SCHEDULE DETAILS Information of Event Schedules
World is committed to making participation in the event a harassment free experience for everyone, regardless of level of experience, gender, gender identity and expression
Effective Measures To Improve The Information Security Culture In Organisations
Improving the information security culture in organisations is essential to protect critical assets and ensure business continuity. Integrating disciplinary and recognition measures is key to strengthening this culture. Disciplinary measures ensure that employees understand the seriousness of security policies and the consequences of non-compliance, which minimises risks and promotes compliance. At the same time, recognising and rewarding positive behaviour motivates employees to adopt good security practices, fostering an environment of accountability and collaboration. This balanced approach not only reinforces the importance of security at all levels of the organisation, but also contributes to more effective protection against internal and external threats.
Panel Debate: Moving From Cyber Security to Cyber Resilience, an Interactive Discussion
In today's rapidly evolving threat landscape, the imperative for cybersecurity has transcended mere defense to encompass a broader notion of cyber resilience. This shift underscores the need for CISOs to not only fortify security measures but also cultivate operational resilience, positioning them as strategic leaders within their organisations. Join us to explore how embracing cyber resilience transcends traditional security paradigms, empowering organizations to effectively anticipate, withstand, respond, and adapt to cyber threats. Let's pivot from outdated security notions to holistic resilience strategies, mitigating risks and propelling business resilience forward.
Join this panel debate to discuss:
- Collaborative Accountability — CEOs and CISOs unite in fostering cyber resilience, transcending siloed security approaches
- Informed Trust — Shift from blind to informed trust, accepting limited risk for resilience
- Operational Resilience — Identify minimum resilience levels to sustain key operations
More Than Ever, It Is Time To Think About Our Users
Nowadays, cyber attacks are violating our defences as if they did not exist, the importance of training our users is vital, remember that security begins with the users and ends with the users, the culture of backups, knowing how to act when we are under attack can help the problem not to multiply, as we can have Fire Wall, end points, sniffer, Drp plan, nas units, policies in our active directory and then we are getting hit with everything. It is vital to train our users to be able to deal with an attack.
Shielding the Digital Future: Strategies and Challenges in Cybersecurity Audit
This presentation will explore the audit of cybersecurity and cloud schemes, covering key elements such as the Cloud Control Matrix (CCM) and STAR certification established by the Cloud Security Alliance (CSA). The differences between traditional auditing and cloud auditing will be analysed, including implementation models, outsourcing of services as well as the use of specialised tools. In addition, we will discuss the profile of auditors in the digital age, who must possess advanced technical skills, up-to-date regulatory knowledge and an understanding of cloud models. We will discuss the adaptation of audit practices to the challenges and opportunities presented by the cloud, as well as the challenge of maintaining security and regulatory compliance in these constantly evolving infrastructures.
Coffee & 1-2-1 Business Meetings
Networking Lunch AT La Fontana Restaurant Level LL
Global Risks, Hybrid Warfare & The Role Of Cybersecurity
Tactical operations to achieve the goals of regular and irregular forces will be, among others, collapsing critical infrastructure, attempting to collapse stock markets, misinformation, political and social polarisation, psi ops, etc.
Panel Debate: Thriving Through Economic Uncertainty with Effective Cost Optimisation
In an era of economic uncertainty, organisations are facing intensified scrutiny over budgets across all departments, including security. As CISOs reassess technology investments, cybersecurity teams are challenged to achieve more with less. This necessitates a strategic approach to cost optimisation and resource allocation. To navigate these challenges, CISOs must prioritise the automation of manual tasks and leverage existing tools and assets effectively.
Join this panel debate to discuss:
- Identifying the types of cost inefficiencies in your security team
- Develop strategies to optimise costs and showcase ROI during financial challenges
- Embrace modern cybersecurity asset inventory for cost optimisation and enhanced protection
Orchestration, Harmony and Soloists Cybersecurity Instrumented
We have always talked about the three components of security, people, technology and processes, but how to make it a reality in a multicultural, multinational, multiservice, agnostic and multivendor environment?
In this talk I will talk about the needs and challenges that, as CISO of a multinational company, I had to face, solve and that in the day to day continues to grow and evolve.
CISO Edge México
Our Enterprise Edge events are premier digital strategies forums transforming the future of the digital enterprise ecosystem, attended by the world’s biggest brands, C-Level executives congregate to discuss the future of IT & Digital Business covering topics including Enterprise IT, Customer Engagement, AI/Robotics, IT Security, Innovation, Disruption & Analytics.
Speaker & Delegate Enquiries
Name: Kurt Large
Email: kurt@enterprise-edge.com
Sponsorship Enquiries
Name: Craig Shipley
Email: craig@enterprise-edge.com