PDF Download TBC Agenda (PDF)

CISO Think Tank Frankfurt
TBC

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by three to four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in roundtable style, focusing on best practices

View detailsExecutive Boardroom

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFireside Chat

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

View detailstitle

desc_short

Saturday, December 31, 2016 - CISO Think Tank Frankfurt

3:30 pm
-
4:00 pm

Registration

4:00 pm
-
4:10 pm

Welcoming Address and Opening Remarks

Presented by:

View detailsJames Quin, VP, Events , CDM MediaCDM Media

4:15 pm
-
5:15 pm

CISO Think Tank

Timeline of a Breach

It has become a familiar refrain that there are two types of companies today; those that have already been breached, and those that just don’t know they have already been breached. Despite our best efforts, focusing purely on keeping the bad guys out is proving to be unsuccessful and whether by exploiting people, process, or technology vulnerabilities, breaches are still occurring, and seemingly doing so at an ever increasing pace. While we absolutely need to maintain focus on preventing breaches wherever possible, our scope has expanded such that we now need to invest resources into reacting more efficiently to breaches as they are occurring, and responding after the fact to mitigate their impact. This all-hands facilitated discussion will deep-dive into the timeline of a breach, looking at all of the measures that an enterprise needs to put in place ahead of a breach, the actions it needs to take while a breach is occurring, and the follow-up steps that cannot be forgotten once the breach is resolved.

Takeaways:
  • Breaches are everywhere and the associated numbers, both in terms of frequency and impact, are growing significantly – a head in the sand approach is asking for trouble
  • The responsibilities of the CISO are changing – it’s no longer just about trying to keep the bad guys out, but responding effectively once they’ve gotten in
  • The human element simply cannot be ignored – investing in technology can only provide a foundation upon which good people processes must be built

Presented by:

View detailsJames Quin, VP, Events , CDM MediaCDM Media

5:15 pm
-
5:30 pm

Networking Break

5:30 pm
-
6:30 pm

CISO Think Tank

It Takes Years to Build a Brand and Only Seconds to Destroy It

There's a well known saying, attributed to FBI Director James Comey, that there are two types of businesses: "Those who've been hacked... and those who don't know they've been hacked" an opinion born out by study after study that shows as many as 90% of businesses already have been hacked. It’s time to face the facts—traditional security just isn’t enough. Most enterprises have a purpose-built perimeter, network, and endpoint security in place, but they don’t solve the “application security” challenge and don't protect all of the business-critical data and applications. It's time to start thinking about protecting what really matters - you data and you applications - because by keeping them safe, you'r also doing the same for your reputation.

Takeaways:

  • The threat landscape is ever evolving and we need to be vigilant to prepare for those changes
  • As we move from protecting networks, through protecting data and on to protecting brand we need to find new allies in the fight and the CMO can be that friend in need
  • Focusing on the business impact of attacks and breaches can help peers and the board become proactive in the security discussion

6:30 pm
-
8:00 pm

Private Dinner