Engage
with CISOs and other heads of security, technology or operations and experts in intelligence, cybercrime and counter terrorism on emerging best practices.
Discover
changing tactics of hackers and internal bad actors and state-of-the-art defenses.
Apply
new strategies that will enhance company breach response capability from the board level and throughout the enterprise.
Time | Description |
---|---|
10:00-10:15 |
Welcome & Opening Remarks |
10:15-11:00 |
Growing Threat of Big Data Driven Business Model Disruptions Facilitators: |
11:00-11:45 |
Aligning Cyber Risk Management with Evolving Cyber Threat Realities Facilitators: |
11:45-12:30 |
Thinking Globally through Scenario Analysis, Acting Locally through the Application of Smart Technology: Evolving to a Higher Order Cyber System Designed for Mitigating Risk and Resilience Facilitators: *Refreshments Available During Session |
12:30-1:30 |
How to Get Stakeholder Buy-In for Investment in Next Generation Security: Moving Your System Out of the Silos Facilitator: *Working Lunch |
1:30-2:15 |
Detecting Inside Threats and Responding to Internal and External Facilitators: |
2:15-3:00 |
Your Company has Been Hit, Now What? An Analysis of the Cyber-Attack at Target Facilitators: *Refreshments Available During Session |
3:00-3:55 |
RMIQ: An Index to Measure Company Resilience Capacity Facilitators: |
3:55-4:00 |
Seminar Adjourns |
SPONSORS
Interested in attending?
Interested in showcasing your expertise as a speaker?
Interested in partnering with us as a sponsor?