GLOBAL CYBER SECURITY LEADERS

Size: px
Start display at page:

Download "GLOBAL CYBER SECURITY LEADERS"

Transcription

1 ANNUAL SUMMIT GLOBAL CYBER SECURITY LEADERS EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. 30 th NOVEMBER - 1 st DECEMBER, 2015 WALDORF ASTORIA BERLIN GERMANY IMPROVING THE STATE OF CYBER SECURITY IN THE DIGITAL AGE Join other industry leaders and global experts to discuss the latest trends, solutions and techniques in cyber security 20+ International Speakers 30+ Innovative and Content Driven Summit Sessions 30+ Hours of Exclusive Networking Presentations include: Hoang Bao Alexander Oesterle Jakub Boratynski Kim B. Larsen Director of Policy, Privacy & Data Governance, Yahoo, USA Global VP Governance, Risk & Compliance and CSO, SAP, Germany Head of Unit H4, Trust & Security, DG Connect, European Commission, Belgium CSO, Huawei Technologies, Denmark Dr. Bernd Eßer Uday Deshpande Arieh Shalem Gianluca Varisco Head of Cyber Defense & CERT, Deutsche Telekom AG, Germany CISO, Tata Motors, India CISO, Orange Telecommunication, Israel VP Security, Rocket Internet SE, Germany Premium Partners Promoters Supporting Partners Mediapartners Hosted by Official Part of Global Leaders Summit Series EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN.

2 OUR MISSION: IMPROVING THE STATE OF CYBER SECURITY IN THE DIGITAL AGE You do not need to look further than the front page news to see that cyber-attacks are one of the biggest global and evolving threats. As more targeted and sophisticated security breaches continue to make the news, we have to face the reality that nothing and no one is safe from hacker attacks. But the situation is not hopeless! The Summit s mission is to establish an exclusive and interactive platform that brings together industry leaders in an effort to improve the state of cyber security on both a domestic and international level. Due to the vast range of cyber threats, cyber security requires active engagement of across every industry. Join the Global Cyber Security Leaders 2015 in Berlin and be part of a community of forward thinking cyber security executives from across the globe. Our content-driven, fresh and innovative programme features a diverse range of visionary and thought-provoking presentations, executive panel discussions and our Think Tank Academy specifically designed to enable attendees to share experiences and solve current and future challenges together. Benefit from a global platform that provides the unique opportunity to address the pressing issues pertaining to cybercrimes, learn from each other s successes and failures as well as network with other professionals in an inspiring environment. Stay abreast of the latest trends and best practices that impact your day-to-day responsibilities. Who will you meet? Chief Information Officers (CIO) Chief Information Security Officers (CISO) Chief Technology Officers (CTO) Chief Security Officer (CSO) EVP/SVP/VP, Heads and Directors of IT, Security, Cyber Intelligence, Risk and Compliance Chief Risk Officer, Chief Compliance Officer, Chief Privacy Officer Why should you attend? Benefit from our content-driven, fresh and interactive summit format: Access to a global and exclusive community of cyber security leaders Carefully selected topics which address the unrelenting needs in the face of rampant cyber threats Deep dive executive panel discussions and interactive Think Tank Academy to further elaborate on key issues behind closed doors Unparalleled international and exclusive networking opportunities to foster business relationships Learn from leading companies how to: Establish an effective Cyber Security Strategy Address the human factor in cybersecurity Predict threats and forecast emerging security challenges Move your organization beyond reactiveness to pro-activeness Improve your threat intelligence and cyber security response plan With a roster of outstanding speakers from various global industries from around the world, this summit promises to provide an unique experience of networking, learning, mind sharing and benchmarking. The time is now to act globally! Lova Rakotoarinjatovo Programme Development Manager, Management Circle AG Irene Schirru Partnership Development Manager, Management Circle AG Christian Kuhn Head of International Business, Management Circle AG

