3rdCISO360Congress 2019 June 19, 2019 to June 21, 2019, Rome, Italy

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: Host Nation Dr. Stefano Zanero N/A
Opening Keynote: Risk-taking and decision-making Caspar Berry Caspar Berry uses the metaphor of poker as a vehicle to communicateuniversally resonant messages around ...
EU Highlights What are the top two current security challenges for organisations globally? Joel Stradling Discover what the top two security challenges for organizations are globally based onnew key findings ...
Unique Keynote: What can exercises in future-thinking tell us about the cybersecurity and international diplomacy challenges that we need to prepare for? Dr. Victoria Baines By now we should all be zooming around in flying cars, teleporting to meetings,and holidaying ...
Keynote and Practical Use Case Stories Using AI to counter the next generation of cyber-threats Marina Pereira With so much hype, it’s hard to work out what’s truly AI, what’s not, and ...
4 BIG QUESTIONS What is technology’s current emerging role in international diplomacy? Predictions and trade-offs Gadi Evron , Dr. Victoria Baines , Prof. Cilli , Paul Brucciani , Tim Varkalis Engaging the audience with some of the big questions challenging leaders today.1. What responsibility does ...
Unique Keynote: Cyber Resilience for the Aviation Sector to Enhance Overall Cyber Preparedness Dvir Rubinshtein N/A
Keynote Understanding the criminal mind: how Western European BEC syndicates leverage business intelligence James Linton James (also known as the Email Prankster!) will expose the inner workings of asophisticated, UK-based ...
Panel: Cyber Crime - How are AI/ML and disruptive technologies supporting sustainable, ethical and forward-thinking operations? Mariana serras Pereira , Friedelien Brockerhoff , Tom Gamali , Abdul Latif Jameel , Ben Bulpett , Ben Jeffreys Practical applications, ethics and governance of advanced technologies incybersecurity today - a ‘live’ snapshot. • ...
Keynote: 10 Proven ways in 10 minutes to develop a GDPR-Ready Incident and Breach 72-Hour Action Plan! Vipul Asher N/A
Innovation Insights Quantum-a double-edged sword? How do we future Quantum-proof our current and future infrastructures? Dr. Pfeiffer Quantum Computing is a double-edged sword, its usage for stronger encryptionversus its usage to break ...
Keynote Back from the Future: What do the films Terminator, iRobot and Minority Report have to do with Identity Governance? Ben Bulpett N/A
Keynote Balancing Investment and Security Risk Reduction Richard Turner N/A
Case Study: 100 days as a CISO: lessons learned from Scriptkiddie to CISO Mark Snel N/A
Keynote: Back to Data Security Basics: What’s Getting Lost in All the Buzz Matt Middleton-leal • We are spending more than ever on data security: Why is the number of ...
Unique Keynote: What is the True Cost of Security? Thomas Langford , Comic Relief Thom shares his personal story of workplace stress and mental health trials in theinformation security ...
Keynote: DNS: Cyber Security’s Best Kept Secret Ben Jeffreys N/A
Unique Keynote: Threat from Business Espionage Robert Shaw N/A
Case study: Cloud journey Marc Lueck N/A
Panel: How do we build a successful culture of security, privacy and trust? Navigating complex regulatory oversight to ensure ethics and compliance Mark Felegyhazi , Matt Middleton-leal , Colette Hanley , James Gosnold , Martyn Booth , Rob Robinson , Lee Cartmell Privacy is becoming an ever-increasing concern in the world. Social Networks,GDPR and on the opposite ...
Opening Keynote: Cybersecurity, Intellectual Property and Investment Jim Hinton Market update on where IP in cybersecurity is headed on emerging threats andpredictions on how ...
Keynote: Protecting your Organisations’ “Very Attacked” People Richard Davis Building a people-centric security model based around an understanding of whoyour organisations’ “Very Attacked People” ...
Unique Keynote: Away with Cassandra Gadi Evron N/A
KEYNOTE A: Security Threat that is often Overlooked Richard Mat While companies spend large amounts of money on cybersecurity,fraud, dataleakage and virus protection for good ...
Case study Integrated Security for IT/IoT/OT Protection Edward Ayman Ganom Address the growing trend of convergence between the IT, IoT, and OT networks. A case ...
Case Studies Supply chain cyber risk monitoring: Adapting to the Paulo Glórias Learn how leading organizations are transforming their 3rd & 4th party cyberrisk management programs to ...
Keynote: Telemetry Data - the Rise of JavaScript Injection for Browser Based Attacks Fabian Libeau Revealing insights into the rise in browser-based attacks and the risk theypose to any organisation ...
Keynote: How a Red Team can get quick wins! Andrew Mabbitt Hear some of Andrew’s war stories from leading red team engagementsfor leading UK and U.S. ...
Group Exercise Maximising Security in Complex Technological Enterprises – how can we advance the CISO’s role in fast transforming business enterprises? Dr Sally Leivesley CISO’s in Italy and other EU countries are supporting high technology innovationthat is driving business ...
Unique Keynote and Live Demos: How supply chain flaws become endemic Ken Munro Ken will break new research and show threat profiles not talked about before, aswell as ...
Keynote How to Transform your SOC (Security Operations Centre) for Maximum Efficacy Edvinas Pranculis N/A
Case study Rules of the Anti-CISO: building CISO Offices for the modern world Simon Lloyd N/A
Keynote: Future Foresight in Higher Education Irene Corpuz N/A
Panel: ‘Them and Us’! Building resilience and governance across supply chains Riccardo Bianchi , Aulo Glórias , Graeme Cantu-park , Adam Drabik , Amy Lemberger •Building governance and due diligence within the supply chain•Emerging approaches to outsourcing cyber risk •Assessing ...
Panel: How do we build truly diverse, authentic and inclusive risk and security teams? Irene Corpuz , Dr. Victoria Baines , Mark Snel , Lee Cartmell , Mark Ampleford We need to diversify the composition of our teams and therefore theway that we identify ...
The ultimate sound-boarding and benchmarking for today’s CISOs and cybersecurity leaders... Marcus Alldrick , Michael Colao , Irene Corpuz , Dvir Rubinshtein , Paul Hopkins N/A