Exclusive Executive Forum focused on Information Security Leadership and Strategy
A chief information security officer (CISO) is a senior-level executive who wears many hats in the realm of cybersecurity—but is primarily responsible for translating complex business problems into effective information security controls.
Discussing key topics such as the disconnect between the priorities of the board, CIO and CISO, the impact of AI and automation and political, social and economic disruption, CISO Event gives you the opportunity to meet leading decision makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The CISO Event brings together leaders from across the public, large enterprises & mid-market sectors. The CISO event will provide you with a strategic and practical toolkit to help drive transformation including:
The role of the CISO has matured and grown over the years. The CISO has a broader role than just to eliminate the threat. It’s also to deal with the crisis and the residual consequences. As CEOs and board directors adjust their thinking about cybersecurity, the executive to whom the CISO reports makes a world of difference.
The growing number of IoT connected devices is undoubtedly beneficial to the way that people carry out everyday tasks, both personally and professionally. But it also brings with it more risk, as the increase in connected devices gives hackers and cyber criminals more entry points. In this workshop we will explore how the Internet of Things (IoT) emerges at a time when threats to our data and systems have never been greater.
With an increasing pace of change and adoption of new technologies such as the Internet of Things, new platforms on which we deploy including public cloud, and new ways and places of working, brought about by the transitional and evolving nature of businesses, security visibility becomes ever-more critical, yet more challenging.
Gaining a clear understanding of IT infrastructure, hosts and critical applications, vulnerabilities to which they may be susceptible and the ability to demonstrate compliance against regulatory and organisational mandates is a task made more difficult by the transitional nature of business and underlying technologies. In this session, we look at some of those challenges and the changing response to adapt and regain visibility in order to respond timely to critical events such as Wannacry, and wide-ranging initiatives such as GDPR.
A very informative and insightful day. Would highly recommend this event to any progressive procurement professional/organisation- David Golding - Head of Procurement, JLL
Congratulations on a superb event! A well worked agenda with relevant content and an invaluable opportunity to meet with a senior audience in an environment as stunning and inspiring as the Celtic Manor.Throughout my esteemed career I have attended more events than I care to recall, but this one really stands for me as being amongst the best! I would like to thank the team at GBE for their diligence and commitment to creating a outstanding event from start to finish. Thanks- Shane Stowells - Sales Director, Tangoe
Having been a salesperson for over 20 years I have been to many networking events over the years and I have to say, this has got to be one of the best! It was well managed from the outset but the calibre of attendees was far superior and the timings of all meetings were kept. I would definitely recommend this event to anyone who is serious about networking and lead generation. Looking forward to the next one!- Greta Read - Business Development, Pickfords
Are you interested in becoming a sponsor of this event?
Please click on the request more info button.
You have missed out some details, please try again.