www.dtx360.io
Open in
urlscan Pro
77.72.2.72
Public Scan
URL:
https://www.dtx360.io/event/dtx-cyber-security-leaders-summit-europe
Submission: On July 17 via api from LU — Scanned from GB
Submission: On July 17 via api from LU — Scanned from GB
Form analysis
1 forms found in the DOMGET /search
<form class="mod-finder js-finder-searchform form-search" action="/search" method="get" role="search">
<label for="mod-finder-searchword202" class="visually-hidden finder">Search</label>
<div class="awesomplete"><input type="text" name="q" id="mod-finder-searchword202" class="js-finder-search-query form-control" value="" placeholder="Search …" autocomplete="off" aria-expanded="false" aria-owns="awesomplete_list_1" role="combobox">
<ul hidden="" role="listbox" id="awesomplete_list_1"></ul><span class="visually-hidden" role="status" aria-live="assertive" aria-atomic="true">Type 2 or more characters for results.</span>
</div>
</form>
Text Content
* News * Videos * Podcasts Navigation Navigation Close Tech Areas * Cloud * Cyber Security * Data, AI & Automation * Networks & Infrastructure * Software Development & DevOps * Unified Communications & Collaboration * Home * Insights * News * Videos * Podcasts * Events * Connections * Sponsorship * About * Our Manifesto * Tech For Good * Diversity, Equity & Inclusion * Accessibility * Community * Solutions * Search News Videos Podcasts * Information UCX Manchester UCX MANCHESTER Information2nd April, 2025, 09:30 - 3rd April, 2025, 17:30 Manchester Central * Information DTX Manchester DTX MANCHESTER TECH WEEK Information2nd April, 2025, 09:30 - 3rd April, 2025, 17:30 Manchester Central * InformationCyber Security Leaders Summit Manchester CYBER SECURITY LEADERS SUMMIT MANCHESTER Information18th November, 2024, 09:00 - 19th November, 2024, 19:30 Hilton Deansgate, Manchester, UK Leaders Summit CYBER SECURITY LEADERS SUMMIT Manchester 18-19 NOVEMBER 2024 - Hilton deansgate, Manchester, UK Details coming soon. Please check back for more information. BACK TO EVENTS * Information UCX London UCX LONDON Information2nd October, 2024, 09:30 - 3rd October, 2024, 16:30 ExCeL London * Information DTX London DTX LONDON Information2nd October, 2024, 09:30 - 3rd October, 2024, 16:30 ExCeL London * InformationCyber Security Leaders Summit Amsterdam CYBER LEADERS' SUMMIT AMSTERDAM Information25th September, 2024, 09:00 - 26th September, 2024, 16:30 Hotel Okura, Amsterdam, Netherlands Leaders Summit CYBER LEADERS' SUMMIT Europe 25-26 September 2024 - hotel okura, amsterdam, netherlands Who's it for? Chief Information Security Officer, Chief Information Officer, VP/Director/Head of: Information Security, Cyber Security, IT, Cyber Defense, Security Operations, Incident Response, Security Architecture, Threat Intelligence, Pen Testing Don't just take our word for it... Previous Speakers Our global portfolio SPONSORS What to expect on the day Day 1 Agenda 08:00 Registration Opens: Breakfast, Meet & Greet 08:45 - 9:00 Chair's Opening Remarks Chairperson: Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 09:00 - 09:30 Opening Keynote Assessing the current Cybersecurity landscape: Key Threats and Future Focus • What strategies can CISOs use to stay ahead of evolving threats?• How can organisations uphold cybersecurity principles amid constant technological change?• How can collaboration and information sharing among cyber professionals transform threat mitigation? Madelein van der Hout, Sr. Analsyt Cyber Security & Risk, Forrester Alan Lucas, CISO, Homefashion Group Plc 09:30 - 10:10 Panel Discussion Conquering Compliance Challenges: Navigating Europe's Regulatory Landscape How can organisations proactively adapt to evolving EU regulations while maintaining operational efficiency? What steps are you taking to ensure NIS2 & DORA compliance? How can industry collaboration enhance regulatory compliance efforts? Moderator: Steve Purser, Former Head of Core Operations Department, ENISA René Pluis, Group Security - Regulations & Standards, Philips 10:10 - 11:20 Keynote Peer-to-peer Roundtable Discussions • How to Prove Maturity and Resilience on Third-Party Systems• DevSecOps Transformation: Proactive Defence• Simplyfing and Streamlining Cloud Controls and Tools• How to Build a High Performing Security Team• How to Establish your CISO Persona?