PDF Download February 26 - 28, 2017 Agenda (PDF)

CISO Summit Europe
February 26 - 28, 2017

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Sunday, February 26, 2017 - CISO Summit Europe

3:00 pm
-
4:30 pm

Registration and Greeting

4:30 pm
-
6:00 pm

Exclusive CIO Think Tank

6:00 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Monday, February 27, 2017 - CISO Summit Europe

7:00 am
-
8:00 am

Networking Breakfast

8:00 am
-
8:10 am

Welcome Address and Opening Remarks

8:10 am
-
8:55 am

Keynote Presentation

Taking a Quantum Leap in Digital Transformation

The rise of big data, the ubiquity of always-connected mobile devices, the power of social networking and the new capabilities enabled by cloud computing are reshaping industries, redefining experiences and fortifying sustainable businesses. IT and Business leaders recognize that the convergence of new technological capabilities and customer expectations have ushered in a fundamentally new reality for businesses looking for ways to mine the potential value of their customer, product, brand or operations.This highly animated session will include live demos of wearable tech and give you practical ideas for:

  • Fostering a culture of data-driven decision-making 
  • Understanding how IT supports business transformation efforts 
  • Using technology advances to improve customer experience and satisfaction

9:00 am
-
9:45 am

Keynote Presentation

Pioneering a New International Response to Cybercrime

Cybercrime is a global, transnational threat that is growing significantly in terms of scope, volume, number of victims and economic damage. Facilitated by an international service-based industry, it is becoming increasingly aggressive and confrontational. 

As cybercriminals are becoming better connected and organised at an international level a new response is required. Europol’s information and intelligence hub, its operational network of more than 200 liaison officers from EU and non-EU law enforcement partners and its three operational centres provide the environment needed to pioneer a new international response to this significant threat.

Europol has become one of the leading law enforcement agencies in the world despite the fact that it has no police powers of its own. Instead, its strategy against cybercrime and other serious threats is in increasing information flows between law enforcement authorities. Europol provides a unique technology-enabled platform that connects and collect information across a large community including private industries. Levering the power of data analytics, it drives new value from the use of technology and data and create greater levels of trust and knowledge amongst partners. 

  • Cybercrime is a significant global threat facilitated by an international service-based underground industry
  • A novel international response to this threat is required
  • Europol’s model of increasing information flows between the public and private sectors, connecting different operational networks and building trust helps pioneer this new response

9:55 am
-
10:25 am

Executive Exchange

Thought Leadership

Why Large Organisations Are Now Adopting a Cloud Security Approach

Market drivers such as Mobility, Changing Network Traffic Patterns, Cost Reduction, and Increased Security Requirements set against a backdrop of escalating threats are all inputting to a mass move to Cloud based Web Security. Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members. 

  • Discuss the emerging trends in cyber-security that CISO’s need to be aware of
  • Explore how the mega trends have implications for security
  • Learn the latest methods cyber-criminals use to infiltrate organizations
  • Hear use cases and best practices in adopting a “direct-to-cloud” approach

Sponsored by:

ACSN

10:30 am
-
11:00 am

Executive Exchange

Thought Leadership

Intelligence Driven Defence

Cyber adversaries are continuously evolving their operations and techniques. As a result, attacks are becoming more frequent, severe, and sophisticated; no industry is immune. An effective defence begins and ends with intelligence.

This presentation will explore how organisations wanting to mature their cybersecurity posture must:

  • Have a framework in place to guide analysis of intelligence left behind by attackers
  • Empower the team to analyse the intelligence and mitigate cyber threats
  • Measure the ROI of technology investments against their threat landscape

11:05 am
-
11:35 am

Executive Exchange

Think Tank

Investing in People vs Technology: How CIO’s Can Efficiently and Cost Effectively Raise Phishing Awareness of Their Employees?

