(Use Google Chrome or Mozilla Firefox to secure your place)

Online and free to attend 
November 12-14 2019

There is no denying that cyber awareness is on the rise - Cyber Security is not new news, however what is new, are those behind the breaches and hacks finding new and more creative ways for organisations to break a sweat for their security.

Year on year, cyber-attacks grow in both frequency and sophistication, driven by the rise of AI, Cloud, Internet of Things (IoT), as well as the fact that the amount of data gathered, stored and analyzed continues to explode. The upside to this is that many companies are finally making cyber security a top priority, digging deeper into establishing where threats lie and looking to fight back with evermore sophisticated software and strategy.

At our Cyber Security Digital Summit, we’re going to assume you at least know the basics to Cyber Security and delve a little deeper into what to expect in 2020. But in case you’re still learning the basics, our sessions are designed for everyone to join and understand the cyber landscape that exists today, whether you’re at the beginning of your journey, or just looking for new ways to protect your company and provide a better security for others, this cybersecurity event will be your mecca of information and innovation for the future.

Key Themes

Improve Cyber Security Awareness in your organisation

Gather and analyse Threat Intelligence

Incident Response to security breaches or other cyberattacks

Implementing a Zero Trust Architecture

(Use Google Chrome or Mozilla Firefox to secure your place)


Day 1 - Tuesday 12 November 2019 EST        

09:30 - 10:10     The CISO Challenge: How to Effectively Speak Cyber Security to Your Executive Board 

New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees.  Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source of innovation that contributes to the business.  Given the enormous impact of security breaches and the increase in compliance requirements, CISOs need to communicate the value of cyber security across all levels of their organizations.

Join Chief Security Scientist, Joseph Carson as he discusses the changes cyber security professionals must make in order to expand their influence and align cyber security with business priorities so executive boards can see the business case for security investments.

    • Learn how to communicate to your Executive board and change perceptions that restrict cyber security effectiveness
    • Find out the key metrics to a CISO’s success
    • Learn how to make cyber security a more positive experience for all employees and departments
Joseph Carson, Chief Cybersecurity Scientist, Thycotic

11:00 - 11:40    Stay Ahead of Cyber Crime with Third Party Risk Management

Third-party vendor risk management is not a new concept, yet the risks posed to enterprises are evolving and as the risk of your supply chain grows, so does the importance of measuring and managing it. In this session, discover the current and emerging third-party cyber risk management approaches and challenges and how to mitigate those risks.

    • Learn how to adapt and solve both security and privacy challenges
    • Build consistent third-party risk measurement and reporting strategies
    • Discover how third-party cyber risk can drive key business decisions
Session reserved for One Trust

12:30 - 13:10    Calculate the True Cost of a Breach

While some breaches will seem harmless at first, with the evolving threat landscape moving at such an unparalleled speed, the task facing modern IT Security leaders now is vast. When it comes to data breaches, the question isn't if it will happen to your company, but when? What is the true cost of a breach? In this session, discover how to avoid the ripple effects of a breach which could affect your organization in years to come.

    • Understand how a breach could affect multiple aspects of a company’s operations
    • Learn how to detect an intrusion, abnormality or violation before it escalates
    • Protect sensitive information and data to avoid the cost of a data breach
Session reserved for Axonius

14:00 - 14:40   Panel Discussion: Who is responsible for Cyber Security in the enterprise?

Cyber Security is still primarily seen as an ‘IT issue’ and this often means that security often gets “bolted on” rather than embedded in a company’s ecosystem. In this panel discussion, discover why everyone within the business is responsible for Cyber Security and how to educate the enterprise on safeguarding customer data.  
Key takeaways 
  • Improve security by creating a culture of healthy suspicion 
  • Encourage the executive board to communicate policies 
  • Ensure best practice is maintained throughout your business

Kim Parham, Information Governance Compliance Analyst, Yum! Brands
Kayne McGladrey, Director of Security & IT, CIO, CISO, Pensar Development 

    Day 2 - Wednesday, 13 November 2019 EST

    09:30 - 10:10     Assess the Human Element in Cyber Risk

    Insider threat via a company’s own employees (and contractors and vendors) is one of the largest unsolved issues in cybersecurity. On the surface, defining insider threat seems self-explanatory–a source of potential danger or harm to an organization stemming from someone that is within or part of an organization. There are, however, varied sources and motivations of insider threat.

    • Illustrate the ways insiders create risk
    • Introduce ways to reduce insider risks and create a culture of security
    • Assessing the Human Element in Cyber Risk Analysis
    Session reserved for Code 42

    11:00 - 11:40    Stop Hackers Turning AI against Us with tighter security

    AI and deep ML are changing the world as we know it in some incredible ways, but it can also lead to attacks on a scale the world has never seen before. AI and ML are gradually finding their way out of the labs, to use as weapons to overcome these defenses by subverting the same logic and underlying functionality. In this session, discover how to stop hackers turning our AI security systems against us.

      • Intelligent evasion techniques to fight back against AI hackers
      • An understanding of the good vs evil AI cybersecurity battle
      • Fraud detection and security for AI crimes

    14:00 - 14:40    Fight against New Threat Paradigms with Cyber Threat Intelligence

    The history of network security efforts had primarily been focused on protecting connections to and from the network. After several years, threats began to shift and new threats required traditionally separate security tools to work together, to inspect and secure data. Today, as society continues to shifts towards a digital economy, security tools that can effectively defend against new threat paradigms are only as effective as the threat intelligence behind them thus, the race between IT professionals and cyber criminals continue.

      • Learn what threat intelligence is, how it works and how it can be utilised 
      • Discover new interconnected threat intelligence skills and strategies 
      • Prepare, prevent, and identify cyber threats looking to take advantage of your resources

    Day 3 - Thursday, 14 November 2019 EST

    09:30 - 10:10     Protect your Online Assets with Cyber & Cloud

    The cloud revolution is upon us. We are witnessing more and more businesses moving their critical IT infrastructure and data to the cloud however the internet is not always a safe environment and living in the digital age means that we are exposed to an increasing number of new risks. In this session, discover new ways to protect and guard  networks and computers connected to the internet.

      • Develop a continuity plan for protecting your sensitive data and systems
      • Centralizes the protection of your applications and data
      • Reduce costs and administrative overheads

    11:00 - 11:40    Zero Trust Architecture: The Modern Approach To Cybersecurity

    Businesses who want to reliably prevent the exfiltration of sensitive data and improve their ability to defend against modern cyberthreats can consider a Zero Trust architecture. Zero trust architecture ensures that data and access across the network are secure and based on parameters like user identity and location. It inspects and logs all traffic, learns and monitors network patterns, and adds authentication methods into the security mix, all with the goal of seeing every user and device connected to the network at any moment.

    • Understand your data better and know how it flows through your network
    • Discover how to implement strong authentication
    • Ditch the legacy architecture and enforce the Zero Trust mentality

    (Use Google Chrome or Mozilla Firefox to secure your place)


    This Digital Summit is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks. Based on our ongoing relationship supporting (ISC)2 we are able to provide this convenience as a service to you. For additional CPE opportunities please go to www.isc2.org.