• How to Manage the Risks that Come with AI 11:20 - 12:50 1-2-1 Meetings & Networking 12:50 - 13:40 Lunch & Networking Diversity in Cyber Presentation 13:20 - 13:45 Keynote Presentation AI: From Buzzword to Reality - Can We Adapt Faster Than Attackers? The cybersecurity landscape is facing a pivotal and challenging moment, requiring a strategic choice between reactive or proactive approaches. Adopting an adversary's perspective can transform challenges into opportunities for innovation and shaping the future of security. This presentation will provide a Red Team perspective on how AI is altering the threat landscape and strategies to stay ahead of attackers. Eva Benn, Senior Security PM Manager, Microsoft 13:45 - 14:20 Fireside Chat AI and Cyber Threats: Friend, Foe, or Frenemy? How is AI Changing the Threat Landscape? What are the potential benefits of AI in enhancing security measures? How can we ethically harness AI while avoiding its potential pitfalls? Anna Hakkers, Leader in Data Security, Philips 14:30 - 16:00 1-2-1 Meetings & Networking 16:00 - 17:00 Fireside Chat Peer-to-peer Roundtable Discussions • Aligning CISO and the Board• How to Plan your Migration Towards Quantum Safe Cryptography• Protecting Employee Mental Health• Establishing Allies, Defusing Enemies: The politics of the CISO• A Zero Trust Approach to Digital Identity • Minimizing Risks in Breach Situations 17:00 - 18:00 Proposed: Cyber Awareness Training Session 18:00 - 18:05 Chair's Closing Remarks Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 18:05 Evening Reception Day 2 Agenda 08:30 Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10 Chair's Opening Remarks 09:10 - 10:10 Breakfast Briefings Breakfast Briefings Breakfast Briefings Breakfast Briefings 1. Crafting a Resilient Strategy: Effective Action Plans for CISOs in Crisis Management2. Are we in a golden era of ransomware? So what? The rise of RaaS, multi-extortion, AI enabled cartels and big game hunting3. Taking a seat at the table: How to Ensure Cyber Security is High on the Business Agenda 10:10 - 10:40 Panel Discussion Simplifying the Supply Chain: Identifying, Prioritising and Mitigating Risk How can you effectively map, assess, and prioritise vulnerabilities across your supply chain? What are the regulatory implications of fourth, fifth, and nth party risks for businesses How can businesses fortify themselves against evolving supply chain cyber threats? Moderator: Marcin Roth, Senior Cyber Security Manager, Currys Alan Lucas, CISO, Homefashion Group Plc Invited: Senior Representative, The Heineken 10:40 - 11:20 Keynote Sponsor Presentation Keynote Presentation Addressing Human Risk and Insider Threats Insider threat is becoming a major concern in security. Despite numerous technical tools, managing human risk is challenging. This session explores a real-life case study on what drives individuals to become insider threats. We'll examine how technology, communication, and processes can deter or inadvertently create insider threats. The discussion will focus on building resilience against insider threats by balancing empathy and sophisticated tools Sunette Runhaar, Head of Global Insider Threat Program, Uber 11:30 - 13:00 Fireside Chat 1-2-1 Meetings & Networking 13:00 - 13:30 Lunch & Networking 13:30 - 14:00 Fireside Chat Rethinking risk management: Embracing fresh approaches to cyber resilience How can you get to grips with your true risk profile? How can organizations move beyond traditional patching and remediation methods to mitigate risks more effectively? How can agile risk response frameworks enhance organizations' ability to adapt to new challenges and threats? Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 14:00 - 14:50 Fireside Chat Panel Discussion Are you stuck playing the blame game? How to reframe your security culture • What’s the gap between your ideal security culture and your current state of play? • Tools, training, networks: What initiatives make the biggest impact?• How to measure outcomes and continuously improve security culture metrics Daniela Lourenço, CISO, FinTech 14:50 - 15:50 Sponsored Interview 1-2-1 Meetings & Networking 15:50 - 16:20 Fireside Chat Industry Takeaway Tables To conclude the Cyber Leaders Summit, this session is designed for you to engage with peers specific to your industry, whether it’s financial services, healthcare, retail, manufacturing or something else. Listen to and share your most valuable takeaways from the Cyber Leaders Summit, to ensure you return to work with powerful insights and ideas! 