Situation: Phishing attacks have become one of the major threats to the IT systems of enterprises as well as one of the success factors of Advanced Persistent Threats (APT) According to Gartner, 3.6 million clients in the U.S. alone had lost capital due to phishing attacks. The losses had been reached up to approximately U.S. 3.2 billion. Every year enterprises invest billions of dollars in enhancing their Cyber Security. According to a recent survey 90% of the CIO’s indicated that they invest between 90% and 95% in technology and 5%-10% in training People. In order to cope with the growing phishing threats most organizations have the following countermeasures in place to raise phishing awareness of their employees:

  • Comprehensive Information Security Policy 
  • Security trainings
  • Computer trainings 

Complication: Those countermeasures to raise phishing awareness are not effective as they:

  • Do not address individual differences (e.g. personality traits and cognitive factors) 
  • Have no mechanism to measure their effectiveness 
  • Have no mechanism to identify the level of phishing awareness of employees 

Question: Do individual differences like personality traits and cognitive factors play a role in phishing susceptibility (intention to resist phishing attacks)?

Answer:
Personality traits Conscientiousness and cognitive factor Information Security Awareness do have a relationship with phishing susceptibility (intention to resist phishing attacks). The CIO’s can use this knowledge to raise phishing awareness of their employees in an efficient and cost effective manner.

Think Tank

Creating the Modern Workplace – Wherever You Are
An insight into the way Rider Levett Bucknall have innovated to better the workplace across the globe. An overview of mobile & cloud strategy whilst being mindful of the cost implications.

11:40 am
-
12:10 pm

Executive Exchange

Roundtable

The Digital Age: Information Governance

The rise of digital business and IoT requires a shift in attitude towards Information Governance. No longer can organizations treat the various policy types of information governance as solid, discrete issue or activities. This session aims to discuss the following key points:

  • How can you organize and structure information governance policies to survive and thrive in digital business? 
  • How does information governance fail to support current and future digital business needs?
  • What are the range of policies organizations need to consider for their digital transformation? 
  • How to build and sustain a modern, timeless, business process to operationalize information governance?

Roundtable

The Mobile App Nightmare

Mobile has brought with it a whole host of challenges for the CISO, however BYOD no longer seems to be the biggest challenge. A new trend has emerged in individuals who bring their own mobile apps (BYOA) and even some departments/teams who now develop their own mobile apps (DYOA). Some may argue this is the salvation of the IT organization, who are unable to keep up with mobile app demand? However for the CISO it will likely cause a morass of security and compliance disasters, broken business processes and undetected bugs. Can BYOA and DYOA be managed, or should the practices be banned before they cause chaos?

12:15 pm
-
12:45 pm

Executive Exchange

Roundtable

Building a Dynamic Security Dashboard

Today, threats have become far more sophisticated, a constant concern for any organisation. They can damage the reputation, bottom line and the future of your business should you face a breach. Given this dangerous landscape, it is no wonder that one of the most common requirements for a CISO is to develop a security dashboards – a powerful communication vehicle for all information security professionals.

An effective security dashboard needs to do more than provide personnel, it needs to provide CISOs, with the tools to report on all incidents and evaluate security risks as well as monitor the panoply of security solutions the company employs. For CISOs there does not seem to be a Provider out there that offers a fully comprehensive solution, the ones offered are customizable, but this variety begs the question: What features does a CISO want to make a security dashboard most effective?

Roundtable

Education Education Education

In many cases hackers are far more sophisticated than most people give them credit for. However, Cyber-criminals usually have some help, and it usually comes in the form of the negligence of an average employee. Hackers depend on company employees, from executives down to junior staff members, to create openings, allowing them to gain access to organizations’ most sensitive networks.

One of the most crucial aspects of the CISO function within a business is to ensure users are educated regarding the business security policies and the implications of any , however for some industries employ turnover is great year on year, as such how can you ensure users are fully educated around Internal security policies?

