SCHEDULE DETAILS Information of Event Schedules
World is committed to making participation in the event a harassment free experience for everyone, regardless of level of experience, gender, gender identity and expression
Panel Debate: Moving From Cyber Security to Cyber Resilience, an Interactive Discussion
In today's rapidly evolving threat landscape, the imperative for cybersecurity has transcended mere defense to encompass a broader notion of cyber resilience. This shift underscores the need for CISOs to not only fortify security measures but also cultivate operational resilience, positioning them as strategic leaders within their organisations. Join us to explore how embracing cyber resilience transcends traditional security paradigms, empowering organizations to effectively anticipate, withstand, respond, and adapt to cyber threats. Let's pivot from outdated security notions to holistic resilience strategies, mitigating risks and propelling business resilience forward.
Join this panel debate to discuss:
- Collaborative Accountability — CEOs and CISOs unite in fostering cyber resilience, transcending siloed security approaches
- Informed Trust — Shift from blind to informed trust, accepting limited risk for resilience
- Operational Resilience — Identify minimum resilience levels to sustain key operations
More Than Ever, It Is Time To Think About Our Users
Nowadays, cyber attacks are violating our defences as if they did not exist, the importance of training our users is vital, remember that security begins with the users and ends with the users, the culture of backups, knowing how to act when we are under attack can help the problem not to multiply, as we can have Fire Wall, end points, sniffer, Drp plan, nas units, policies in our active directory and then we are getting hit with everything. It is vital to train our users to be able to deal with an attack.
Generative Artificial Intelligence: Transforming the Cybersecurity Landscape
Generative Artificial Intelligence is revolutionising several sectors, and cybersecurity is no exception.
cybersecurity is no exception. This session will discuss how technology is now the reality that is radically changing the way we radically changing the way we protect our systems and data.
Coffee & 1-2-1 Business Meetings
From Vulnerability Management to Continuous Exposure Management
With attacks regularly going undetected, improving security posture is an ever-growing priority. But often security and IT teams are not aligned on which of the thousands of CVEs, misconfigurations and at-risk identities are a priority for remediation, what can be done about any fixes that IT teams can't do, and how to ensure that completed fixes work as intended. Join this session to learn how organizations mature their security posture by looking at their environment through the lens of an attacker, giving them a common language for discussing, and prioritizing measurable risk reduction.
The Attack On The Supply Chain
The security of the supply chain is not limited only to the physical protection of assets, such as facilities, products, transportation, maritime, land, and air. The supply chain is a strategic activity in the world, so cybersecurity in the supply chain plays a very important role due to different aspects such as the following: • Strategic activity worldwide • Governments and countries can be seriously affected • The world economy is compromised if something happens in the supply chain. The risk is therefore very high, and today cybersecurity plays a very important role since companies globally share a large number of information with logistics carriers, giving rise to a possible information leak, which can end in a theft, or in a diversion of products to different countries from which they were supposed to arrive, or simply generating sabotage or deviations in processes to affect an entire economy. How can you get this? Intervening the systems of a company by installing contaminated software and once it has been installed legally in the company and is outside the scope of the firewall, executing a virus that alters the normal state of things. is this possible? Of course, and that is why we must work on this matter in depth.
Monday.com As A Vehicle For Digital Productivity
In the context of the ever-evolving digital age, it is imperative that organisations adapt and adopt emerging technologies to remain competitive. During this event we will explore how monday.com can boost productivity and improve the visibility of your teams.
Networking Lunch AT La Fontana Restaurant Level LL
Global Risks, Hybrid Warfare & The Role Of Cybersecurity
Tactical operations to achieve the goals of regular and irregular forces will be, among others, collapsing critical infrastructure, attempting to collapse stock markets, misinformation, political and social polarisation, psi ops, etc.
Panel Debate: Thriving Through Economic Uncertainty with Effective Cost Optimisation
In an era of economic uncertainty, organisations are facing intensified scrutiny over budgets across all departments, including security. As CISOs reassess technology investments, cybersecurity teams are challenged to achieve more with less. This necessitates a strategic approach to cost optimisation and resource allocation. To navigate these challenges, CISOs must prioritise the automation of manual tasks and leverage existing tools and assets effectively.
Join this panel debate to discuss:
- Identifying the types of cost inefficiencies in your security team
- Develop strategies to optimise costs and showcase ROI during financial challenges
- Embrace modern cybersecurity asset inventory for cost optimisation and enhanced protection
Detection & Response, Just Another Acronym?
Many platforms and solutions have come to market with the acronym Detection and Response, but do they really make sense? This session aims to clarify doubts about these capabilities, the key points to consider (even outside the technology environment) and their benefits within organisations.
Orchestration, Harmony and Soloists Cybersecurity Instrumented
We have always talked about the three components of security, people, technology and processes, but how to make it a reality in a multicultural, multinational, multiservice, agnostic and multivendor environment?
In this talk I will talk about the needs and challenges that, as CISO of a multinational company, I had to face, solve and that in the day to day continues to grow and evolve.
CISO Edge México
Our Enterprise Edge events are premier digital strategies forums transforming the future of the digital enterprise ecosystem, attended by the world’s biggest brands, C-Level executives congregate to discuss the future of IT & Digital Business covering topics including Enterprise IT, Customer Engagement, AI/Robotics, IT Security, Innovation, Disruption & Analytics.
Speaker & Delegate Enquiries
Name: Kurt Large
Email: kurt@enterprise-edge.com
Sponsorship Enquiries
Name: Craig Shipley
Email: craig@enterprise-edge.com