16:20 - 16:30 Chair's Closing Remarks Prize Draw & Event Roundup Register your interest REGISTER INTEREST FORM If you’re interested in attending, simply fill in the below form or send an email to cyberleaders@clarionevents.com and a member of the team will be in touch. sponsor opportunities form Let us know what technologies you cover below, and we'll put you in touch with your designated account manager to start building your custom package. * InformationCyber Security Leaders Summit Miami CYBER SECURITY LEADERS SUMMIT MIAMI Information24th June, 2024, 09:00 - 25th June, 2024, 16:30 JW Marriott, Miami Leaders Summit CYBER LEADERS' SUMMIT USA 24-25 JUNE 2024 - JW MARRIOTT, MIAMI Who's it for? Chief Information Security Officer, Chief Information Officer, VP/Director/Head of: • Information Security, Cyber Security, IT, Cyber Defense, Security Operations, Incident Response, Security Architecture, Threat Intelligence, Pen Testing Don't just take our word for it... Speakers Our global portfolio SPONSORS What to expect on the day Day 1 Agenda 08:00 Registration Opens: Breakfast, Meet & Greet 08:45 - 9:00 Clarion Events and Chair's Formal Welcome Chairperson: Jennifer Raiford, Former Deputy CISO, Unisys 09:00 - 09:30 Opening Keynote Understanding future threats: What are the key threats for cyber professionals in 2024 and beyond? • How do CISOs keep pace with rapidly evolving cyber security threats and technologies?• How to maintain cyber security principles amidst technological evolution• How can cyber professionals enhance collaboration and information sharing to mitigate future threats effectively? Moderator: Joseph Blankenship, VP, Research Director, Forrester David Sledge, Director of Cybersecurity, Avelo Airlines Jelani Campbell, Cyber Risk Oversight Director, Fannie Mae Jennifer Raiford, Former Deputy CISO, Unisys John Downey, CISO, GoFundMe 09:30 - 10:20 Panel Discussion Securing your supply chain: What can you really do? • How can you map, assess and prioritise vulnerabilities across your supply chain?• What can security leaders do, to prepare their supply chain security strategy as geopolitics and cyber continue to intertwine?• How can CISOs innovate and optimize supply chain security to ensure robust protection, with lean teams and resources? Moderator: Marcin Roth, Senior Cyber Security Manager, Currys Jon Abbott, CEO, ThreatAware Sam Miorelli, Global Head, Industrial Cyber and Digital Security for Industrial Applications, Siemens Energy Ricardo Johnson, VP & CISO, Dentsply Sirona 10:20 - 11:20 Keynote Peer-to-peer Roundtable Discussions • How to prove maturity and resilience on third-party systems• DevSecOps Transformation: Proactive Defence• Simplyfing and Streamlining Cloud Controls and Tools• How to build a high performing security team• Implementing a Zero Trust Strategy• How to Manage the Risks that Come with AI 11:20 - 12:50 1-2-1 Meetings & Networking 12:50 - 13:50 Lunch & Networking Diversity in Cyber presentation Moderator: Jennifer Raiford, Former Deputy CISO, Unisys Joshua Copeland, Cybersecurity Expert and Professor, Tulane University Chamon Gayton, Head of Cybersecurity, PayPal 13:40 - 14:30 Keynote Inside the Shadows: A Spy's Guide to Understanding Espionage and Protecting Your Organization • Espionage is a tangible threat beyond fictional plots, with real-world implications.• Former Case Officer reveals covert recruitment methods across industries, from casual conversations to sophisticated surveillance.• Understand the intricate world of espionage, its motivations, recruitment strategies, and defense tactics against human and cyber threats. Shawnee Delaney, CEO, Vaillance Group 14:30 - 16:00 1-2-1 Meetings & Networking 16:00 - 17:00 Peer-to-peer Roundtable Discussions • Aligning CISO and the Board• Getting Users to Own Secure Behaviours• Protecting Employee Mental Health• Safeguarding Against Evolving Threats• Focusing on High Priority Risk Mitigation• Minimizing Risks in Breach Situations 17:00 - 18:00 Fireside Chat The Cyber Escape Room co. Bringing cybersecurity training to life Amy Stokes-Waters, CEO & Owner, ESC - The Cyber Escape Room Co. 18:00 - 18:05 Chair's Closing Remarks 18:05 Evening Reception Day 2 Agenda 08:30 Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10 Chair's Opening Remarks Chairperson: Jay Hunter Anson, Cyber Security Ambassador, Cyber Florida 09:10 - 10:10 Breakfast Briefings Breakfast Briefings Breakfast Briefings Breakfast Briefings 1. Keeping calm in turbulent times: The makings of a security team who can face crisis head-on2. Are we in a golden era of ransomware? The rise of RaaS, multi-extortion, AI enabled cartels and big game hunting3. Taking a seat at the table: How to make sure cybersecurity is high on the business agenda 10:10 - 10:40 Fireside Chat Compliance challenges: Navigating regulatory complexity in 2024 and beyond • How to ensure you are compliant with State and Federal cyber regulations, whilst preservingoperational efficiency?