde, CISO, Genpact
Using AI to Tackle Cyber Risk within Supply Chains
- Utilizing risk management measures as part of procurement processes for new suppliers
- Incorporating data sharing agreements into supplier contracts to tackle cyber risks in partnerships
- Supporting venders to evaluate their security measures and improve cyber resilience within supply chains
Keith Dempsey, CISO, Aris Global
Establishing Benchmarks to Monitor the Performance of Security Controls
- Adapting security benchmarks to suit the size and priorities of an organization
- Tools to collect benchmark data and monitor trends in the performance of security measures
- Evaluating the performance of security controls to inform future benchmarks
Jajati Samal, Director, Cyber Security, Bristol-Myers Squibb
Panel Discussion: Developing Governance & Accountability Policies to Strengthen Organization-Wide Cyber Resilience
- Embedding information security into decision-making processes to develop cyber resilient working practices
- Aligning security governance strategies to support other company objectives and priorities
- Implementing accountability frameworks to determine the impact and responsibility of risk decisions made by senior leaders
Raj Sharma, VP, Head, Information Security, Northern Bank
Atif Butt, Associate VP, Cyber Security, NBA
Edward Bezerra, VP, Infrastructure Operations (I & O, Enterprise Architecture & Cyber Security), K. Hovnanian