Takeaways:

  • Strategy & Policy for educating users on Information Security Standards 
  • The whole business must be responsible for the protection of its data, as a CISO the role should be to guide the business in the right direction 
  • Uniting your organisation with a uniform structure users kept up-to-date on regulatory changes and requirements

12:50 pm
-
1:50 pm

Networking Luncheon

1:55 pm
-
2:25 pm

Executive Exchange

Think Tank

Developing a Digital Mindset for an Organisation

With growing density of connections of IoTSP (Internet of Things, Services & People), in the board rooms most commonly one hears is ‘Digital’. Executives ask ‘what is our digital strategy covering mobility, cloud, big data, social media etc’ to be ahead of competition and gain the mileage. With millennials ratio growing both as customers and employees the expectation from CIO organisation is completely different from what used to be a decade ago. Companies are considering newer roles such as Chief Digital Officer. Honestly the titles do not matter. To create the right business impact what we need is true digital leadership with new mind-set. To develop this, certain important criteria & challenges the leadership must consider. The key is being bi-modal between ‘old guard’ to carry steady business operations with risk averse nature and ‘new guard’ to innovate, quick, disrupt, risk-taking and accept failure. There is no option but to adopt ‘digital’ to be ready for the next decade. Even behemoths like GE have added digital to core business. At Qatar Airways, we have started digital journey to ensure 5 star innovative solutions to customers and employees.

Takeaways:

  • Understand the key criteria required for true digital leadership needed to set the digital strategy
  • Converting the digital strategy into a digital transformation execution plan while considering the challenges & limitations
  • Looking at the journey of digital transformation in Qatar Airways, which is voted as the best airline for third time in four years

Think Tank

Organizing IT for the Future

What is IT as a function? How can it help the business? What is the value it brings? With the current challenge of ever extending technologies and consumerization of IT, It is key that the IT function demonstrates what value it brings to the business and organizes  itself for it. For Barco, the business strategy and tactics are translated in 3 IT value streams: Acceleration of Revenue, Business Enablement and Collaboration; or in short the ABC of IT for the Business. Consequently, the organization has evolved from a single monolithically organized IT function towards a networked function with different ways of interacting with the Business partners based upon the required end result. This new way of organizing and focusing IT reinforces the Barco strategy , and addresses the challenges around operating in a digital world.

Takeaways: 

  • Show what the goals are of using Information 
  • Technologies Organize the IT function around and define the interactions 
  • Deliver the results

2:30 pm
-
3:00 pm

Executive Exchange

Roundtable

Software-Defined Storage “Myth or Reality”?

The term “software-defined storage” is becoming more visible in today’s marketplace.  The concept of a software-defined datacentre is getting more and more discussion.  We have heard of software-defined COMPUTE, software-defined NETWORKS and now the “buzz” is all about software-defined STORAGE. Until recently the definition was mainly defined by vendors in the storage marketplace, but industry leading research groups are beginning to write down what is an acceptable software-defined storage offering. 

The question of what is software-defined storage and is this even possible for customers and service providers in this dynamic marketplace of storage. How can a hardware solution be software-defined, isn’t it software-only?  Why is this complicated to enterprise customers or service providers who are trying to maximize service levels at the best economic value?  Can you have both proprietary and open, legacy and new together, software-only and hyperconverged with hardware? 

We here at FalconStor will discuss how we look at this opportunity in a practical way which gives customers choice, economic value and high service level achievements. 

At the end of the session you will see the difference between software-only, hyperconverged and hyperscale opportunities in the software-defined storage marketplace.

Roundtable

Effectively Protecting Your Data Within GDPR and Compliance in General

On December 15, 2015, the EU agreed to a draft of the General Data Protection Rules (GDPR) with potential fines of up to four percent of global revenues or 20 million EUR (whichever is higher), if an enterprise breaks those rules. These rules, which go into effect in 2017, apply to any companies that have or manage the data of customers in the EU regardless of whether the company itself is based outside the EU (with implications for cloud-based models).

This roundtable, hosted by Vormetric, considers the requirements of protecting your data across a heterogeneous and multi-faceted environments within the confines of the recent GDPR legislation. The session will open the debate on what this legislation will mean to the enterprise on a day to day level and reality of the repercussions of not complying, both corporately and personally. All discussions will be under Chatham House rules.

