www.dtx360.io Open in urlscan Pro
77.72.2.72  Public Scan

URL: https://www.dtx360.io/event/dtx-cyber-security-leaders-summit-europe
Submission: On July 17 via api from LU — Scanned from GB

Form analysis 1 forms found in the DOM

GET /search

<form class="mod-finder js-finder-searchform form-search" action="/search" method="get" role="search">
  <label for="mod-finder-searchword202" class="visually-hidden finder">Search</label>
  <div class="awesomplete"><input type="text" name="q" id="mod-finder-searchword202" class="js-finder-search-query form-control" value="" placeholder="Search …" autocomplete="off" aria-expanded="false" aria-owns="awesomplete_list_1" role="combobox">
    <ul hidden="" role="listbox" id="awesomplete_list_1"></ul><span class="visually-hidden" role="status" aria-live="assertive" aria-atomic="true">Type 2 or more characters for results.</span>
  </div>
</form>

Text Content

 * News
 * Videos
 * Podcasts

Navigation

Navigation

Close

Tech Areas


 * Cloud
 * Cyber Security
 * Data, AI & Automation
 * Networks & Infrastructure
 * Software Development & DevOps
 * Unified Communications & Collaboration

 * Home
 * Insights
   * News
   * Videos
   * Podcasts
 * Events
 * Connections
 * Sponsorship
 * About
   * Our Manifesto
   * Tech For Good
   * Diversity, Equity & Inclusion
   * Accessibility
 * Community
 * Solutions
 * Search

News

Videos

Podcasts

 * Information
   
   
   
   
   
   
   
   UCX Manchester
   
   UCX MANCHESTER
   
   Information2nd April, 2025, 09:30 - 3rd April, 2025, 17:30 Manchester Central
 * Information
   
   
   
   
   
   
   
   DTX Manchester
   
   DTX MANCHESTER TECH WEEK
   
   Information2nd April, 2025, 09:30 - 3rd April, 2025, 17:30 Manchester Central
 * InformationCyber Security Leaders Summit Manchester
   
   CYBER SECURITY LEADERS SUMMIT MANCHESTER
   
   Information18th November, 2024, 09:00 - 19th November, 2024, 19:30 Hilton
   Deansgate, Manchester, UK
   Leaders Summit CYBER SECURITY LEADERS SUMMIT Manchester 18-19 NOVEMBER 2024 -
   Hilton deansgate, Manchester, UK Details coming soon. Please check back for
   more information.    BACK TO EVENTS
 * Information
   
   
   
   
   
   
   
   UCX London
   
   UCX LONDON
   
   Information2nd October, 2024, 09:30 - 3rd October, 2024, 16:30 ExCeL London
 * Information
   
   
   
   
   
   
   
   DTX London
   
   DTX LONDON
   
   Information2nd October, 2024, 09:30 - 3rd October, 2024, 16:30 ExCeL London
 * InformationCyber Security Leaders Summit Amsterdam
   
