13 - 15 Sep • America • Online
Building a Positive Security Culture Across the Business
Security Digital Summit
With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.
Join 70+ senior Security leaders on business-critical challenges and disruptive technology and drive your industry forward collaboratively.
70
Attendees100%
Senior Executives9 Hrs
Industry InsightsSpeakers include
Siva VRS
GM & Global Practice Head of Security
Shawn Kirk
Global Head of Security, Identity and Compliance Specialized Sales
Mike Britton
Chief Information Security Officer
Stephen Boyer
CTO & Co-Founder
Dr. Pablo Breuer
Executive Director
Sujeet Bambawale
CISO
Vaibhav Garg
Cybersecurity Research & Public Policy
Derek Brink
VP & Research Fellow
Chuks Ojeme
Global Chief Information Security and Compliance Officer
Rinki Sethi
VP and CISO
Mark Odom
CISO
Why Attend
Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:
Build new connections with likeminded senior leaders
Stay current with emerging business trends
Understand the impact new technology can make
De-risk new projects by gaining a broad range of insights
Accelerate key projects through meaningful new partnerships
Downloadable and actionable takeaways
Event agenda
09:00 - 09:20
Opening Remarks
Intro & Challenger Panel
3 Roundtable moderators
09:20 - 09:50
Keynote
Mission Focused Security
As the CISO for your organization, you’ll have your projects and deliverables in your head, and your cyber team will recognize the importance – but how do you translate that to the board?
09:55 - 10:35
Workshop
Supply Chain Attacks; The Good, The Bad, and the Ugly
Build and Sign process - ensuring integrity throughout this process
10:35 - 10:45
Insight Break
10:45 - 11:45
Roundtables
Track 1: Underground or in the Cloud: The Reality of Risk Being Omnipresent
Risk, by its very definition, is something deemed uncontrollable – and it’s fast become realized by organizations the need to invest heavily in security.
Track 2: Data Pirates & How to Protect your Treasure
The volumes of data we accumulate transcends departments within the organization of the 21st century and shows no signs of slowing down.
Track 3: What You Need to Know “Now” about Modern Application Development (MAD)
Today, software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they are beginning to agree that their software development models, and release frequencies, can no longer keep pace
11:50 - 12:20
Closing Keynote
Ransomware: The Virtual Pandemic
In 2020, ransomware attacks were more expensive than the average cyber-attack, costing organizations around $4.44 million – and the maliciousness of the crime means we need to take them far more seriously than the average data breach.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Workshop
Understanding Your Insider Risk, and the Value of Your Intellectual Property
The term insider refers to known users (or systems) with authorized access to your organization's systems, applications, and data.
09:45 - 10:25
Interactive Panel
Leveraging Data and Modeling to Understand Ransomware and Financial Exposure
The list of high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.
10:25 - 10:35
Insight Break
10:35 - 11:35
Roundtables
Track 1: Underground or in the Cloud: The Reality of Risk Being Omnipresent
Risk, by its very definition, is something deemed uncontrollable – and it’s fast become realized by organizations the need to invest heavily in security.
Track 2: Data Pirates & How to Protect your Treasure
The volumes of data we accumulate transcends departments within the organization of the 21st century and shows no signs of slowing down.
Track 3: What You Need to Know “Now” about Modern Application Development (MAD)
Today, software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they are beginning to agree that their software development models, and release frequencies, can no longer keep pace
11:40 - 12:10
Closing Keynote
Using Research to Reprogram the Cyber Kobayashi Maru
The fundamental problem of cybersecurity is the asymmetry between the attacker and the defender.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Lessons from Fintech to Elsewhere
In 2017, PwC ran a “Global Fintech Report”, and found 82% of financial institutions expect to partner with a FinTech firm within the next five years. Well, that time is soon and we’ve seen a meteoric growth – and with that we have seen a similarly expansive growth in the need for cybersecurity in this sector.
09:45 - 10:25
Workshop
Security Automation - how to Breach the Talent Gap?
With the increased importance in security, it’s now more crucial than ever that talent accrued by the CISO is exceptional
10:25 - 10:35
Insight Break
10:35 - 11:35
Roundtable Review
11:40 - 12:10
Closing Keynote
Building a positive security culture across the business
With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.