6 - 8 Apr • Europe • Online
Being proactive in a democratised age!
Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
70
Attendees100%
Senior Executives9 Hrs
Industry InsightsSpeakers Include
Glenn Attridge
Deputy CISO and Head of Cyber Defense and Security Response
Andrea Szeiler
CIO
Sudhanshu Kairab
Vice President Cybersecurity Governance, Risk, & Compliance
Stephen de Vries
Co-Founder and CEO
Emre Tinaztepe
Founder/CEO
Jay Kaplan
Co-Founder and CEO
Nuno Teodoro
CSPO
Kayla Williams
CISO
Geert van der Linden
EVP Cyber Security
Nicolas Corrarello
EMEA Solution Engineer Lead
Que Tran
Regional CISO
Christos Syngelakis
CISO
Frank Satterwhite
Principal Cyber Security Consultant
Bedria Bedri
Partner, Cyber Security
Tim Phipps
Director Of Business Development
James McLeod
Director of Community
Simon Maple
Field CTO
Gil Geron
CPO & Co-Founder
Justin Vaughan-Brown
VP Product Marketing & Strategic Comms
Mike McLellan
Director of Intelligence, CTU
Filip Verloy
Technical Evangelist EMEA
Why Attend
Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:
Build new connections with likeminded senior leaders
Stay current with emerging business trends
Understand the impact new technology can make
De-risk new projects by gaining a broad range of insights
Accelerate key projects through meaningful new partnerships
Downloadable and actionable takeaways
Event Agenda
09:00 - 09:20
Opening Remarks
09:20 - 09:50
Keynote
A Perspective on AI through a Cyber Security Lens
09:55 - 10:35
Workshop
How to improve organisational learning after a cybersecurity incident?
What is the key lesson you’ve seen organisations learn from cybersecurity incidents?What opportunities do you see for organisations to improve how they learn from cybersecurity incidents?
10:35 - 10:45
Insight Break
Start left in software security with secure design
Designing a secure application from the start is far more cost effective than playing whack-a-mole with security vulnerabilities in production. We will explore simple techniques to get developers thinking about security at the design stage, before they start writing code.
10:45 - 11:45
Roundtables
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:•How the software supply chain is becoming more complex and a greater attack vector•Explore new challenges that this complexity is creating as well as new regulatory obstacles•Mitigation strategies throughout the software development processes and environment
11:50 - 12:20
Closing Keynote
Staying Secure in the Midst of a Talent Crisis
CrisisThe worldwide cyber talent shortage is real and growing. Just in the US, the Labor Department estimates 600,000 more openings than qualified professionals. Globally, the gap is 2.7 million. The lack of skilled practitioners is leaving vulnerabilities unpatched and organizations dangerously exposed. But effective and innovative solutions can bridge the talent gap and address both near term and longer term needs.
In this session, we’ll explore:•Current options to increase the cyber talent capacity required to meet organizations’ current and future security needs•Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premise, cloud, networking, hosts, mobile, applications, etc•The challenges, and importance, of establishing a continuous testing practice to keep pace with the continuous application development and deployment methodologies•The advantages of leveraging crowdsourcing as part of your security operations.•The importance of standard testing frameworks and operational transparency in leveraging untapped and available security talent
12:20 - 12:30
Insight Break
Decentralising software security with security champions
Hiring enough application security experts to ensure that all software is built and deployed securely is an increasingly impossible task. The solution is to move the responsibility for security into the development teams themselves through security champions.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Panel Discussion
The Open Source Security Journey - from cynic to disciple
Open source is seen as a key catalyst of innovation and cost saving as organisations move towards democratised access to IT and citizen development. Realising the benefits of open source while staying safe is a complicated process and in this panel we will share view points from organisations that are at different stage of their journey.
09:45 - 10:25
Workshop
How cloud threats in 2021 have evolved our security strategy
Join Nico from Wiz & Frank from 1600 Cyber as they review the most notable cloud threats in 2021 and how their key learnings impact cloud security strategy in 2022. Last year proved to be another year of massive disruption on many levels. For security teams the impact was even more profound as cloud risks grew more complicated. Looking back at the most notable ones, like Log4J, it becomes clear current approaches create more work than results.
10:25 - 10:35
Insight Break
The importance of resilience after a breach in today's threat landscape
As the volume, speed and sophistication of cyber threats increases against an expanding enterprise attack surface, 100% breach prevention is unrealistic.
10:35 - 11:35
Roundtables
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:•How the software supply chain is becoming more complex and a greater attack vector•Explore new challenges that this complexity is creating as well as new regulatory obstacles•Mitigation strategies throughout the software development processes and environment
11:40 - 12:20
Closing Keynote
In the Fight With You
Choosing technology is often about looking for a reliable technology partner. But, in IT Security you need more than that, you need a Partner that will join in the fight with you and turn any unfair fight into a fairer one.This keynote looks at how it’s vital to have Partner that not only helps you technically to even up the playing field between you and your adversaries - but offers some other key support that you should consider with any Partners you chose to be in the fight with you?
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Can You Trust the Cloud with Your Sensitive Data?
Data is the lifeblood of any organization. However, many organizations have difficulty understanding where all of their sensitive data is located, and what additional protection and access controls they should implement, so that they remain compliant with relevant data privacy and data sovereignty regulations. The lack of clear solutions often means that sensitive and personally identifiable data remains on-premises, which increases operational cost, reduces data value and slows down the planned digital transformation.
In this keynote, we will cover:•Key challenges organizations typically face in trusting Hyperscalers with their sensitive data.•Highlight the importance of controlling digital sovereignty early on in the journey to cloud.•Show how adopting a Discover, Protect and Control methodology can help CISOs and DPOs leverage compliance as a business enabler and drive greater cloud adoption.•Share lessons learned from several customer success stories in which sensitive workload migrations were unblocked at various stages in the journey to cloud using a risk-based approach.
09:45 - 10:25
Workshop
The Modern CISO’s API Security Strategy
In 2011 Venture Capitalist Marc Andreessen wrote his seminal WSJ article titled “Why Software Is Eating The World”, today it is clear that API are fueling that software and securing them is paramount. Successful digital transformation, increased multi-cloud adoption, automation, and policies and initiatives like Open Banking and Gaia-X have given rise to the general adoption of APIs in most enterprises. We must take appropriate steps to ensure we can continue to drive innovation securely.
10:25 - 10:35
Insight Break
Becoming resilient with a new breed of forensic technology
After a breach, blocking and monitoring solutions are ineffective. Only a new breed of forensics can provide the data visibility for effective resilience at scale.
10:35 - 11:35
Roundtable Review
11:40 - 12:10
Closing Keynote
The changing landscape of 3rd party risk
Every day, businesses experience cybersecurity incidents that can become disruptive, costly, and significantly damage their reputation. Large companies at the center of vast data ecosystems, however, face a particularly thorny problem: managing cyber and privacy risks around information that travels to third parties and beyond. This panel explores the shifting challenges from security leaders who work as clients and thrid party providers.