3 Monday, 30 th November 2015 Summit Programme Day One Establishing an Effective Cyber Security Strategy 8:00 9:00 Event Registration & Welcome Coffee and Tea Opening Global Cyber Security Leaders Welcome Address 9:00 9:15 Lova Rakotoarinjatovo, Programme Development Manager, Management Circle AG Summit Moderator Peter Warren, Editor, Future Intelligence, UK 9:15 9:45 Keynote Presentation Cyber Security Trends and Strategic Implications Dr. Bernd Eßer, Head of Cyber Defense & CERT, Deutsche Telekom AG, Germany 9:45 10:10 Insight Presentation Embedding and Enhancing Information Security Governance and Culture across the Entire Organisation Mannan Godil, VP & Head Information Security, CISO, Edelweiss Financial Services Ltd., India 10:10 10:30 International Networking & Coffee Break 10:30 11:00 Keynote Presentation Managing Cyber Security Challenges European Dimension Jakub Boratynski, Head of Unit H4, Trust & Security, DG Connect, European Commission, Belgium 11:00 11:25 Insight Presentation Building an Effective Cyber Resiliency Program for your Enterprise: A Practical Case Study Khadir Fayaz, VP Information Security, Global Growth Markets, Pearson, Singapore 11:25-12:25 Think Tank Academy Exchange ideas and best practices on important topics and challenges Crowdsourced Application Security: How to Leverage the Security Community to Strengthen your Application Security Esben Friis-Jensen, Co-founder and Chief Product Officer, Cobalt, USA The User is a Pain Point in Security: What to Do? Paul Moreno, Security Engineering Lead, Pinterest, USA 12:25 1:25 International Networking & Lunch Insider Threats: What Works and What Doesn t to Prevent, Detect and Respond? Alexander Oesterle, Global VP Governance, Risk & Compliance and CSO, SAP SE, Germany Understand the Revolutionary Methods of Cyber-Attacks and Prepare Your Counter Strategy Roadmap Gianluca Varisco, VP Security, Rocket Internet SE, Germany 1:25 1:55 Keynote Presentation China s Threat Intelligence and Mobile Security Landscape Feng Xue, Founder & CEO, ThreatBook, China 1:55 2:35 Executive Panel Discussion The Next-Gen Cyber Threats and Actors: How to Win the Cyberwar Battlefield? Dr. Bernd Eßer, Head of Cyber Defense & CERT, Deutsche Telekom AG, Germany Bodo Meseke, Partner for Fraud Investigation & Dispute Services, EY, Germany Narayan Neelakantan, AVP - Head IT Risk and Compliance & CISO, National Stock Exchange, India Cesar Oliveira, Global IT Security Manager, Vale, Brazil Arieh Shalem, CISO, Orange Telecommunication, Israel

4 Summit Programme Day One 2:35 3:00 Insight Presentation Privacy and Security by Design: Baking it in is Good for Business Sharon Anolik, President & Founder, Privacy Panacea, USA 3:00 3:25 Insight Presentation Creating a Better Threat Intelligence which Fosters Secure Business Environments and Processes; and Identifies Risks Daniel Aviz Bastos, CISO, ViaVarejo SA, Brazil 3:25 3:45 International Networking & Coffee Break 3:45 4:45 Think Tank Academy Exchange ideas and best practices on important topics and challenges Cyber Security Strategy - Is your Enterprise Risk Management Aligned to your Cyber Risk Appetite? Lakshmi Hanspal, Senior Leader - Information Security and Risk Management, PayPal, USA Fundamentals of a Successful Cybersecurity Key Success Factors Michael Köhler, Head of Cybersecurity, Application Services, Capgemini, Germany Where to Invest Resources, What to Prioritize in Cybersecurity? Mike Loginov, Vice Chairman Global MBA Cyber Security Advisory Board, Coventry University; COO, ISSA UK; Founder & CEO, Ascot Barclay Cyber Security Group, UK 4:45 5:10 Insight Presentation The Human Factor in Cyber Security Insider Threat and How to Be Prepared as an Organization Alexander Oesterle, Global VP Governance, Risk & Compliance and CSO, SAP SE, Germany 5:10 5:35 Insight Presentation Reducing the Risks of Cyber-Attacks by Understanding the Hacker Mindset Mike Loginov, Vice Chairman Global MBA Cyber Security Advisory Board, Coventry University, UK, COO, ISSA UK, Founder & CEO, Ascot Barclay Cyber Security Group, UK 5:40 6:10 Keynote Presentation Risk Management and Threat Mitigation Kim B. Larsen, CSO, Huawei Technologies, Denmark 6:30 International Networking & Cocktails 7:15 International Networking Dinner Tuesday, 1 st December 2015 Summit Programme Day Two Rethinking the Future of Security in an Uncertain World 7:15 8:00 SightRunning 7:30 8:30 International Networking & Breakfast 8:30 9:00 Keynote Presentation Life After a Breach Brad Arkin, VP & Chief Security Officer, Adobe Systems, USA 9:00 9:25 Insight Presentation Are You Thinking about IT Outsourcing? Top 10 Reasons, Risks and Rewards Lakshmi Hanspal, Senior Leader - Information Security and Risk Management, PayPal, USA 9:25 9:50 Insight Presentation Building Trust by Design: How to Integrate Privacy, Security, and Safety into your Product Hoang Bao, Director of Policy, Privacy & Data Governance, Yahoo, USA

