CISOSummit 2014 June 11, 2014 to June 13, 2014, Berlin,Germany

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Chairman's Opening Michael Colao N/A
Co-ordinating cyber security activities at Lufthansa & in the wider airline industry Keynote Peter Andres · What are the cyber security priorities and challenges within the airline industry? · Co-ordinating ...
Security Lessons from Cybercriminals: What can we do to Change the Game? Keynote Chris Triolo , Vp Global Services , Hp Enterprise Security N/A
Human Factors in Infosec: The Case for Digital Hygiene Keynote Ed Gelbstein N/A
Defending my business in the cyber jungle Case Study John I. Meakin N/A
Leadership for corporate culture and mentoring CISO for leadership / changing CISO roles Keynote & Discussion Thorsten Delbrouck N/A
What are we Doing about Cyber Security? Keynote Graham Edwards · What will you tell executives when they ask you this question? · How much ...
Consumerisation & Information Sharing – What Happens When it Goes Wrong? Keynote Mike Humphrey N/A
Merging Agents & Acronyms: The Case to Consolidate DLP, APT, and ETDR Endpoint Agents David Guretz N/A
National cyber security strategy, capability & road ahead Keynote Gadi Evron N/A
The Science behind The Analogies Project Keynote & Competition! Bruce Hallas Creative insights on awareness around analogies and why this will improve engagement with stakeholders including ...
Leveraging global footprints to navigate the legal regulatory landscape to come - what do CISOs fear the most, the regulator or the incident? Panel John A. Colley , Michael Colao , Bjorn Bjornsvik • What is happening in relation to the draft EU Data Protection Regulation delays? What ...
The Internet of Things: It's Not New! Case Study Quentyn Taylor N/A
Phishing your employees- Lessons learned from phishing 5 million people Jim Hansen N/A
Vendors Den Audience Vote a Winner Panel John A. Colley , Geoff Harris , Neville Sankey The CISO’s ultimate, no nonsense snap-shot guide to the best emerging and innovative security technologies ...
The Business of Information Security: Establishing the Desired Outcome Bjorn Bjornsvik N/A
Meet the ethical hackers – what are the game-changers? Panel Gadi Evron , Richard Hollis , Eduardo Solana , Dilyan Batchev , Ilia Kolochenko • How can we best understand adversaries’ processes and building in security capabilities? Leveraging the ...
Big Daddy Digs Big Data Insights Richard Hollis Is “Big Data” just the latest hype or in fact a new way to document ...
How is the CISO role changing? What is intelligent security? How does risk management fit in? Panel Quentyn Taylor , John I. Meakin , Phil Genge , Claus Norup • Thoughts on how the CISO role changing? Currently and over the next 5 years? ...
Cyber risk prioritisation and preparedness- a global risk perspective Chairman's Opening & Case Study Marcus Alldrick N/A
Fitting information security into the big picture of business risk: defining the end state Case Study Nick Mankovich N/A
Keynote Eran Feigenbaum N/A
Cyber Intelligence: Implications for Risk Management Keynote James Hatch N/A
Security monitoring or surveillance? Hot words, dramatic headlines, political ambition and passionate advocates: What is a CISO to do? How difficult is it to balance security concerns with the protect Richard Hollis , Nick Mankovich , Frank Kedziur , Arne Jacobsen N/A
Cyber Security Insurance against Data Loss Keynote Michael Colao N/A
CISO best practices: security and risks of web applications Survey Results & Group Discussion Marco M. Morana , Tobias Gondrom N/A
The blurred boundary Insights & Discussion Frank Marsh N/A
Homomorphic Encryption: Myth or Panacea? Latest Trends on Cloud Cryptography Emerging Technologies Eduardo Solana Recent research breakthroughs have fundamentally changed our mindset when it comes to cloud security. From ...
Managing the Risks that Suppliers Represent to the Security of your Customer Data Case Study Phil Genge N/A
A CISO crisis plan for dealing with DLP & theft of intellectual property: stealing commercial secrets, disrupting businesses… Panel & Group Exercise David Cripps , Michael Colao , Dilyan Batchev , Brendan Byrne , John Pendleton • Group exercise a plan for dealing with: • Governments targeting companies • Politically motivated ...
Changing a Technology Driven IT4IT Security Organisation to a Business Facing Security Claus Norup N/A