Takeaways: 

  • An understanding of GDPR and how it will affect your day to day operations 
  • An insight into best practice and real life examples of how to comply and protect your data 
  • Peer to peer insight son how other enterprises are approaching this forthcoming legislation

3:05 pm
-
3:35 pm

Executive Exchange

Thought Leadership

Intrusion vs. Breach: Your Fate Will Be Determined By Your Speed of Detection and Response

An intrusion doesn’t equal a breach and the risk associated with loss of reputation, customer data and business interruption hinges on your ability to detect, prioritise and neutralise cyber threats in real time.We will walk you through how to benchmark your organisation using our clearly defined Security Intelligence Maturity Model and assess your current capability to detect, react and respond to intrusions before they become breaches. Gather a clear understanding of how you can move your organisation closer to nation state protection by introducing Next-Gen SIEM security analytics and automated response.

3:40 pm
-
3:55 pm

Networking Break


4:00 pm
-
4:30 pm

Executive Exchange

Think Tank

ENISA Corporate Security – Considerations & Concerns

The talk covers some of challenges that Information security officers are faced with nowadays. The need for mobility, new of technologies along with an increasing number of complex attacks makes the situation more difficult. Traditional controls for protecting the corporate infrastructure are not enough and incident response is becoming more challenging. 

Takeaways: 

  • Understand the importance of threat modelling 
  • Incident response evolution 
  • Security monitoring should be a key activity in any corporate environment

Think Tank

How to Align the Executive to Understand, P3 (Projects, Programs & Portfolio) Management into the Context of Management Change

The business landscape that we operate in & the growing complexity that we have to deal with for our customers the level of change that is concurrent in our landscape is growing. Unless we have a defined strategy to handle & understand the difference between projects, programs & portfolio’s then we will potential become dis-jointed & uncoordinated in our approach to managing the change that is affected to the business. Defining the strategy to manage this change has to start with a common understanding on the differences between P3 & how these need to be managed from a corporate perspective. The alignment of the community to support the change is about having core competencies & capabilities to match the growing complexity of the P3’s. This also entails the elements of how you proactively measure & map your capability & competency to recruit ahead of the curve to ensure that the skilled capability to available when the complexity arrives. The executive of the business typically does not see all the change that is being affected on the business but needs to have this strategy to ensure that the business can cope with the level of growing complexity. 

Takeaways:

  • Clear understanding of P3 and how to address them from organisational level 
  • How to match capability and competencies v’s complexity of change landscape 
  • How to manage a “scary picture” & funnel this change through a business 
  • Positioning an executive to understand P3 and how to structure the organisation to cope with this

4:35 pm
-
5:05 pm

Executive Exchange

Thought Leadership

Innovating With the “Lights On” – How to Tip the Balance

CIOs are consistently challenged by their organizations to leverage emerging technologies like social, mobile, cloud and big data to drive new value. Where is the problem? Many IT leaders admit their spending is too heavily weighted toward keep-the-lights on projects (80%-90% in many cases), leaving little budget for truly transformational initiatives. Join this interactive session to learn how award-winning CIOs are successfully tipping the balance between innovation and “lights on” mix by untethering resources from costly ongoing maintenance of their legacy ERP systems including SAP and Oracle, to re-investing in high growth initiatives.

5:10 pm
-
6:10 pm

Executive Visions Panel

Women in Security

Gender diversity in the workplace is a hot topic for cyber security right now. According to an (ISC)² report entitled, ‘Women in Security: Wisely Positioned for the Future of InfoSec’ that surveyed nearly 14,000 professionals worldwide; the industry has a severe shortage of women. Only 10% are female globally and each year it’s decreasing. Furthermore, there remains a gender disparity within senior leadership – a trend that other industries have witnessed and are actively addressing. 

Within the cyber security industry there has historically been a skills shortage that continues to worsen, and a lack of qualified security professionals is seriously holding back the industry. Women make up 47% of the workforce in the UK and as a result the figures clearly demonstrate that we are failing miserably to attract, develop and retain almost half of our workforce. 

