SCHEDULE DETAILS Information of Event Schedules

World is committed to making participation in the event a harassment free experience for everyone, regardless of level of experience, gender, gender identity and expression

10:30 am

Global Risks, Hybrid Warfare & The Role Of Cybersecurity

Regional conflicts between states have unchained a more uncertain, volatile, ambiguous and complex world scenario that everyday is more critical not only for governments but for enterprises. One of the most likely strategies in hybrid warfare theatre is Cybersecurity attacks.

Tactical operations to achieve the goals of regular and irregular forces will be, among others, collapsing critical infrastructure, attempting to collapse stock markets, misinformation, political and social polarisation, psi ops, etc.
In order to achieve an effective, sustainable and resilient cybersecurity in our companies, it is fundamental to understand clearly what, how, when and who about global risks not only in cybersecurity but in the strategic fields of governance, their connections an the role of private sector in the hybrid warfare.

speaker-1

Gabriela Nava - Citibanamex

Panel Debate: Navigating Cybersecurity and Business Transformation in 2024

CISOs, CIOs and IT Security leaders increasingly seek to combat emerging cyberattack threats. In doing so, they face the challenge of identifying and adopting technologies that go beyond traditional network security architectures, propelling growth and sparking innovation. How can IT & security leaders deliver the global network transformation needed in 2024 whilst streamlining operations, automating tasks and reducing costs?

Join this Panel debate to discuss:

  • Cybersecurity Challenges in 2024: Strategies against emerging and sophisticated cyber threats to safeguard critical networks
  • Cutting-Edge Security Concepts: Implement zero trust and SASE to fortify defences against the next generation of cyber attacks
  • Drive Business Transformation and Value: How a connectivity cloud can help in making data-based decisions that streamline operations, automate tasks and make cost reductions

speaker-1

Gabriela Nava - Citibanamex

speaker-2

Leobardo Ahumada - Wärtsilä

speaker-3

Carlos Bravo - Gentera

speaker-4

Carlos Rosales - Provident México

Asset Management & Its Importance In IT Security

During this session we will understand why we must identify the organization's assets to define protection strategies for the most important part of the organization, where the greatest value of the company is produced.

speaker-1

Josue Monterrosa - Edenred

Coffee & Networking

Vulnerability Management : Do We Need To Fix Everything?

Vulnerability Management seems to be an endless process and sometimes frustrating for the teams involved in it, instead of trying to fix everything, think about of a risk based approach to better focus your limited resources to attend the most relevant topics your organization can afford.

speaker-1

Francisco Garcia Dayo - BNP Paribas Cardif

The Risk Framework As An Ally On The CISO´s Objectives

The idea would be to show how the risk team assesses, monitors, and pushes the implementation of policies that control the Risk including Cybe and Security . Ultimately Risk is an ally for the CISO because the CRO's and the CISO´s objectives tend to align

speaker-1

Alexander Hayes - Ualá

Networking Lunch

XM Cyber Case Study

NowBit SAAS Roundtable Topic TBC Soon

speaker-1

Guillermo Penagos - NowBit SAAS

Two Sides of the Same Coin: Risk Analysis, Essential in the Virtual World and in the Real Life

Risk analysis is an essential tool for cybersecurity and physical security. In the virtual world, it helps to identify and mitigate vulnerabilities that can be exploited by attackers. In the real world, it helps to prevent and respond to physical threats, such as fires, theft, and natural disasters. In this conference, we will explore how risk analysis can be used to improve security in both areas. We will share case studies and practical advice to help cybersecurity and physical security experts implement this tool in their organizations. Risk analysis is a powerful tool that can help protect organizations from a wide range of threats. By understanding and mitigating risks, organizations can improve their security and reduce their vulnerability to attacks

speaker-1

Antonio Bernal - GE

Coffee & Networking

SASE. Is It Something To Be Considered In A CISOs Strategy? And Why?

Nowadays, there is a lot of announcements from different vendors or solution in the market saying they provide a real SASE solution, or their solution is better. This session is about focusing in understand better what is SASE? why is this important for the organization from a security perspective? what are the benefits for the companies? and sharing other important aspects from the client's view that could make sense to other professionals or responsible.

speaker-1

Jose Carlos Herrera - Sigma

Cyber ​​Security Evolution

Quick recap from the birth of Cybersecurity and how it became an important factor in the survival and growth of companies. In addition to what to do to face the challenges of the new reality in the use of information technologies

speaker-1

Fernando Camacho - Actinver

Coffee & Networking

How To Generate A Security Model For My Organisation Without Dying In The Attempt?

One of the main problems of organizations is to generate an adequate strategy to face the challenges of information security and cybersecurity on a daily basis, since not always all the best practices or existing standards or all the solutions on the market apply to everyone, every line of business and company is different and the way of tackling the challenges must be different. The session I propose aims to give guidelines, and advice and share my experience on how to generate a FUNCTIONAL security model, which can be repeatable, applicable, and suitable for each organization regardless of its line of business, size, or sector

speaker-1

Carlos Rosales - Provident México

The Attack On The Supply Chain

The security of the supply chain is not limited only to the physical protection of assets, such as facilities, products, transportation, maritime, land, and air. The supply chain is a strategic activity in the world, so cybersecurity in the supply chain plays a very important role due to different aspects such as the following: • Strategic activity worldwide • Governments and countries can be seriously affected • The world economy is compromised if something happens in the supply chain. The risk is therefore very high, and today cybersecurity plays a very important role since companies globally share a large number of information with logistics carriers, giving rise to a possible information leak, which can end in a theft, or in a diversion of products to different countries from which they were supposed to arrive, or simply generating sabotage or deviations in processes to affect an entire economy. How can you get this? Intervening the systems of a company by installing contaminated software and once it has been installed legally in the company and is outside the scope of the firewall, executing a virus that alters the normal state of things. is this possible? Of course, and that is why we must work on this matter in depth. ​

speaker-1

Leobardo Ahumada - Wärtsilä

Conect with us​

CISO Edge México

Our Enterprise Edge events are premier digital strategies forums transforming the future of the digital enterprise ecosystem, attended by the world’s biggest brands, C-Level executives congregate to discuss the future of IT & Digital Business covering topics including Enterprise IT, Customer Engagement, AI/Robotics, IT Security, Innovation, Disruption & Analytics.

Speaker & Delegate Enquiries

Name: Kurt Large

Email: kurt@enterprise-edge.com

Sponsorship Enquiries

Name: Craig Shipley

Email: craig@enterprise-edge.com