5 9:50 10:20 International Networking & Coffee Break 10:20 10:50 Keynote Presentation CISO in the Cloud with Diamonds Arieh Shalem, CISO, Orange Telecommunication, Israel 10:50 11:50 Think Tank Academy Exchange ideas and best practices on important topics and challenges How to Benefit from Low Cost Open Source Technologies Whilst Ensuring Security Uday Deshpande, CISO, Tata Motors, India Launching Efficient and Cost-Effective Bug Bounty Programs Paul Moreno, Security Engineering Lead, Pinterest, USA Roadmapping your Security Strategy for the Cloud Arieh Shalem, CISO, Orange Telecommunication, Israel 11:50 12:15 Insight Presentation New Threats Require New Leadership: Redefining the Core Skills and Capabilities for a CISO Role Narayan Neelakantan, AVP - Head IT Risk and Compliance & CISO, National Stock Exchange India, India 12:15 1:15 International Networking & Lunch 1:15 1:55 Executive Panel Discussion At the Intersection of Privacy, Safety and Security How to Find Common Ground? Sharon Anolik, President and Founder, Privacy Panacea, USA Lakshmi Hanspal, Senior Leader - Information Security and Risk Management, PayPal, USA Kim B. Larsen, CSO, Huawei Technologies, Denmark Alexander Oesterle, Global VP Governance, Risk & Compliance and CSO, SAP SE, Germany 1:55 2:20 Insight Presentation Design of a Cyber Security Industrial Control Systems Program Cesar Oliveira, Global IT Security Manager, Vale, Brazil 2:20 2:45 Insight Presentation Harnessing the Power of IoT Technologies While Ensuring Security and Safety Uday Deshpande, CISO, Tata Motors, India 2:45 3:10 Insight Presentation Surviving the First 100 Days as a New CISO Michael Meli, Executive Director, CISO, Bank Julius Baer & Co. Ltd., Switzerland 3:10 3:30 International Networking & Coffee Break 3:30 4: 00 Spotlight Exclusive Interview The Future of Cybersecurity and the Evolving Role of CISO Jitender Arora, Information Security and Risk Executive, Jitender s Perspective, UK 4:00 4: 25 Insight Presentation Affordable Cyber Security Plan: Learnings from Startups Gianluca Varisco, VP Security, Rocket Internet SE, Germany 4:25 4:55 Keynote Presentation Insight and not Information - A Board Room Requirement on GRC Reporting Amit Pradhan, CTSO - CISO, Vodafone, India 4:55 Moderator s Closing Comments Peter Warren, Editor, Future Intelligence, UK Prize Draw: Weekend for two at the Hotel Waldorf Astoria Hand in your evaluation form to qualify!