Takeaways: 

  • What we can do to attract, develop and retain more women in cyber security 
  • What lessons can we learn from other industries that are addressing this problem 
  • How we can remove barriers to entry whilst obtaining the right calibre of professional 
  • The significance of good communication 
  • What cultural changes we can make in the workplace now, so we retain a more gender diverse workforce

6:15 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Tuesday, February 28, 2017 - CISO Summit Europe

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:55 am

Keynote Presentation

NBA Brand Marketing – Engaging Fans on a Worldwide Level

The National Basketball Association is one of the four major sports leagues in the United States and a global brand. We have some of the most recognizable players in the world with 100 players from 37 countries in the League. Our fans are young, tech-savvy and diverse and we are constantly finding new and innovative ways to connect with them.

In our dynamic, fast-paced and evolving world, we have to ask ourselves, how do we utilize all of the tools at hand, especially in the arena of technology, to build a brand story that truly resonates and connects with our global audience?

Before we can answer this question, we need to develop a deep understanding of who are our fans and what keeps them coming back for more. We can then focus on making our game accessible and tangible in order to connect fans to our brand.

Takeaways:

  • Overview of NBA 
  • As a global brand with multiple outlets, how do we use technology to reach our fan base 
  • We also need to remember to connect with fans on an emotional level

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership

Blockchain: Asset Integrity and Trust with Distributed Consensus

Asset integrity lies at the core of how we assess risk, and how we align cybersecurity budget and resource; it is one of the three major tenets of the CIA triad (Confidentiality, Integrity, Availability). However, the steady onslaught of high profile data breaches in major institutions tells us security controls and processes are not working. This presentation takes look at new perspectives in cybersecurity, how we might start to think about tackling integrity at scale, and how we shift reliance away from centralised trust anchors - leveraging lessons-learned from the latest developments in blockchain technology.

Takeaways: 

  • Learn Guardtime Blockchain basics
  • Understand limitations of traditional cyber security controls and how blockchain is superior to them 
  • Learn how blockchain can universally address all key information assurance challenges in the enterprise 
  • Importance of blockchain in enabling organisations to embrace paradigm shifts and safely adopt new business models that explore IoT, Big Data Analytics, The Cloud, API-enabled services at the Internet scale

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Fusion or Confusion Security? An Adversarial Think Tank

Adversaries have motive not scope, the things they do however have in common with traditional corporate thinking include the fact that they too can be results oriented and outcome focused, they too manage risk, they too are creative, innovative, tenacious and driven by a passion to succeed and In some cases even have budgets beyond the dreams of the Corporate CISO.

If the return is attractive enough, the reward sufficient and the risk minimal then what ever the means the adversary will at some time strike! In this 'think like a hacker' session we explore the risk to your organisation of a hybrid attack and the adversarial convergence of physical, digital (cyber) and human factors to exploit operational and procedural weakness across the enterprise.

Join us and explore and consider the need for 'Fusion Security', Executive education and awareness and the growing necessity for joined up defences internally and across your supply chain and operational ecosystem. We will also take a quick look at a few serious but humorous, open the hacking door examples, of where these organisations should really have know better. A session that's focused more on psychology than it is on technology and security as a business and boardroom concern.

Takeaways:

  • An update on adversarial thinking and the hacker mindset
  • The path from confusion to fusion security
  • The need for a hybrid solution in a complex business ecosystem
  • Blatant stupidity the hackers friend!
  • Staff awareness as a hey line of defence

This focus session will be lead by Mike Loginov C|CISO. Former Chief Cyber Strategist for HP Enterprise, CEO and Founder Ascot Barclay Cyber Security Group and Vice Chairman and Chief Industry Advisor Cyber MBA Coventry University and ISSA UK advisory boards.

Think Tank

The Boardroom Disconnect

There is an often stated inability within the boardroom to understand and realise actual challenges that the business faces, and how technology and Cybersecurity functions can support those challenges. With the constant need to drive down costs, achieve more with less and manage the impact of digital disruption, the Information Security department has to both compete with, and support other business functions. The CISO faces an additional challenge, many of the protective measures are costly, however it is often extremely difficult to demonstrate a substantial ROI unless a breach occurs. Therefore how can the CISO effectively communicate the information security needs to the business in order to be given the right tools to do the job, and safely enable innovation? 