• How can you ensure that you are safe from SEC regulations?• How can cyber leaders navigate regulations from multiple jurisdictions while upholding a globalcyber security posture? Jennifer Raiford, Former Deputy CISO, UnisysBradley Schaufenbuel, Vice President & Chief Information Security Officer, Paychex Michael Babischkin, VP, Deputy Director of Information Security, Federal Home Loan Bank of Chicago 10:40 - 11:30 Keynote Sponsor Presentation Panel Discussion How have advances in generative AI altered the threat landscape? • How has generative AI evolved attack tactics and how can organisations mitigate these riskseffectively?• How is the accessibility of generative AI within the workplace, impacting enterprise IT securitystrategy?• How can advanced analytics and ML augment and enhance the intelligence of your systems andanalysts? Oluwadamilola Obamehinti, Cybersecurity Expert Eva Benn, Senior Security PM Manager, Microsoft Graydon McKee, Senior Director Cybersecurity Engineering, VISA Tina Lampe, Director - IT Software Engineering, DIRECTV Jason Thomas, CIO, Cole, Scott & Kissane, P.A. 11:30 - 12:30 Fireside Chat 1-2-1 Meetings & Networking 12:30 - 13:30 Lunch & Networking 13:30 - 14:00 Fireside Chat Rethinking risk management: Embracing fresh approaches for cyber resilience • How can you get to grips with your true risk profile?• How can organizations move beyond traditional patching and remediation methods to mitigate risks more effectively?• How can agile risk response frameworks enhance organizations' ability to adapt to new challenges and threats? Moderator: Martin Walker, VP, North American Operations, ThreatAware Pam Lindemoen, CISO Advisor, CISCO Chamon Gayton, Head of Cybersecurity, PayPal 14:00 - 14:40 Fireside Chat Panel Discussion Are you stuck playing the blame game? How to reframe your security culture • What’s the gap between your ideal security culture and your current state of play?• Tools, training, networks: What initiatives make the biggest impact?• How to measure outcomes and continuously improve security culture metrics Beth Miller, Co-owner, Resilience Consulting Group Joseph Blankenship, VP, Research Director, Forrester Joshua Copeland, Cybersecurity Expert and Professor, Tulane University Michael Calderin, Chief Information Security Officer, YAGEO Group Tim Ward, Co-founder & CEO, Think Cyber 14:50 - 15:20 Sponsored Interview 1-2-1 Meetings & Networking 15:20 - 16:00 Fireside Chat Industry Takeaway Tables To conclude the Cyber Leaders Summit, this session is designed for you to engage with peers specific to your industry, whether it’s financial services, healthcare, retail, manufacturing or something else. Listen to and share your most valuable takeaways from the Cyber Leaders Summit, to ensure you return to work with powerful insights and ideas! 16:00 - 16:10 Chair's Closing Remarks Chairperson: Jay Hunter Anson, Cybersecurity Ambassador, Cyber Florida Prize Draw & Event Roundup Register your interest REGISTER INTEREST FORM If you’re interested in attending, simply fill in the below form or send an email to transformers@imagotechmedia.com and a member of the team will be in touch. sponsor opportunities form Let us know what technologies you cover below, and we'll put you in touch with your designated account manager to start building your custom package. SEE ALL EVENTS CONNECTIONS We understand the value of making connections that matter. The right connection at the right time can help IT professionals to unlock opportunities, save time and make more confident decisions. VIEW ALL CONNECTIONS SPONSORSHIP OPPORTUNITIES We have a plenty of sponsorship opportunities to fit every goal and budget. VIEW ALL SPONSORSHIP OPPORTUNITES OUR MANIFESTO Our purpose at DTX 360 is simple… to help you on your digital transformation journey! Read more TECH FOR GOOD Across the technology sector, we have the opportunity to make the world a better place. Read more DIVERSITY, EQUITY & INCLUSION We at DTX want to be part of the change, do you? Read more ACCESSIBILITY At DTX accessibility is important — helping to provide an enjoyable event for