6 GLOBAL CYBER SECURITY LEADERS 2015 EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. ANNUAL SUMMIT 30 th NOVEMBER - 1 st DECEMBER, 2015 WALDORF ASTORIA BERLIN GERMANY 3 Easy Ways to Register Online: [email protected] Phone: Aleksandar Pavlovski at Registration Conditions Please note that acceptance of your application is prerequisite to your participation. Applications will be considered on a first come first serve basis to ensure your participation at the event we recommend registering early! The fee for attending this two day event is 2.395,-. We offer a discounted rate of 2.095,- to NGOs. All prices named do not include statutory VAT. Cancellation policy: A cancellation free of charge is possible up to eight weeks prior to the event. If the registration is cancelled at a later date, or should participant fail to appear, we will charge the entire registration fee. Cancellation must be in writing The participation fee includes: Access to all presentations and executive discussions Access to all networking events Cocktail reception Exclusive, enjoyable and relaxed networking dinner Think Tank Academy All networking and summit meals Summit documentation Priority discount registration for next year s event The Perfect Environment to meet Your Expectations The Waldorf Astoria Berlin is ideally located in the heart of Berlin City West. The setting of this landmark destination is matched by its unparalleled facilities including stylish dining and entertainment venues, sophisticated conference and event facilities, as well as providing extraordinary spa experiences at Germany s first Guerlain Spa Waldorf Astoria. This is luxury at its finest. Waldorf Astoria Berlin Hardenbergstrasse Berlin, Germany Phone: Connect. Explore. CoCreate.

GLOBAL TALENT MANAGEMENT LEADERS 2015

GLOBAL TALENT MANAGEMENT LEADERS 2015 GLOBAL TALENT MANAGEMENT LEADERS 2015 EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. ANNUAL SUMMIT 26 th - 27 th OCTOBER, 2015 WALDORF ASTORIA BERLIN GERMANY CHALLENGING THE FUTURE OF HR AND TALENT MANAGEMENT

More information

GLOBAL DIGITAL LEADERS

GLOBAL DIGITAL LEADERS 2 nd ANNUAL SUMMIT GLOBAL DIGITAL LEADERS EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. ANNUAL SUMMIT 30 th - 31 st MAY 2016 WALDORF ASTORIA BERLIN GERMANY Join the world s most forward-thinking digital leaders

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

How To Attend Global Digital Leaders 2015

How To Attend Global Digital Leaders 2015 GLOBAL DIGITAL LEADERS 2015 EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. 15 th - 16 th JUNE, 2015 WALDORF ASTORIA BERLIN BERLIN, GERMANY April 20 th, 2015 Pre-Summit Cocktail Reception Over 25 Summit Sessions:

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

5 th Global Mining IT & Communication Summit 4-5 November 2015 Toronto, Canada

5 th Global Mining IT & Communication Summit 4-5 November 2015 Toronto, Canada visit our website: www.fleminggulf.com Big Data, IoT, Digitalization & Changing DNA of Mining CIOs 5 th Global Mining IT & Communication Summit 4-5 November 2015 Toronto, Early Confirmed Speakers Lino

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

SYMPOSIUM PROGRAM DAY ONE

SYMPOSIUM PROGRAM DAY ONE Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

Put your Head in the Cloud at Phorum

Put your Head in the Cloud at Phorum Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,

More information

SPONSORSHIP 2016. 27th ANNUAL WORLD CONGRESS REGIONAL NETWORKING EVENTS. The world s premier networking event for Cyber Security leaders

SPONSORSHIP 2016. 27th ANNUAL WORLD CONGRESS REGIONAL NETWORKING EVENTS. The world s premier networking event for Cyber Security leaders SPONSORSHIP 2016 27th ANNUAL WORLD CONGRESS 22 25 October, Berlin, Germany REGIONAL NETWORKING EVENTS Over 50 meetings worldwide including UK, Germany, Benelux, the Nordics, USA, Canada, the Middle East

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

Business Forecasting and Analytics Forum

Business Forecasting and Analytics Forum #JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily

More information

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

THE SECURITY OF THINGS

THE SECURITY OF THINGS THE SECURITY OF THINGS SECOT SECOT THURSDAY, SEPTEMBER 10, 2015 7:30 AM 4:30 PM CAMBRIDGE, MA Overview In its second year, The Security of Things Forum (SECoT 2015) is a high-impact day of learning, discussion

More information

The Private Banking Conference & Awards: London 2014 Gibson Hall, London, UK 4th June 2014

The Private Banking Conference & Awards: London 2014 Gibson Hall, London, UK 4th June 2014 The Private Banking Conference & Awards: London 2014 Gibson Hall, London, UK 4th June 2014 The Private Banking Conference & Awards: London 2014 brings together private banks, family offices, independent

More information

DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015

DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015 DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015 Overview We find ourselves in the thick of the Digital Revolution. Riding on the back of a broadband economy, there is a growing emphasis on creating