Takeaways: 

  • Communication is key, being able to effectively communicate with the business is critical but doing so in the lingua franca (common language) of the boardroom is paramount - that common language is risk rather than compliance and we should hold central to our communications that businesses make profit by taking managed risk every day 
  • Achieving a demonstrable ROI for information security investment is a challenge, however demonstrating the business risk benefits of “Cybersecurity that makes business sense” delivers a clearer message to the board as they seek to protect their personal and corporate brand reputations

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Roundtable

The Age of Disruption: Using Connected Intelligence to Lead and Differentiate
The old business adage “if you can measure it you can manage it” remains true today, but has evolved especially for the mobile enterprise: If you can connect it, you can transform it. If knowledge is power, connection is empowerment. Vehicles are becoming hubs for all applications. It’s no longer just driving transformation, but now driving disruption. By 2020 it’s predicted that 50 billion things will be connected to the internet. How can you keep in step with the revolution and still meet your customer’s needs? How can you use connected intelligence to lead and differentiate and still double the ROI from your fleet?

Roundtable

Best Practice for SAP Risk Management & Threat Intelligence

In this presentation you will hear about: 

How to build a business case for SAP Risk Management & Threat Intelligence:

  • Key trends in Business Critical Application Security – recent global study
  • Top 3 attack scenarios 
  • Benefits of Business Risk Illustration Methodology and Approach

11:10 am
-
11:40 am

Executive Exchange

Think Tank

How Can We Access The Appropriateness and Effectiveness Of Our Cybersecurity Controls?

An organisation must take reasonable care to protect data from cyberattack. Failure to do so may result in legal action, reputational damage or regulatory sanctions.The continuously developing threat and increasing complexity and cost of our response to this threat means that getting our cybersecurity controls right this may be the largest challenge facing our businesses. We need to ensure that we can demonstrate that the design and effectiveness our Cybersecurity Controls meet the expectations of our stakeholders and are recognised as providing reasonable care over our data.

Takeaways:

  • What measures and practices do our boards, our customers, our shareholders, our regulators and our peers consider represent reasonable care? 
  • What criteria can we use to demonstrate the effectiveness and appropriateness of our Cybersecurity controls?
  • How and to whom should we be communicating our assessment of our Cybersecurity Controls?

Think Tank

The Potential of a CIRO-Chief Information Risk Officer

An enterprise business has a key dependency on digital technologies and their associated risks. With business needs at the forefront of the C-suites’ agenda, the natural evolution of the risk/security function has taken a business driven approach to IT security, policies and procedures.

The potential rise of the CIRO supports the increased regulatory landscape, with policy creation as a risk management solution, and therefore supporting the company’s business processes. Is adding a CIRO to the C-suite a necessary transition of the current CISO role?

Takeaways:

  • Risk based management – is it new news!
  • Three lines of defence – exploring the principle
  • Risk Appetite – purpose, ownership, granularity
  • Does your organisation need a CIRO?

11:45 am
-
12:45 pm

Executive Visions Panel

Women in Security

Gender diversity in the workplace is a hot topic for cyber security right now. According to an (ISC)² report entitled, ‘Women in Security: Wisely Positioned for the Future of InfoSec’ that surveyed nearly 14,000 professionals worldwide; the industry has a severe shortage of women. Only 10% are female globally and each year it’s decreasing. Furthermore, there remains a gender disparity within senior leadership – a trend that other industries have witnessed and are actively addressing. 

Within the cyber security industry there has historically been a skills shortage that continues to worsen, and a lack of qualified security professionals is seriously holding back the industry. Women make up 47% of the workforce in the UK and as a result the figures clearly demonstrate that we are failing miserably to attract, develop and retain almost half of our workforce. 

Takeaways: 

  • What we can do to attract, develop and retain more women in cyber security 
  • What lessons can we learn from other industries that are addressing this problem 
  • How we can remove barriers to entry whilst obtaining the right calibre of professional 
  • The significance of good communication 
  • What cultural changes we can make in the workplace now, so we retain a more gender diverse workforce

12:45 pm
-
12:50 pm

Thank You Address and Closing Remarks

12:55 pm
-
1:55 pm

Grab and Go Luncheon