   CYBER LEADERS' SUMMIT AMSTERDAM
   
   Information25th September, 2024, 09:00 - 26th September, 2024, 16:30 Hotel
   Okura, Amsterdam, Netherlands
   Leaders Summit CYBER LEADERS' SUMMIT Europe 25-26 September 2024 - hotel
   okura, amsterdam, netherlands             Who's it for? Chief Information
   Security Officer, Chief Information Officer, VP/Director/Head of:
    Information Security, Cyber Security, IT, Cyber Defense, Security
   Operations, Incident Response, Security Architecture, Threat
   Intelligence, Pen Testing    Don't just take our word for it...     Previous
   Speakers Our global portfolio SPONSORS     What to expect on the day   Day 1
   Agenda 08:00 Registration Opens: Breakfast, Meet & Greet 08:45 - 9:00 Chair's
   Opening Remarks   Chairperson: Jeroen Prinse, CISO (ad interim), National
   Cyber Security Center - NL 09:00 - 09:30 Opening Keynote   Assessing the
   current Cybersecurity landscape: Key Threats and Future Focus   • What
   strategies can CISOs use to stay ahead of evolving threats?• How can
   organisations uphold cybersecurity principles amid constant technological
   change?• How can collaboration and information sharing among cyber
   professionals transform threat mitigation?   Madelein van der Hout, Sr.
   Analsyt Cyber Security & Risk, Forrester   Alan Lucas, CISO, Homefashion
   Group Plc 09:30 - 10:10 Panel Discussion   Conquering Compliance Challenges:
   Navigating Europe's Regulatory Landscape   How can organisations proactively
   adapt to evolving EU regulations while maintaining operational efficiency?
   What steps are you taking to ensure NIS2 & DORA compliance? How can industry
   collaboration enhance regulatory compliance efforts?   Moderator: Steve
   Purser, Former Head of Core Operations Department, ENISA   René Pluis, Group
   Security - Regulations & Standards, Philips 10:10 - 11:20 Keynote
   Peer-to-peer Roundtable Discussions   • How to Prove Maturity and Resilience
   on Third-Party Systems• DevSecOps Transformation: Proactive
   Defence• Simplyfing and Streamlining Cloud Controls and Tools• How to Build a
   High Performing Security Team• How to Establish your CISO Persona?• How to
   Manage the Risks that Come with AI 11:20 - 12:50 1-2-1 Meetings & Networking
   12:50 - 13:40 Lunch & Networking   Diversity in Cyber Presentation 13:20 -
   13:45 Keynote Presentation   AI: From Buzzword to Reality - Can We Adapt
   Faster Than Attackers?   The cybersecurity landscape is facing a pivotal and
   challenging moment, requiring a strategic choice between reactive or
   proactive approaches. Adopting an adversary's perspective can transform
   challenges into opportunities for innovation and shaping the future of
   security. This presentation will provide a Red Team perspective on how AI is
   altering the threat landscape and strategies to stay ahead of attackers.  
   Eva Benn, Senior Security PM Manager, Microsoft 13:45 - 14:20 Fireside Chat  
   AI and Cyber Threats: Friend, Foe, or Frenemy?   How is AI Changing the
   Threat Landscape? What are the potential benefits of AI in enhancing security
   measures? How can we ethically harness AI while avoiding its potential
   pitfalls?   Anna Hakkers, Leader in Data Security, Philips 14:30 - 16:00
   1-2-1 Meetings & Networking 16:00 - 17:00 Fireside Chat Peer-to-peer
   Roundtable Discussions   • Aligning CISO and the Board• How to Plan your
   Migration Towards Quantum Safe Cryptography• Protecting Employee Mental
   Health• Establishing Allies, Defusing Enemies: The politics of the CISO• A
   Zero Trust Approach to Digital Identity • Minimizing Risks in Breach
   Situations 17:00 - 18:00 Proposed: Cyber Awareness Training Session 18:00 -
   18:05 Chair's Closing Remarks   Jeroen Prinse, CISO (ad interim), National
   Cyber Security Center - NL  18:05  Evening Reception Day 2 Agenda 08:30
   Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10 Chair's Opening
   Remarks 09:10 - 10:10 Breakfast Briefings Breakfast Briefings Breakfast
   Briefings   Breakfast Briefings 1. Crafting a Resilient Strategy: Effective
   Action Plans for CISOs in Crisis Management2. Are we in a golden era of
   ransomware? So what? The rise of RaaS, multi-extortion, AI enabled cartels
   and big game hunting3. Taking a seat at the table: How to Ensure Cyber
   Security is High on the Business Agenda 10:10 - 10:40 Panel Discussion  
   Simplifying the Supply Chain: Identifying, Prioritising and Mitigating Risk  
   How can you effectively map, assess, and prioritise vulnerabilities across
   your supply chain? What are the regulatory implications of fourth, fifth, and
   nth party risks for businesses How can businesses fortify themselves against
   evolving supply chain cyber threats?   Moderator: Marcin Roth, Senior Cyber
   Security Manager, Currys Alan Lucas, CISO, Homefashion Group Plc   Invited:
   Senior Representative, The Heineken 10:40 - 11:20 Keynote Sponsor
   Presentation Keynote Presentation   Addressing Human Risk and Insider Threats
     Insider threat is becoming a major concern in security. Despite numerous
   technical tools, managing human risk is challenging. This session explores a
   real-life case study on what drives individuals to become insider threats.
   We'll examine how technology, communication, and processes can deter or
   inadvertently create insider threats. The discussion will focus on building
   resilience against insider threats by balancing empathy and sophisticated
   tools    Sunette Runhaar, Head of Global Insider Threat Program, Uber 11:30 -
   13:00 Fireside Chat 1-2-1 Meetings & Networking 13:00 - 13:30 Lunch &
   Networking 13:30 - 14:00 Fireside Chat   Rethinking risk management:
   Embracing fresh approaches to cyber resilience   How can you get to grips
   with your true risk profile? How can organizations move beyond traditional
   patching and remediation methods to mitigate risks more effectively? How can
   agile risk response frameworks enhance organizations' ability to adapt to new
   challenges and threats?   Jeroen Prinse, CISO (ad interim), National Cyber
   Security Center - NL 14:00 - 14:50 Fireside Chat Panel Discussion Are you
   stuck playing the blame game? How to reframe your security culture   • What’s
   the gap between your ideal security culture and your current state of play?
   • Tools, training, networks: What initiatives make the biggest impact?• How
   to measure outcomes and continuously improve security culture metrics  
   Daniela Lourenço, CISO, FinTech 14:50 - 15:50 Sponsored Interview 1-2-1
   Meetings & Networking 15:50 - 16:20 Fireside Chat Industry Takeaway Tables  
   To conclude the Cyber Leaders Summit, this session is designed for you to
   engage with peers specific to your industry, whether it’s financial services,
   healthcare, retail, manufacturing or something else. Listen to and share your
   most valuable takeaways from the Cyber Leaders Summit, to ensure you return
   to work with powerful insights and ideas! 16:20 - 16:30 Chair's Closing
   Remarks   Prize Draw & Event Roundup       Register your interest   REGISTER
   INTEREST FORM If you’re interested in attending, simply fill in the below
   form or send an email to cyberleaders@clarionevents.com and a member of the
   team will be in touch.    sponsor opportunities form Let us know what
   technologies you cover below, and we'll put you in touch with your designated
   account manager to start building your custom package.      
 * InformationCyber Security Leaders Summit Miami
   
   CYBER SECURITY LEADERS SUMMIT MIAMI
   
   Information24th June, 2024, 09:00 - 25th June, 2024, 16:30 JW Marriott, Miami
   Leaders Summit CYBER LEADERS' SUMMIT USA 24-25 JUNE 2024 - JW MARRIOTT, MIAMI
               Who's it for? Chief Information Security Officer, Chief
   Information Officer, VP/Director/Head of: • Information Security, Cyber
   Security, IT, Cyber Defense, Security Operations, Incident Response, Security
   Architecture, Threat Intelligence, Pen Testing    Don't just take our word
   for it...   Speakers   Our global portfolio SPONSORS   What to expect on the
   day   Day 1 Agenda 08:00 Registration Opens: Breakfast, Meet & Greet 08:45 -
   9:00 Clarion Events and Chair's Formal Welcome Chairperson:  Jennifer
   Raiford, Former Deputy CISO, Unisys 09:00 - 09:30 Opening Keynote  
   Understanding future threats: What are the key threats for cyber
   professionals in 2024 and beyond?   • How do CISOs keep pace with rapidly
   evolving cyber security threats and technologies?• How to maintain cyber
   security principles amidst technological evolution• How can cyber
   professionals enhance collaboration and information sharing to mitigate
   future threats effectively?   Moderator: Joseph Blankenship, VP, Research
   Director, Forrester David Sledge, Director of Cybersecurity, Avelo Airlines
   Jelani Campbell, Cyber Risk Oversight Director, Fannie Mae Jennifer Raiford,
   Former Deputy CISO, Unisys John Downey, CISO, GoFundMe 09:30 - 10:20 Panel
   Discussion Securing your supply chain: What can you really do?   • How can
   you map, assess and prioritise vulnerabilities across your supply
   chain?• What can security leaders do, to prepare their supply chain security
   strategy as geopolitics and cyber continue to intertwine?• How can CISOs
   innovate and optimize supply chain security to ensure robust protection, with
   lean teams and resources?   Moderator: Marcin Roth, Senior Cyber Security
   Manager, Currys Jon Abbott, CEO, ThreatAware Sam Miorelli, Global Head,
   Industrial Cyber and Digital Security for Industrial Applications, Siemens
   Energy Ricardo Johnson, VP & CISO, Dentsply Sirona 10:20 - 11:20 Keynote
   Peer-to-peer Roundtable Discussions   • How to prove maturity and resilience
   on third-party systems• DevSecOps Transformation: Proactive
   Defence• Simplyfing and Streamlining Cloud Controls and Tools• How to build a
   high performing security team• Implementing a Zero Trust Strategy• How to
   Manage the Risks that Come with AI 11:20 - 12:50 1-2-1 Meetings & Networking
   12:50 - 13:50 Lunch & Networking   Diversity in Cyber presentation  
   Moderator: Jennifer Raiford, Former Deputy CISO, Unisys Joshua Copeland,
   Cybersecurity Expert and Professor, Tulane University Chamon Gayton, Head of
   Cybersecurity, PayPal   13:40 - 14:30 Keynote   Inside the Shadows: A Spy's
   Guide to Understanding Espionage and Protecting Your Organization   •
   Espionage is a tangible threat beyond fictional plots, with real-world
   implications.• Former Case Officer reveals covert recruitment methods across
   industries, from casual conversations to sophisticated
   surveillance.• Understand the intricate world of espionage, its motivations,
   recruitment strategies, and defense tactics against human and cyber threats.
     Shawnee Delaney, CEO, Vaillance Group 14:30 - 16:00 1-2-1 Meetings &
   Networking 16:00 - 17:00 Peer-to-peer Roundtable Discussions   • Aligning
   CISO and the Board• Getting Users to Own Secure Behaviours• Protecting
   Employee Mental Health• Safeguarding Against Evolving Threats• Focusing on
   High Priority Risk Mitigation• Minimizing Risks in Breach Situations 17:00 -
   18:00 Fireside Chat The Cyber Escape Room co. Bringing cybersecurity training
   to life     Amy Stokes-Waters, CEO & Owner, ESC - The Cyber Escape Room Co.
   18:00 - 18:05 Chair's Closing Remarks 18:05 Evening Reception     Day 2
   Agenda 08:30 Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10
   Chair's Opening Remarks Chairperson:  Jay Hunter Anson, Cyber Security
   Ambassador, Cyber Florida 09:10 - 10:10 Breakfast Briefings Breakfast
   Briefings Breakfast Briefings   Breakfast Briefings 1. Keeping calm in
   turbulent times: The makings of a security team who can face crisis
   head-on2. Are we in a golden era of ransomware? The rise of RaaS,
   multi-extortion, AI enabled cartels and big game hunting3. Taking a seat at
   the table: How to make sure cybersecurity is high on the business agenda
   10:10 - 10:40 Fireside Chat Compliance challenges: Navigating regulatory
   complexity in 2024 and beyond   • How to ensure you are compliant with State
   and Federal cyber regulations, whilst preservingoperational efficiency?• How
   can you ensure that you are safe from SEC regulations?• How can cyber leaders
   navigate regulations from multiple jurisdictions while upholding a
   globalcyber security posture?   Jennifer Raiford, Former Deputy CISO,
   UnisysBradley Schaufenbuel, Vice President & Chief Information Security
   Officer, Paychex Michael Babischkin, VP, Deputy Director of Information
   Security, Federal Home Loan Bank of Chicago 10:40 - 11:30 Keynote Sponsor
   Presentation Panel Discussion How have advances in generative AI altered the
   threat landscape?   • How has generative AI evolved attack tactics and how
   can organisations mitigate these riskseffectively?• How is the accessibility
   of generative AI within the workplace, impacting enterprise IT
   securitystrategy?• How can advanced analytics and ML augment and enhance the
   intelligence of your systems andanalysts?   Oluwadamilola Obamehinti,
   Cybersecurity Expert Eva Benn, Senior Security PM Manager, Microsoft Graydon
   McKee, Senior Director Cybersecurity Engineering, VISA Tina Lampe, Director -
   IT Software Engineering, DIRECTV Jason Thomas, CIO, Cole, Scott & Kissane,
   P.A. 11:30 - 12:30 Fireside Chat 1-2-1 Meetings & Networking 12:30 - 13:30
   Lunch & Networking 13:30 - 14:00 Fireside Chat   Rethinking risk management:
   Embracing fresh approaches for cyber resilience   • How can you get to grips
   with your true risk profile?• How can organizations move beyond traditional
   patching and remediation methods to mitigate risks more effectively?• How can
   agile risk response frameworks enhance organizations' ability to adapt to new
   challenges and threats?   Moderator: Martin Walker, VP, North American
   Operations, ThreatAware Pam Lindemoen, CISO Advisor, CISCO Chamon Gayton,
   Head of Cybersecurity, PayPal 14:00 - 14:40 Fireside Chat Panel Discussion
   Are you stuck playing the blame game? How to reframe your security culture  
   • What’s the gap between your ideal security culture and your current state
   of play?• Tools, training, networks: What initiatives make the biggest
   impact?• How to measure outcomes and continuously improve security culture
   metrics   Beth Miller, Co-owner, Resilience Consulting Group Joseph
   Blankenship, VP, Research Director, Forrester Joshua Copeland, Cybersecurity
   Expert and Professor, Tulane University Michael Calderin, Chief Information
   Security Officer, YAGEO Group Tim Ward, Co-founder & CEO, Think Cyber 14:50 -
   15:20 Sponsored Interview 1-2-1 Meetings & Networking 15:20 - 16:00 Fireside
   Chat Industry Takeaway Tables   To conclude the Cyber Leaders Summit, this
   session is designed for you to engage with peers specific to your industry,
   whether it’s financial services, healthcare, retail, manufacturing or
   something else. Listen to and share your most valuable takeaways from the
   Cyber Leaders Summit, to ensure you return to work with powerful insights and
   ideas! 16:00 - 16:10 Chair's Closing Remarks Chairperson:  Jay Hunter
   Anson, Cybersecurity Ambassador, Cyber Florida   Prize Draw & Event Roundup  
       Register your interest   REGISTER INTEREST FORM If you’re interested in
   attending, simply fill in the below form or send an email
   to transformers@imagotechmedia.com and a member of the team will be in
   touch.    sponsor opportunities form Let us know what technologies you cover
   below, and we'll put you in touch with your designated account manager to
   start building your custom package.    



SEE ALL EVENTS


CONNECTIONS

We understand the value of making connections that matter. The right connection
at the right time can help IT professionals to unlock opportunities, save time
and make more confident decisions.

 

VIEW ALL CONNECTIONS


SPONSORSHIP OPPORTUNITIES

We have a plenty of sponsorship opportunities to fit every goal and budget.

 

VIEW ALL SPONSORSHIP OPPORTUNITES

OUR MANIFESTO

Our purpose at DTX 360 is simple… to help you on your digital transformation
journey!

Read more

TECH FOR GOOD

Across the technology sector, we have the opportunity to make the world a better
place.

Read more

DIVERSITY, EQUITY & INCLUSION

We at DTX want to be part of the change, do you?

Read more

ACCESSIBILITY

At DTX accessibility is important — helping to provide an enjoyable event for
everyone.

Read more


JOIN THE COMMUNITY!

DTX 360 is your home of digital transformation.

Stay up to date on the latest digital transformation news, discover use-case
stories before anyone else, make the VIP guest list and get exclusive deals from
the world’s best solution providers.

 

JOIN THE COMMUNITY

 * Home
 * Insights
   * News
   * Videos
   * Podcasts
 * Events
 * Connections
 * Sponsorship
 * About
   * Our Manifesto
   * Tech For Good
   * Diversity, Equity & Inclusion
   * Accessibility
 * Community
 * Solutions
 * Search

Search
Type 2 or more characters for results.


Leaders Summit


CYBER LEADERS' SUMMIT EUROPE

25-26 SEPTEMBER 2024 - HOTEL OKURA, AMSTERDAM, NETHERLANDS

 



about

Our Cyber Leaders' Summits are private, invite-only events for selected senior
cyber leaders, decision-makers and budget-holders.

We have shaken up the typical industry event format and focussed on creating
value for our audience by facilitating meaningful connections, engaging
cross-industry discussions, and high-level networking.