everyone. Read more JOIN THE COMMUNITY! DTX 360 is your home of digital transformation. Stay up to date on the latest digital transformation news, discover use-case stories before anyone else, make the VIP guest list and get exclusive deals from the world’s best solution providers. JOIN THE COMMUNITY * Home * Insights * News * Videos * Podcasts * Events * Connections * Sponsorship * About * Our Manifesto * Tech For Good * Diversity, Equity & Inclusion * Accessibility * Community * Solutions * Search Search Type 2 or more characters for results. Leaders Summit CYBER LEADERS' SUMMIT EUROPE 25-26 SEPTEMBER 2024 - HOTEL OKURA, AMSTERDAM, NETHERLANDS about Our Cyber Leaders' Summits are private, invite-only events for selected senior cyber leaders, decision-makers and budget-holders. We have shaken up the typical industry event format and focussed on creating value for our audience by facilitating meaningful connections, engaging cross-industry discussions, and high-level networking. Our summits give you the opportunity to network with senior peers in a relaxed, private environment, hear and learn from the most influential members of the payments community, and provide a platform to engage in pre-qualified meetings with leading solution providers. Register interest Become a sponsor WHO'S IT FOR? Chief Information Security Officer, Chief Information Officer, VP/Director/Head of: Information Security, Cyber Security, IT, Cyber Defense, Security Operations, Incident Response, Security Architecture, Threat Intelligence, Pen Testing DON'T JUST TAKE OUR WORD FOR IT... PREVIOUS SPEAKERS OUR GLOBAL PORTFOLIO SPONSORS WHAT TO EXPECT ON THE DAY DAY 1 AGENDA 08:00 Registration Opens: Breakfast, Meet & Greet 08:45 - 9:00 Chair's Opening Remarks Chairperson: Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 09:00 - 09:30 Opening Keynote Assessing the current Cybersecurity landscape: Key Threats and Future Focus • What strategies can CISOs use to stay ahead of evolving threats? • How can organisations uphold cybersecurity principles amid constant technological change? • How can collaboration and information sharing among cyber professionals transform threat mitigation? Madelein van der Hout, Sr. Analsyt Cyber Security & Risk, Forrester Alan Lucas, CISO, Homefashion Group Plc 09:30 - 10:10 Panel Discussion Conquering Compliance Challenges: Navigating Europe's Regulatory Landscape * How can organisations proactively adapt to evolving EU regulations while maintaining operational efficiency? * What steps are you taking to ensure NIS2 & DORA compliance? * How can industry collaboration enhance regulatory compliance efforts? Moderator: Steve Purser, Former Head of Core Operations Department, ENISA René Pluis, Group Security - Regulations & Standards, Philips 10:10 - 11:20 Keynote Peer-to-peer Roundtable Discussions • How to Prove Maturity and Resilience on Third-Party Systems • DevSecOps Transformation: Proactive Defence • Simplyfing and Streamlining Cloud Controls and Tools • How to Build a High Performing Security Team • How to Establish your CISO Persona? • How to Manage the Risks that Come with AI 11:20 - 12:50 1-2-1 Meetings & Networking 12:50 - 13:40 Lunch & Networking Diversity in Cyber Presentation 13:20 - 13:45 Keynote Presentation AI: From Buzzword to Reality - Can We Adapt Faster Than Attackers? * The cybersecurity landscape is facing a pivotal and challenging moment, requiring a strategic choice between reactive or proactive approaches. Adopting an adversary's perspective can transform challenges into opportunities for innovation and shaping the future of security. This presentation will provide a Red Team perspective on how AI is altering the threat landscape and strategies to stay ahead of attackers. Eva Benn, Senior Security PM Manager, Microsoft 13:45 - 14:20 Fireside Chat AI and Cyber Threats: Friend, Foe, or Frenemy? * How is AI Changing the Threat Landscape? * What are the potential benefits of AI in enhancing security measures? * How can we ethically harness AI while avoiding its potential pitfalls? Anna Hakkers, Leader in Data Security, Philips 14:30 - 16:00 1-2-1 Meetings & Networking 16:00 - 17:00 Fireside Chat Peer-to-peer Roundtable Discussions • Aligning CISO and the Board • How to Plan your Migration Towards Quantum Safe Cryptography • Protecting Employee Mental Health • Establishing Allies, Defusing Enemies: The politics of the CISO • A Zero Trust Approach to Digital Identity • Minimizing Risks in Breach Situations 17:00 - 18:00 Proposed: Cyber Awareness Training Session 18:00 - 18:05 Chair's Closing Remarks Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 18:05 Evening Reception DAY 2 AGENDA 08:30 Registration Opens: Breakfast, Meet & Greet 09:00 - 09:10 Chair's Opening Remarks 09:10 - 10:10 Breakfast Briefings Breakfast Briefings Breakfast Briefings Breakfast Briefings 1. Crafting a Resilient Strategy: Effective Action Plans for CISOs in Crisis Management 2. Are we in a golden era of ransomware? So what? The rise of RaaS, multi-extortion, AI enabled cartels and big game hunting 3. Taking a seat at the table: How to Ensure Cyber Security is High on the Business Agenda 10:10 - 10:40 Panel Discussion Simplifying the Supply Chain: Identifying, Prioritising and Mitigating Risk * How can you effectively map, assess, and prioritise vulnerabilities across your supply chain? * What are the regulatory implications of fourth, fifth, and nth party risks for businesses * How can businesses fortify themselves against evolving supply chain cyber threats? Moderator: Marcin Roth, Senior Cyber Security Manager, Currys Alan Lucas, CISO, Homefashion Group Plc Invited: Senior Representative, The Heineken 10:40 - 11:20 Keynote Sponsor Presentation Keynote Presentation Addressing Human Risk and Insider Threats * * Insider threat is becoming a major concern in security. Despite numerous technical tools, managing human risk is challenging. * This session explores a real-life case study on what drives individuals to become insider threats. We'll examine how technology, communication, and processes can deter or inadvertently create insider threats. * The discussion will focus on building resilience against insider threats by balancing empathy and sophisticated tools Sunette Runhaar, Head of Global Insider Threat Program, Uber 11:30 - 13:00 Fireside Chat 1-2-1 Meetings & Networking 13:00 - 13:30 Lunch & Networking 13:30 - 14:00 Fireside Chat Rethinking risk management: Embracing fresh approaches to cyber resilience * How can you get to grips with your true risk profile? * How can organizations move beyond traditional patching and remediation methods to mitigate risks more effectively? * How can agile risk response frameworks enhance organizations' ability to adapt to new challenges and threats? Jeroen Prinse, CISO (ad interim), National Cyber Security Center - NL 14:00 - 14:50 Fireside Chat Panel Discussion Are you stuck playing the blame game? How to reframe your security culture • What’s the gap between your ideal security culture and your current state of play? • Tools, training, networks: What initiatives make the biggest impact? • How to measure outcomes and continuously improve security culture metrics Daniela Lourenço, CISO, FinTech 14:50 - 15:50 Sponsored Interview 1-2-1 Meetings & Networking 15:50 - 16:20 Fireside Chat Industry Takeaway Tables To conclude the Cyber Leaders Summit, this session is designed for you to engage with peers specific to your industry, whether it’s financial services, healthcare, retail, manufacturing or something else. Listen to and share your most valuable takeaways from the Cyber Leaders Summit, to ensure you return to work with powerful insights and ideas! 16:20 - 16:30 Chair's Closing Remarks Prize Draw & Event Roundup REGISTER YOUR INTEREST REGISTER INTEREST FORM If you’re interested in attending, simply fill in the below form or send an email to cyberleaders@clarionevents.com and a member of the team will be in touch. SPONSOR OPPORTUNITIES FORM Let us know what technologies you cover below, and we'll put you in touch with your designated account manager to start building your custom package. ORGANISED BY PART OF * Insights * Events * Connections * Sponsorship * About * Join the Community * * * * * * Imago Techmedia * (Clarion Events Ltd) * Fulham Green * 69-79 Fulham High Street * London * SW6 3JW Privacy PolicyCookie Settings Event Website By By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Settings Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details LEGITIMATE INTEREST Legitimate Interest These cookies we have deemed to be a legitimate interest for our website users as they allow functionality of the website to be visible to users which would allow greater functionality of our website and a greater user experience. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details UNCLASSIFIED Unclassified Cookies that are currently unclassified Cookies Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices