We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
Industry Leading Solution Providers
Meet One2One with the partners best suited to tackle your unique challenges.
Over 30 Speakers
Learn from the leaders driving IT innovation in our rapidly evolving climate.
Enjoy complimentary gifts on us, simply for taking part and exploring innovation in your sector.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system connecting you with the right people and rewarding you for it. Take all 6 solution provider meetings and we’ll thank you generously. Being a business leader is tough, especially at the moment; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you. Check out the Summer Agenda below.
Now that we have all been working from home for a few months, how has your security program held up? Are you still using the same metrics? Have you shifted anything? If your program was built on a framework and started with the basics, remote workers shouldn’t change much. Join me as we discuss the key points of a successful security program and how to gain buy-in and budget even during an economic downturn.
Building a security roadmap using an industry framework allows easy comparison with peers
Performing a self-assessment is key to understand what capabilities should be included in the roadmap
Adding value and building trust, rather than fear, is how to gain funding for your program
8:00 am - 9:00 am
As industrial and business systems become more and more connected, they also become more exposed to vulnerabilities. The digital revolution is forcing IT and OT to integrate, meaning that we have seen a rise in destructive malware attacks against manufacturing and energy and utilities organisations, fuelled by this IT/OT convergence and a proliferation of remote access to OT. Convergence of OT and IT is not a new concept, but in the current global climate is as important as ever with a much more distributed and fragmented workforce.
DevSecOps integrates security within its operations and development, to ensure that businesses are protected in the best way possible, right from the start. The current global climate has seen a real quickening in pace of the evolution of security threats and in turn, how important having a good system incorporated into the development lifecycle from the very beginning is! This session will provide an overview of the current state of application security automation, pipelines, and best practices and will focus on the trade-offs between testing depth, time, and automation coverage to help your business maximise application security coverage of your pipeline.
How does DevSecOps improve software development and delivery in reality?
Establishing best practices in how to implement and embed DevSecOps within your organisation
Pinpointing the common challenges and pitfalls along the way with implementation of a DevSecOps strategy
Is DevSecOps the future of DevOps?
Please Join the Senior Director- Infrastructure, Operations and Cybersecurity, Andrew Nuxoll in this Executive Interview where he will discuss the keys to retain Cybersecurity talent.
If we have learned anything in the last year, it is that the term, ‘insider threat’ brings on new meaning when employees go remote. And even though most of these threats are unintentional, and because of lack of due diligence versus malice, they are threats none the less and must be addressed. How do we address, educate, and plan to expect the unexpected in our employees’ home workplace environments? In this session, hear David answer this fundamental question, specifically addressing:
Considerations for all connected at home devices, from desktop printers to listening devices like Alexa and ho to protect against related threats?
Educating employees on the difference at home and corporate networks and what they need to do, on a regular basis, to ensure connections are secure
Tips for ensuring employees are accountable and following security protocols
Tips from rolling out remote work for Ricoh USA Inc’s employees along with considerations for managing hybrid and agile workplaces where some employees remain remote, and others are in the office
5G implementation across the globe creates new opportunities and efficiencies for many businesses, however its use will also create increased cybersecurity risk. If you are planning to use 5G, as a business you must be prepared. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates and because of the cyber vulnerabilities of software, the tougher part of the real 5G roll out is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.
2020 saw an increase in cloud migration for justifiable reasons – the shift to home working, urgent business continuity and the remote provision of services. From a security perspective unplanned or misunderstood cloud adoption has a host of dangers for business and organisation leadership. At the heart of this a potential gap in technology and business expectations from the use of cloud, whatever that really means. How do security, technology and business leadership achieve mutual understanding on meeting business objectives through cloud technologies that provides the services the business wants, through the technology that cloud can provide with the right security to protect assets that the business values? But what about the risk – it’s on the Internet remembers! Without joint buy-in it is a road to disappointment all round, but how do you get this? Learn about the road that ONS has taken to bring security, business, and technology together with joint vision to support its national mission while address risk concerns.
As the digitisation of business charges forward, so too does the importance and need to be able to ‘lockdown’ these increasingly digitised systems. Technology is no longer just the business enabler it was once described as but is in fact the business. Businesses are experiencing an information explosion, which is not realistically set to abate in the next decade. However, many organisations have an information security policy, but not robust enough information management processes and matching policies in place. So, what does the future hold for current and aspiring CISOs?
The growing skills gap
Capitalising on post-pandemic step up in responsibilities
The ethical responsibilities of the CISO around increasingly AI and machine learning adoption
Moving towards networked security approach
Too often is cybersecurity either “tool driven” or purely “capability driven.” Taking a risk-based approach provides a more precise and cost-effective approach to building and executing cybersecurity programs. There is also confusion about what “cyber risk” is, how to measure it, how to govern it, and how to communicate it effectively to executives such as the Board. This webinar presents some perspectives on taking such as risk centric approach, defining a framework to measure it using key risk indicators (KRIs) and key performance indicators (KPIs). It also talks about the ingredients of what a communication to the Board could look like.
Definitions of Cyber risk
Risk appetite framework
Risk measurement – KRIs and KPIs.
According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be from their shadow IT resources. A sobering statistic. Most organisational concerns around shadow IT, focus on data loss, security, and unauthorised applications. However, the key to combatting the influx of unauthorised software and cloud services into your organisation is helping to educate your stakeholders to the true cost of shadow IT. In this session we will discuss how a CISO can most effectively engage with Shadow IT to turn the relationship from the traditional adversarial to an effective partnership that benefits both the Shadow IT group and the security program.
Where does shadow IT originate from and why?
Understanding the specific threats posed from shadow IT to the organisation.
Can shadow IT ever be a good thing for your business?
Creating some guiding principles for turning shadow IT from foe to friend and improving organisational security
The COVID-19 pandemic has created an environment where, more than ever before security professionals need to consider the total threat landscape. Economic hardship, increased isolation, weakened control systems and other factors have resulted in new threats and increased vulnerabilities.
Threats that arise in the cyberworld can have physical security implications and vice versa. We can no longer allow ourselves to segregate these two disciplines. Insider threats can transcend the physical and digital, threatening online communications can escalate into a physical attack. To mitigate risk, we need to look to our colleagues to share information and collaborate like never before. This session will help you:
Recognise new threats and see existing threats in a new, more holistic way.
Develop better channels for communication with physical security colleagues.
Mitigate risk by utilising a holistic approach.
During this interview, join the Director, IT Security Education & Consulting of Harvard University, Sandy Silk and hear her discuss how to recruit strong IT candidates and give great insight on setting employees up for success.
InfoSec: CONNECT is invitation-only for IT executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
InfoSec: CONNECT Virtual Summit is the digital counterpart to the invitation-only summit for IT executives. InfoSec: CONNECT bridges you to the information and solutions most relevant to your top priorities.
InfoSec: CONNECT Virtual Summit is unique in its ability to connect you to qualified solution providers. Our partners are willing to cover the cost of your attendance, in order to gain access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6-8 one-on-one meetings with vetted solution providers, specifically matched to you
– £300-£500 in gifts upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a gift package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Security and Information Technology.
Yes! But only for your One2Onemeetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, InfoSec: CONNECT Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. InfoSec: CONNECT is designed to help you maximise your time and money for the best possible results.