Powered by

6 - 8 Apr • Europe • Online

Being proactive in a democratised age!

Days

Hours

Mins

Secs

Security Digital Summit

Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.

70

Attendees

100%

Senior Executives

9 Hrs

Industry Insights
image/svg+xml Watch video

Why Attend

Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:

Build new connections with likeminded senior leaders

Stay current with emerging business trends

Understand the impact new technology can make

De-risk new projects by gaining a broad range of insights

Accelerate key projects through meaningful new partnerships

Downloadable and actionable takeaways

Event Agenda

Day one
Day two
Day three

09:00 - 09:20

09:00 - 09:20

Opening Remarks

Gil Geron CPO & Co-Founder, Orca Security
Justin Vaughan-Brown VP Product Marketing & Strategic Comms, Deep Instinct
Simon Maple Field CTO, Snyk

09:20 - 09:50

09:20 - 09:50

Keynote

A Perspective on AI through a Cyber Security Lens

Geert van der Linden EVP Cyber Security, Capgemini

09:55 - 10:35

09:55 - 10:35

Workshop

How to improve organisational learning after a cybersecurity incident?

What is the key lesson you’ve seen organisations learn from cybersecurity incidents?
What opportunities do you see for organisations to improve how they learn from cybersecurity incidents?

Craig McEwen CISO, Anglo American
Glenn Attridge Deputy CISO and Head of Cyber Defense and Security Response, NatWest Group
Bedria Bedri Partner, Cyber Security, Deloitte U.K
Clare Patterson CyberCompare (Bosch) Advisory Board member and PHD Researcher, University of Kent
Kayla Williams CISO, Devo

10:35 - 10:45

10:35 - 10:45

Insight Break

Start left in software security with secure design

Designing a secure application from the start is far more cost effective than playing whack-a-mole with security vulnerabilities in production. We will explore simple techniques to get developers thinking about security at the design stage, before they start writing code.

Stephen de Vries Co-Founder and CEO, IriusRisk

10:45 - 11:45

10:45 - 11:45

Roundtables

Track 1: Going on the offensive in a democratised age

The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.

Gil Geron CPO & Co-Founder, Orca Security
Nuno Teodoro CSPO, Huawei

Track 2: Preparing for the Security Savvy Board

Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.

Justin Vaughan-Brown VP Product Marketing & Strategic Comms, Deep Instinct

Track 3: The Challenges Around Securing Software Supply Chains

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:
•How the software supply chain is becoming more complex and a greater attack vector
•Explore new challenges that this complexity is creating as well as new regulatory obstacles
•Mitigation strategies throughout the software development processes and environment

Simon Maple Field CTO, Snyk

11:50 - 12:20

11:50 - 12:20

Closing Keynote

Staying Secure in the Midst of a Talent Crisis

CrisisThe worldwide cyber talent shortage is real and growing. Just in the US, the Labor Department estimates 600,000 more openings than qualified professionals. Globally, the gap is 2.7 million. The lack of skilled practitioners is leaving vulnerabilities unpatched and organizations dangerously exposed. But effective and innovative solutions can bridge the talent gap and address both near term and longer term needs.

In this session, we’ll explore:
•Current options to increase the cyber talent capacity required to meet organizations’ current and future security needs
•Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premise, cloud, networking, hosts, mobile, applications, etc
•The challenges, and importance, of establishing a continuous testing practice to keep pace with the continuous application development and deployment methodologies
•The advantages of leveraging crowdsourcing as part of your security operations.
•The importance of standard testing frameworks and operational transparency in leveraging untapped and available security talent

Jay Kaplan Co-Founder and CEO, Synack

12:20 - 12:30

12:20 - 12:30

Insight Break

Decentralising software security with security champions

Hiring enough application security experts to ensure that all software is built and deployed securely is an increasingly impossible task. The solution is to move the responsibility for security into the development teams themselves through security champions.

Stephen de Vries Co-Founder and CEO, IriusRisk

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Panel Discussion

The Open Source Security Journey - from cynic to disciple

Open source is seen as a key catalyst of innovation and cost saving as organisations move towards democratised access to IT and citizen development. Realising the benefits of open source while staying safe is a complicated process and in this panel we will share view points from organisations that are at different stage of their journey.

James McLeod Director of Community, Fintech Open Source Foundation
Robb Keayes VP - Architect, Office of the CTO, Nomura Bank
Paul D Fox Executive Director and Distinguished Engineer, Morgan Stanley

09:45 - 10:25

09:45 - 10:25

Workshop

How cloud threats in 2021 have evolved our security strategy

Join Nico from Wiz & Frank from 1600 Cyber as they review the most notable cloud threats in 2021 and how their key learnings impact cloud security strategy in 2022. Last year proved to be another year of massive disruption on many levels. For security teams the impact was even more profound as cloud risks grew more complicated. Looking back at the most notable ones, like Log4J, it becomes clear current approaches create more work than results.

Nicolas Corrarello EMEA Solution Engineer Lead, WIZ
Frank Satterwhite Principal Cyber Security Consultant, 1600 Cyber

10:25 - 10:35

10:25 - 10:35

Insight Break

The importance of resilience after a breach in today's threat landscape

As the volume, speed and sophistication of cyber threats increases against an expanding enterprise attack surface, 100% breach prevention is unrealistic.

Emre Tinaztepe Founder/CEO, Binalyze

10:35 - 11:35

10:35 - 11:35

Roundtables

Track 1: Going on the offensive in a democratised age

The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.

Gil Geron CPO & Co-Founder, Orca Security
Nuno Teodoro CSPO, Huawei

Track 2: Preparing for the Security Savvy Board

Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.

Justin Vaughan-Brown VP Product Marketing & Strategic Comms, Deep Instinct

Track 3: The Challenges Around Securing Software Supply Chains

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:
•How the software supply chain is becoming more complex and a greater attack vector
•Explore new challenges that this complexity is creating as well as new regulatory obstacles
•Mitigation strategies throughout the software development processes and environment

Simon Maple Field CTO, Snyk

11:40 - 12:20

11:40 - 12:20

Closing Keynote

In the Fight With You

Choosing technology is often about looking for a reliable technology partner. But, in IT Security you need more than that, you need a Partner that will join in the fight with you and turn any unfair fight into a fairer one.
This keynote looks at how it’s vital to have Partner that not only helps you technically to even up the playing field between you and your adversaries - but offers some other key support that you should consider with any Partners you chose to be in the fight with you?

Mike McLellan Director of Intelligence, CTU, Secureworks

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Keynote

Can You Trust the Cloud with Your Sensitive Data?

Data is the lifeblood of any organization. However, many organizations have difficulty understanding where all of their sensitive data is located, and what additional protection and access controls they should implement, so that they remain compliant with relevant data privacy and data sovereignty regulations. The lack of clear solutions often means that sensitive and personally identifiable data remains on-premises, which increases operational cost, reduces data value and slows down the planned digital transformation.

In this keynote, we will cover:
•Key challenges organizations typically face in trusting Hyperscalers with their sensitive data.
•Highlight the importance of controlling digital sovereignty early on in the journey to cloud.
•Show how adopting a Discover, Protect and Control methodology can help CISOs and DPOs leverage compliance as a business enabler and drive greater cloud adoption.
•Share lessons learned from several customer success stories in which sensitive workload migrations were unblocked at various stages in the journey to cloud using a risk-based approach.

Tim Phipps Director Of Business Development, Thales

09:45 - 10:25

09:45 - 10:25

Workshop

The Modern CISO’s API Security Strategy

In 2011 Venture Capitalist Marc Andreessen wrote his seminal WSJ article titled “Why Software Is Eating The World”, today it is clear that API are fueling that software and securing them is paramount. Successful digital transformation, increased multi-cloud adoption, automation, and policies and initiatives like Open Banking and Gaia-X have given rise to the general adoption of APIs in most enterprises. We must take appropriate steps to ensure we can continue to drive innovation securely.

Filip Verloy Technical Evangelist EMEA, Noname Security

10:25 - 10:35

10:25 - 10:35

Insight Break

Becoming resilient with a new breed of forensic technology

After a breach, blocking and monitoring solutions are ineffective. Only a new breed of forensics can provide the data visibility for effective resilience at scale.

Emre Tinaztepe Founder/CEO, Binalyze

10:35 - 11:35

10:35 - 11:35

Roundtable Review

Gil Geron CPO & Co-Founder, Orca Security
Justin Vaughan-Brown VP Product Marketing & Strategic Comms, Deep Instinct
Simon Maple Field CTO, Snyk
Nuno Teodoro CSPO, Huawei

11:40 - 12:10

11:40 - 12:10

Closing Keynote

The changing landscape of 3rd party risk

Every day, businesses experience cybersecurity incidents that can become disruptive, costly, and significantly damage their reputation. Large companies at the center of vast data ecosystems, however, face a particularly thorny problem: managing cyber and privacy risks around information that travels to third parties and beyond. This panel explores the shifting challenges from security leaders who work as clients and thrid party providers.

Sudhanshu Kairab Vice President Cybersecurity Governance, Risk, & Compliance, Comcast
Andrea Szeiler CIO, Transcom
Que Tran Regional CISO, DP World
Christos Syngelakis CISO, Motor Oil Hellas

Event Highlights

Immerse yourself in the most advanced virtual event platform, blending the convenience and reach of digital with the interaction of physical events. Experience the new way to network with peers with interactive features including:

Audience Interaction

Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.

Live Polling

The ultimate live polling and gamification tools, keeping your audience engaged.

Audience Q&A

Enabling our team to help you control your session experience.

Interactive Quizzes

Interactive quizzes to gamify your session

Thought Leadership

Content and insight from industry experts when it matters most

FAQs

Still have a question contact us below

Previous attendees include