More information

SPONSORSHIP PROSPECTUS

SPONSORSHIP PROSPECTUS SPONSORSHIP PROSPECTUS Integrating Energy for the Quality of Life The Smart Grid Interoperability Panel (SGIP) is a consortium that securely accelerates and advances Grid Modernization through interoperability

More information

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

Don t Get Left in the Dust: How to Evolve from CISO to CIRO SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

A FORUM FOR DEBATE, A CATALYST FOR CHANGE 7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

First EU Factoring and Commercial Finance Summit

First EU Factoring and Commercial Finance Summit A JOINT INITIATIVE BETWEEN IFG FCI EUF First EU Factoring and Commercial Finance Summit Brussels, Belgium / 27 January 2015 WITH THE KIND SPONSORING OF: Meet key EU decision makers, Members of EU Parlement,

More information

10th. Gaylord Palms Resort & Convention Center, Kissimmee (Orlando), Fla. Feb. 25-27, 2015

10th. Gaylord Palms Resort & Convention Center, Kissimmee (Orlando), Fla. Feb. 25-27, 2015 10th ANNUAL Gaylord Palms Resort & Convention Center, Kissimmee (Orlando), Fla. Feb. 25-27, 2015 FMA s premier conference for metal fabrication professionals is a business event that doesn t feel like

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

SPONSORSHIP2015. Annual World Congress. Regional Networking Events. The World s No 1 networking event for Cyber Security leaders. 7-10 November, USA

SPONSORSHIP2015. Annual World Congress. Regional Networking Events. The World s No 1 networking event for Cyber Security leaders. 7-10 November, USA SPONSORSHIP2015 The World s No 1 networking event for Cyber Security leaders Annual World Congress 7-10 November, USA Regional Networking Events Over 50 meetings worldwide including UK, Germany, Benelux,

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

0830 0845 Welcome Remarks, IDMA President, Dana Reynolds, SAC Ravenelle

0830 0845 Welcome Remarks, IDMA President, Dana Reynolds, SAC Ravenelle Session: Program on Risk Management Date: Thursday, March 26, 2015 Schedule: 0800 0830 Registration, Beverage and Breakfast Service 0830 0845 Welcome Remarks, Dana Reynolds, SAC Ravenelle 0845 1200 Main

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

OPENTEXT GLOBAL FAX SUMMIT 2011

OPENTEXT GLOBAL FAX SUMMIT 2011 OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

DAY 1 MONDAY, SEPT 28 2015

DAY 1 MONDAY, SEPT 28 2015 MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER

More information

BI & IM SYMPOSIUM CALL FOR SPONSORS

BI & IM SYMPOSIUM CALL FOR SPONSORS BI & IM SYMPOSIUM CALL FOR SPONSORS 24 TH AND 25 TH OF NOVEMBER 2014 By participating as a sponsor to the Business Intelligence & Information Management Symposium 2014 you have access to high level contacts

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Data Protection Compliance in the EU

Data Protection Compliance in the EU Advanced Training Course Data Protection Compliance in the EU Maastricht (NL), 7-9 December 2015 European Institute of Public Administration Institut européen d administration publique Introduction Target

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

CIH South East Conference & Exhibition 2016 8-10 March The Brighton Centre. Exhibition, Sponsorship and Advertising Packages

CIH South East Conference & Exhibition 2016 8-10 March The Brighton Centre. Exhibition, Sponsorship and Advertising Packages CIH South East Conference & Exhibition 2016 8-10 March The Brighton Centre Exhibition, Sponsorship and Advertising Packages Exhibition Rates Space only 330 +VAT per square metre Shell Scheme 399 +VAT per

More information

DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE. November 18-21, 2013 Boston University School of Management Executive Leadership Center

DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE. November 18-21, 2013 Boston University School of Management Executive Leadership Center DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE Boston University Executive Programs November 18-21, 2013 Boston University Executive Leadership Center For complete program details visit bu.edu/data

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

A DistribuTECH EVENT JAN. 27 28, 2014. grand hyatt san antonio. http://elpconference.com

A DistribuTECH EVENT JAN. 27 28, 2014. grand hyatt san antonio. http://elpconference.com A DistribuTECH EVENT JAN. 27 28, 2014 grand hyatt san antonio San Antonio, Texas http://elpconference.com Owned & Produced by: Presented by: Media Sponsor: Host Utility: The improved and completely reformatted

More information

GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security

GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security DON T MISS OUT ON THE OPPORTUNITY TO: IQPC S CYBER SECURITY SERIES PRESENTS Hear from the EMV designers to learn how implementing this technology will protect your network Learn how to keep retailers and

More information

SEBP2015. S i n o - E u r o B i o P a r t n e r i n g 中 欧 生 物 医 药 项 目 合 作. Industry Insight Innovation Fostering Bio-Investment Roadshow & Partnering

SEBP2015. S i n o - E u r o B i o P a r t n e r i n g 中 欧 生 物 医 药 项 目 合 作. Industry Insight Innovation Fostering Bio-Investment Roadshow & Partnering Thursday May 14 th, 2015 Shanghai, China a S i n o - E u r o B i o P a r t n e r i n g 中 欧 生 物 医 药 项 目 合 作 Industry Insight Innovation Fostering Bio-Investment Roadshow & Partnering INTRODUCTION A partnering

More information

Healthcare Internet Conference

Healthcare Internet Conference Leading The Digital Transformation 19th Annual Greystone.Net Healthcare Internet Conference ORLANDO November 9-11, 2015 The Omni Orlando Resort at ChampionsGate www.hcic.net CALL FOR SPEAKERS Organized

More information

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

Asia Pacific the Future of Cloud Computing

Asia Pacific the Future of Cloud Computing Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why

More information

MONDAY MAY 4 TH DAY 1

MONDAY MAY 4 TH DAY 1 MONDAY MAY 4 TH DAY 1 4:30pm-6pm Roundtable Sessions Innovate or Perish Moderator: Wade Allen VP Customer Engagement & Digital Innovation, Brinker International Trends - threats to the status quo and/or

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

Cyber Security key emerging risk Q3 2015

Cyber Security key emerging risk Q3 2015 Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

International Conference On Factoring And Other Receivables Finance Products

International Conference On Factoring And Other Receivables Finance Products WITH THE KIND SPONSORING OF: IFG REGIONAL CONFERENCE: Regional Conference on Factoring in Asia International Conference On Factoring And Other Receivables Finance Products Hong Kong / Tuesday, 24 November

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

e-reward.co.uk LONDON 12th MAY 2016 E-REWARD PRESENTS SHOWCASE ON SALES COMPENSATION 75 FREE TICKETS AVAILABLE

e-reward.co.uk LONDON 12th MAY 2016 E-REWARD PRESENTS SHOWCASE ON SALES COMPENSATION 75 FREE TICKETS AVAILABLE e-reward.co.uk DELEGATE PROSPECTUS 75 FREE TICKETS AVAILABLE E-REWARD PRESENTS SHOWCASE ON The sales compensation plan is one of the most significant drivers of performance in the sales organisation. And

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

Customer Experience Summit 2015 Brand strategies for facing the challenge of the all-powerful consumer

Customer Experience Summit 2015 Brand strategies for facing the challenge of the all-powerful consumer Business Reporter Inner Circle presents: Customer Experience Summit 2015 Brand strategies for facing the challenge of the all-powerful consumer February 23 rd -24 th, Gouman Tower, Tower Bridge, London

More information

THE SUN RISES IN THE EAST

THE SUN RISES IN THE EAST ANNUAL DANISH TOP EXECUTIVE SUMMIT 2012 THE SUN RISES IN THE EAST ARRANGED BY VL23 30. & 31. JANUARY 2012 TIVOLI CONGRESS CENTER ANNUAL DANISH TOP EXECUTIVE SUMMIT 2012 ARRANGED BY VL23 MARGRETHE VESTAGER

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

Security and Privacy Trends 2014

Security and Privacy Trends 2014 2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,

More information

e-discovery Conference

e-discovery Conference Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce

More information

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

The CSO/CISO Roundtable

The CSO/CISO Roundtable The CSO/CISO Roundtable 27th October 2014 - Meeting notes Organised by the Security Awareness Special Interest Group in association with ASIS International and The Security Company (International) Limited

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information