Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS — this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximizing networking opportunities. The software designs a personalized agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
How to Manage Regulatory Compliance Requirements Efficiently
- Cybersecurity solutions to tackle existing and upcoming regulations
- A deep dive into the new NIST Cybersecurity framework
- Latest US Cybersecurity Laws and Regulations and tips on how to be compliant
Richard Mendoza, Senior Director, Data Privacy & Regulatory Compliance, Anywhere Real Estate
How the New SEC Cyber Disclosure Rules will Reframe the Role of the CISO
- How to meet the SEC’s disclosure requirements to mitigate any potential risks
- How to successfully collaborate closely with all stakeholders, including executive leadership, legal counsel, and compliance teams.
Amit Basu, CIO & CISO, International Seaways
Panel: A Look at the Cybercrime Landscape in 2024 So Far & What Can We Expect in 2025?
- How has this landscape evolved recently?
- What type of attacks can businesses now be facing?
- How is the rise of cyber threats’ sophistication directly linked with the improved cybersecurity practices and tools within companies and organisations?
Coffee break & networking
Workshop 1
Continuous Threat Exposure Management: A Step Change in Vulnerability Management
Workshop 3
Navigating the Impact of DORA: What US Companies should know about the new EU DORA Regulation
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
Cyber Security Resilience: Key Strategies for Protecting Your Digital Assets
- Understanding the evolving threat landscape, and how to emphasize risk assessment and management techniques.
- The importance of establishing robust policies, response plans and governance structures
Data Security: Understanding how Data-Driven Controls Enable Organizations to Dynamically Adapt to Emerging Cyber Threats
- Learn how data-driven controls enable you to adapt to emerging cyber threats by leveraging real-time data analytics
- Discover how the integration of data-driven controls enhances the efficiency of incident detection and minimizing the impact of security incidents
Bhargava Gorty, Senior Director Application Security & Data Protection, Columbia University
Redesigning & Evolving your Cyber Security Strategy to Try & Stay Ahead of Hackers or at Least Keep up with Them
- The essential components underpinning your overall security posture and business agility
- What are the best practises for building an efficient roadmap?
- The 10 measures you can take to mitigate internal and external data breaches
Embedding Real-Time Security Controls to Meet the Threats Posed by Cloud Computing
- Taking immediate action on threats to your enterprise through automated response
- Increasing visibility across your enterprise without sacrificing operational performance
Coffee break & networking
Workshop 4
Cyber Leadership
Workshop 5
Looking Ahead to 2025: Preparing for Next year’s Cyber Security Challenges
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel: Best practices for Attracting & Retaining the Right Cyber Security Talent
- How can you stand-out from the crowd to meet changing demands from modern candidates?
- What are the next expectations of employers?
- Diversity & Inclusion: How can you utilize D&I technology to bolster your talent pool & create an industry leading team with diverse skills?
Morning registration & breakfast
Introduction from the Chairperson
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Chuck Golliday, CISO, Ellkay
Roundtable wrap-up by the Chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Workshop 6
Vulnerability Management
Workshop 7
Strengthening Digital Trust as part of Cyber Security Policies
Workshop 8
Developing Benchmarks to Monitor the Performance of Security Controls
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
The Role of Human Error in Successful Cyber Security Breaches and What you can do to Protect Your Organization
- How are employees being targeted and what vulnerabilities are being exposed?
- How can we harmonise organisational protocol with the mitigation of human error?
- What training protocols have worked well? And are there any more tools at our disposal to encourage vigilance?
Understanding the Importance of Security Awareness Training
- What innovative approaches are being employed in SAT programs
- How effective are they in reducing human-related risks?
- What are the most significant cybersecurity threats facing organizations?
Michael Pilch, ISO, University of Delaware
Gaining and Maintaining Control over Third Parties
- Conducting due diligence in selecting a third party from global ICT service providers
- Supervision of third-party relationships through continuous monitoring, response and SLAs
- Addressing increasing cyber risks caused by evolving third party networks; defining scope of third-party risk Management
Successfully Responding to Security Breach Incidents
- Preparing incident response plans to establish the roles of all staff in managing a security breach
- Learning from security breaches to address causes to incidents & improve cyber resilience
Panel: Exploring the Latest Technological Advancements When it Come to Protecting Your Organization
- Learning from past mistakes – discussing the different approaches and concerns industries need to consider when tackling issues arising from implementing new technologies
- Understanding how AI will soon become a necessary skill for any CISO who wants to stay relevant in the field
- Why investing in new technologies defence is the only way to keep up with the coming wave of AI-powered attacks