CISO Institute: UK

CISO Institute: UK

Location: Ascot

Date: Thursday 21st March 2024

Time: 08:30 - 17:30 GMT

Event Summary

The Global CISO Institute Event Series delivers a world-class full day of collaboration, networking, and discussions focusing on the latest trends and challenges currently faced within the industry. Provided through a dynamic combination of thought leadership and best practice strategies, our exceptional end-user-driven academic platform assists digital business leaders in improving productivity and growth within their organisations.

 

Some of the key challenges to be explored throughout the day will include the next steps for digital transformation, scaling up cybersecurity, driving business value through data and the importance of technology leadership and culture.

 

Featuring 80-100 hand-picked C-level & senior IT leaders from our global IT community, the day will consist of thought-provoking Panel discussions, Keynote presentations, interactive Boardrooms, 1-2-1 brokered business meetings, and networking opportunities. Discussions are driven by experts in the field, basing their insights on key business outcomes and allowing all to access powerful and useful content throughout the event.

Dr Beverly McCann

Senior Cyber Security Analyst

Darktrace

Peter-Adams

Avant-Homes

Russell-Smith

Description text

Fabian Libeau

VP of Sales, EMEA

Axonius

2023/ 2024 Featured Attendees

2023 Featured Partners

Speakers

2024 Agenda

- Explore frameworks that empower CIOs to cultivate a culture of innovation within your teams and discuss the importance of aligning technology initiatives with overall business goals and how strategic innovation can drive long-term success

- Delve into the strategies to effectively navigate and capitalise in digital disruptions and how to successfully adapt to technological changes, emphasise bold decision-making and proactive approaches to stay ahead of the curve

- Examine practical steps and elements to foster a fearless, resilient and forward-thinking IT leadership culture

Moderator - Michael Knight, CTO, NHS South, Central and West

Panellists - 

  • Elizabeth Akorita, Group Deputy Director, Digital Delivery, Department for Science, Innovation and Technology
  • Praveen Kumar Vadlamani, CDIO & SVP Infrastructure & Technology, Technicolor Creative Studios
  • Mary-Jane Newton, Group Head, Digital Education Products, Nord Anglia Education
  • Discuss the role of threat intelligence in your cybersecurity strategy and how it contributes to strategic decision-making, risk assessment and your overall cybersecurity planning
  • Explore strategies for effectively integrating threat intelligence into your security operations, incident response and vulnerability management process
  • Discover the benefits of threat intelligence collaboration and sharing  within industry groups and information-sharing communities to enhance collective cybersecurity defense
  • Define the role that automation could have in processing and integrating threat intelligence feeds, enabling faster and more efficient response to emerging threats

In this session, we will explore the current state of email security and the role of automation in combating evolving cyber threats. Join us as we discuss the feasibility, benefits, and challenges of fully automated email security solutions, and gain valuable insights into the future of safeguarding your digital communications.​

Key discussion points:​

· The Journey of Email Security--Take a stroll through the history of email security, spotlighting the key problems it's tackled. We'll unpack how classic strategies have morphed to meet the shapeshifting landscape of cyber threats.​

· Automation Tech Unleashed--Zoom in on the freshest breakthroughs in automation with a spotlight on GenAI and machine learning. Peek behind the curtain to see how these powerhouses are revolutionizing the email security scene, transforming how we spot and smack down threats.​

· Real Talk on Automation's Impact--Let's dig into the nuts and bolts of what fully automated email security brings to the table. We'll sift through real-life examples and gold-standard tactics to figure out if the era of automated email security is now and how it reshapes your cyber game plan.

Justin Pemberton, Sr. Director of Sales, UK & Europe, IRONSCALES

- Explore the implementation of zero-trust approach to enhance security by continuously verifying identities and monitoring access
- Discuss the need for continuous monitoring of user activities and access patterns to detect and respond to anomalies promptly, also the importance of having in place a robust incident response plan to address identity and access-related security incidents promptly
- Address the challenges and solutions related to managing identities and access in a cloud-centric environment, ensuring a seamless and secure transition

- Understanding the importance of comprehensive risk assessment and digital risks and vulnerabilities associated with digital technologies and data
- Explore strategies for protecting digital assets from cyber threats and breaches
- Discuss techniques for identifying, assessing and prioritising risks across the organisation

- Discuss the importance of creating scalable cloud infrastructure to accommodate business needs and optimise resource allocation to maximise cost efficiency
- Address the significance of building robust cloud architectures to ensure high availability and reliability for critical business operations
- Explore strategies for effective data management, storage solutions and data lifecycle management with cloud infrastructure
- Discover the benefits and challenges of adopting hybrid and multi-cloud approaches to leverage the strengths of cloud providers
- Best practices for implementing robust security measures to safeguard data and applications within cloud infrastructure

Himanshu Jha, Cloud CTIO, Formerly TSB

- How does a Security Governance Framework prioritise and address emerging cyber threats in the current landscape?
- Can you elaborate on the key elements that make the Governance Framework adaptable to evolving threat landscapes?
- How do you ensure a balance between proactive risk management and the need for business agility within the organisation?
-How can this Framework align with compliance requirements and standards for risk management, particularly within regulated industries?
- Can you share insights into the integration of threat modelling within the risk management aspects of the Governance Framework?
- How do you communicate the value of the Security Governance Framework and its impact on risk reduction to leadership and stakeholders?
- How does the Framework accommodate and secure the use of emerging technologies such as AI and Machine Learning while maintaining robust security measures?
- What strategies are employed to foster a culture of continuous learning and adaptation to stay ahead of emerging threats in the cybersecurity landscape?

Andy Piper, CISO, Barclays

- Discuss the role of threat intelligence in your cybersecurity strategy and how it contributes to strategic decision-making, risk assessment and your overall cybersecurity planning
- Explore strategies for effectively integrating threat intelligence into your security operations, incident response and vulnerability management process
- Discover the benefits of threat intelligence collaboration and sharing  within industry groups and information-sharing communities to enhance collective cybersecurity defense
- Define the role that automation could have in processing and integrating threat intelligence feeds, enabling faster and more efficient response to emerging threats

Recent ransomware attacks have crippled public services and caused significant damage to enterprises across industry. In this session we will explore the latest tools available to protect your organisation from the demands of hackers utilising increasingly sophisticated and prominent ransomware.


- Assessing the evolution of ransomware and why ransomware attacks are emerging
- Exploring new technologies available to prevent and protect against malware attacks
- Uncovering vulnerabilities across your enterprise that are open to being exploited

The threat landscape is continually becoming more complex and dangerous. This session will help you learn about the newest threats and vulnerabilities to your enterprise.

Featured Partners

bizagi
IRON SCALES
neptune software
GITA
WizIO
Rectangle 3-1

Apply for your 2024 VIP pass

Apply here to join our exclusive event.

Upcoming Events

Get in Touch

    Would you like to receive exciting news and information from GBI Digital?


    Scroll to Top