SCHEDULE DETAILS Information of Event Schedules
World is committed to making participation in the event a harassment free experience for everyone, regardless of level of experience, gender, gender identity and expression
Global Risks, Hybrid Warfare & The Role Of Cybersecurity
Tactical operations to achieve the goals of regular and irregular forces will be, among others, collapsing critical infrastructure, attempting to collapse stock markets, misinformation, political and social polarisation, psi ops, etc.
Panel Debate: Navigating Cybersecurity and Business Transformation in 2024
CISOs, CIOs and IT Security leaders increasingly seek to combat emerging cyberattack threats. In doing so, they face the challenge of identifying and adopting technologies that go beyond traditional network security architectures, propelling growth and sparking innovation. How can IT & security leaders deliver the global network transformation needed in 2024 whilst streamlining operations, automating tasks and reducing costs?
Join this Panel debate to discuss:
- Cybersecurity Challenges in 2024: Strategies against emerging and sophisticated cyber threats to safeguard critical networks
- Cutting-Edge Security Concepts: Implement zero trust and SASE to fortify defences against the next generation of cyber attacks
- Drive Business Transformation and Value: How a connectivity cloud can help in making data-based decisions that streamline operations, automate tasks and make cost reductions
Coffee & Networking
Vulnerability Management : Do We Need To Fix Everything?
Vulnerability Management seems to be an endless process and sometimes frustrating for the teams involved in it, instead of trying to fix everything, think about of a risk based approach to better focus your limited resources to attend the most relevant topics your organization can afford.
The Risk Framework As An Ally On The CISO´s Objectives
The idea would be to show how the risk team assesses, monitors, and pushes the implementation of policies that control the Risk including Cybe and Security . Ultimately Risk is an ally for the CISO because the CRO's and the CISO´s objectives tend to align
XM Cyber Case Study
Two Sides of the Same Coin: Risk Analysis, Essential in the Virtual World and in the Real Life
Risk analysis is an essential tool for cybersecurity and physical security. In the virtual world, it helps to identify and mitigate vulnerabilities that can be exploited by attackers. In the real world, it helps to prevent and respond to physical threats, such as fires, theft, and natural disasters. In this conference, we will explore how risk analysis can be used to improve security in both areas. We will share case studies and practical advice to help cybersecurity and physical security experts implement this tool in their organizations. Risk analysis is a powerful tool that can help protect organizations from a wide range of threats. By understanding and mitigating risks, organizations can improve their security and reduce their vulnerability to attacks
Coffee & Networking
SASE. Is It Something To Be Considered In A CISOs Strategy? And Why?
Nowadays, there is a lot of announcements from different vendors or solution in the market saying they provide a real SASE solution, or their solution is better. This session is about focusing in understand better what is SASE? why is this important for the organization from a security perspective? what are the benefits for the companies? and sharing other important aspects from the client's view that could make sense to other professionals or responsible.
Coffee & Networking
How To Generate A Security Model For My Organisation Without Dying In The Attempt?
One of the main problems of organizations is to generate an adequate strategy to face the challenges of information security and cybersecurity on a daily basis, since not always all the best practices or existing standards or all the solutions on the market apply to everyone, every line of business and company is different and the way of tackling the challenges must be different. The session I propose aims to give guidelines, and advice and share my experience on how to generate a FUNCTIONAL security model, which can be repeatable, applicable, and suitable for each organization regardless of its line of business, size, or sector
The Attack On The Supply Chain
The security of the supply chain is not limited only to the physical protection of assets, such as facilities, products, transportation, maritime, land, and air. The supply chain is a strategic activity in the world, so cybersecurity in the supply chain plays a very important role due to different aspects such as the following: • Strategic activity worldwide • Governments and countries can be seriously affected • The world economy is compromised if something happens in the supply chain. The risk is therefore very high, and today cybersecurity plays a very important role since companies globally share a large number of information with logistics carriers, giving rise to a possible information leak, which can end in a theft, or in a diversion of products to different countries from which they were supposed to arrive, or simply generating sabotage or deviations in processes to affect an entire economy. How can you get this? Intervening the systems of a company by installing contaminated software and once it has been installed legally in the company and is outside the scope of the firewall, executing a virus that alters the normal state of things. is this possible? Of course, and that is why we must work on this matter in depth.
CISO Edge México
Our Enterprise Edge events are premier digital strategies forums transforming the future of the digital enterprise ecosystem, attended by the world’s biggest brands, C-Level executives congregate to discuss the future of IT & Digital Business covering topics including Enterprise IT, Customer Engagement, AI/Robotics, IT Security, Innovation, Disruption & Analytics.
Speaker & Delegate Enquiries
Name: Kurt Large
Name: Craig Shipley