Our summits give you the opportunity to network with senior peers in a relaxed,
private environment, hear and learn from the most influential members of the
payments community, and provide a platform to engage in pre-qualified meetings
with leading solution providers.

 

Register interest

  Become a sponsor

 



 

 

 

 

 


WHO'S IT FOR?

Chief Information Security Officer, Chief Information Officer, VP/Director/Head
of:

 Information Security, Cyber Security, IT, Cyber Defense, Security
Operations, Incident Response, 
Security Architecture, Threat Intelligence, Pen Testing 



 

DON'T JUST TAKE OUR WORD FOR IT...



 


 

PREVIOUS SPEAKERS




OUR GLOBAL PORTFOLIO SPONSORS







 



 


WHAT TO EXPECT ON THE DAY

 


DAY 1 AGENDA

08:00 Registration Opens: Breakfast, Meet & Greet 08:45 - 9:00

Chair's Opening Remarks

 

Chairperson: Jeroen Prinse, CISO (ad interim), National Cyber Security Center -
NL

09:00 - 09:30

Opening Keynote

 

Assessing the current Cybersecurity landscape: Key Threats and Future Focus

 

• What strategies can CISOs use to stay ahead of evolving threats?
• How can organisations uphold cybersecurity principles amid constant
technological change?
• How can collaboration and information sharing among cyber professionals
transform threat mitigation?

 

Madelein van der Hout, Sr. Analsyt Cyber Security & Risk, Forrester

 

Alan Lucas, CISO, Homefashion Group Plc



09:30 - 10:10
Panel Discussion

 

Conquering Compliance Challenges: Navigating Europe's Regulatory Landscape

 

 * How can organisations proactively adapt to evolving EU regulations while
   maintaining operational efficiency?
 * What steps are you taking to ensure NIS2 & DORA compliance?
 * How can industry collaboration enhance regulatory compliance efforts?

 

Moderator: Steve Purser, Former Head of Core Operations Department, ENISA

 

René Pluis, Group Security - Regulations & Standards, Philips

10:10 - 11:20
Keynote

Peer-to-peer Roundtable Discussions

 

• How to Prove Maturity and Resilience on Third-Party Systems
• DevSecOps Transformation: Proactive Defence
• Simplyfing and Streamlining Cloud Controls and Tools
• How to Build a High Performing Security Team
• How to Establish your CISO Persona?
• How to Manage the Risks that Come with AI

11:20 - 12:50

1-2-1 Meetings & Networking

12:50 - 13:40

Lunch & Networking

 

Diversity in Cyber Presentation



13:20 - 13:45

Keynote Presentation

 

AI: From Buzzword to Reality - Can We Adapt Faster Than Attackers?

 

 * The cybersecurity landscape is facing a pivotal and challenging moment,
   requiring a strategic choice between reactive or proactive approaches.
   Adopting an adversary's perspective can transform challenges into
   opportunities for innovation and shaping the future of security. This
   presentation will provide a Red Team perspective on how AI is altering the
   threat landscape and strategies to stay ahead of attackers.

 

Eva Benn, Senior Security PM Manager, Microsoft

13:45 - 14:20

Fireside Chat

 

AI and Cyber Threats: Friend, Foe, or Frenemy?

 

 * How is AI Changing the Threat Landscape?

 * What are the potential benefits of AI in enhancing security measures?
 * How can we ethically harness AI while avoiding its potential pitfalls?

 

Anna Hakkers, Leader in Data Security, Philips

14:30 - 16:00

1-2-1 Meetings & Networking

16:00 - 17:00
Fireside Chat

Peer-to-peer Roundtable Discussions

 

• Aligning CISO and the Board
• How to Plan your Migration Towards Quantum Safe Cryptography
• Protecting Employee Mental Health
• Establishing Allies, Defusing Enemies: The politics of the CISO
• A Zero Trust Approach to Digital Identity

• Minimizing Risks in Breach Situations



17:00 - 18:00

Proposed: Cyber Awareness Training Session

18:00 - 18:05

Chair's Closing Remarks

 

Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL

 18:05  Evening Reception


DAY 2 AGENDA

08:30

Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10

Chair's Opening Remarks

09:10 - 10:10
Breakfast Briefings
Breakfast Briefings
Breakfast Briefings
 
Breakfast Briefings


1. Crafting a Resilient Strategy: Effective Action Plans for CISOs in Crisis
Management
2. Are we in a golden era of ransomware? So what? The rise of RaaS,
multi-extortion, AI enabled cartels and big game hunting
3. Taking a seat at the table: How to Ensure Cyber Security is High on the
Business Agenda

10:10 - 10:40
Panel Discussion

 

Simplifying the Supply Chain: Identifying, Prioritising and Mitigating Risk

 

 * How can you effectively map, assess, and prioritise vulnerabilities across
   your supply chain?
 * What are the regulatory implications of fourth, fifth, and nth party risks
   for businesses
 * How can businesses fortify themselves against evolving supply chain cyber
   threats?

 

Moderator: Marcin Roth, Senior Cyber Security Manager, Currys



Alan Lucas, CISO, Homefashion Group Plc



 

Invited: Senior Representative, The Heineken

10:40 - 11:20
Keynote
Sponsor Presentation
Keynote Presentation

 

Addressing Human Risk and Insider Threats

 



 * * Insider threat is becoming a major concern in security. Despite numerous
     technical tools, managing human risk is challenging.
   * This session explores a real-life case study on what drives individuals to
     become insider threats. We'll examine how technology, communication, and
     processes can deter or inadvertently create insider threats.
   * The discussion will focus on building resilience against insider threats by
     balancing empathy and sophisticated tools 

 

Sunette Runhaar, Head of Global Insider Threat Program, Uber

11:30 - 13:00
Fireside Chat

1-2-1 Meetings & Networking

13:00 - 13:30

Lunch & Networking

13:30 - 14:00

Fireside Chat

 

Rethinking risk management: Embracing fresh approaches to cyber resilience

 

 * How can you get to grips with your true risk profile?

 * How can organizations move beyond traditional patching and remediation
   methods to mitigate risks more effectively?

 * How can agile risk response frameworks enhance organizations' ability to
   adapt to new challenges and threats?

 

Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL

14:00 - 14:50
Fireside Chat

Panel Discussion


Are you stuck playing the blame game? How to reframe your security culture

 

• What’s the gap between your ideal security culture and your current state of
play?

• Tools, training, networks: What initiatives make the biggest impact?
• How to measure outcomes and continuously improve security culture metrics

 

Daniela Lourenço, CISO, FinTech

14:50 - 15:50
Sponsored Interview

1-2-1 Meetings & Networking

15:50 - 16:20
Fireside Chat

Industry Takeaway Tables

 

To conclude the Cyber Leaders Summit, this session is designed for you to engage
with peers specific to your industry, whether it’s financial services,
healthcare, retail, manufacturing or something else. Listen to and share your
most valuable takeaways from the Cyber Leaders Summit, to ensure you return to
work with powerful insights and ideas!

16:20 - 16:30

Chair's Closing Remarks

 

Prize Draw & Event Roundup

   

 


REGISTER YOUR INTEREST

 

REGISTER INTEREST FORM

If you’re interested in attending, simply fill in the below form or send an
email to cyberleaders@clarionevents.com and a member of the team will be in
touch. 

 



SPONSOR OPPORTUNITIES FORM

Let us know what technologies you cover below, and we'll put you in touch with
your designated account manager to start building your custom package.

 



 

 




ORGANISED BY


PART OF

 
 * Insights
 * Events
 * Connections
 * Sponsorship
 * About
 * Join the Community

 
 * 
 * 

 * 

 * 

 * 

 * Imago Techmedia
 * (Clarion Events Ltd)
 * Fulham Green
 * 69-79 Fulham High Street
 * London
 * SW6 3JW

 

Privacy PolicyCookie Settings
Event Website By
By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.
Cookie Settings Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

LEGITIMATE INTEREST

Legitimate Interest

These cookies we have deemed to be a legitimate interest for our website users
as they allow functionality of the website to be visible to users which would
allow greater functionality of our website and a greater user experience.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

UNCLASSIFIED

Unclassified

Cookies that are currently unclassified

Cookies Details‎
Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices