Attend this event
View other dates for the Summit
1:30 PM-2:30 PM
Advisory Board Think Tank
2:30 PM-3:00 PM
Welcome & Registration
3:00 PM-3:15 PM
3:15 PM-4:00 PM
Filling the Talent Void
Information Security is a white-hot field. Over the last decade, it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all-time high. However, the availability of personnel with the necessary skills is sinking to an all-time low. There simply is not enough expertise to go around. In this environment, senior Information Security leaders must express creativity in their pursuit of the people, performance, and passion necessary to address this capability shortfall.
4:05 PM-4:50 PM
Being Effective.... Securely
In the post pandemic era, remote employment is the new status quo. Employers are forced to implement and improve the digital workplace by providing productivity tools and accessibility to company resources. In this session, we will share case studies of successful digital workplace implementations, including how to deal with the inherent security risks of expanded accessibility to company resources. In this session you will learn from real working examples the keys to implementing a successful digital workplace including how to evaluate the potential ROI from the different security strategies available.
4:50 PM-8:00 PM
8:45 AM-9:45 AM
Welcome & Breakfast
9:45 AM-10:00 AM
10:00 AM-10:45 AM
The Greatest Fears?
The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?
10:50 AM-11:15 AM
What’s AI Doing for You?
The terms "Artificial Intelligence" and "Advanced Machine Learning" are often thought of interchangeably. While there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather, one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.
11:15 AM-11:35 AM
11:35 AM-12:20 PM
Zero Trust Network
A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.
Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2022 more than any other year?
12:20 PM-1:20 PM
1:20 PM-2:05 PM
AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts
The improvements in Artificial Intelligence (AI) and Machine Learning (ML) are a double edged sword. It has the capability to improve upon security decision making and incident pattern recognition while also enabling hackers to create malware. Thus it is critical for CISOs to adopt these technologies to stay ahead of advanced threats and improve the recognition of exploits and weaknesses within their networks.
2:10 PM-2:45 PM
Guarding the Doors: Navigating 3rd Party Risk
Organizations are increasingly outsourcing business activities to 3rd-party vendors. It is critical for an organization to be vigilant when selecting the right 3rd-party vendor with the appropriate security posture, as many vendors are hosting, processing and transmitting sensitive regulatory information with unrestrained access to our IT assets.
2:45 PM-3:05 PM
3:05 PM-3:50 PM
We have always suffered from a shortage of good security employees. Is it any wonder we have trouble recruiting and motivating good security people?
The shift to work from home that was accelerated by the start of the COVID pandemic has resulted in a sharp increase in cyberattacks. Companies of all sizes were simply unprepared for the sudden and massive switch to remote work. As a result, data exfiltration and leakage has increased most sharply. Phishing, ransomware, VPN breaches and other security events have all shot up as well. Inevitably the sheer persistence of these attacks led to more hours of work needed leading to staff burnout, often more severe at organizations that are still trying to fight present battles with yesterday’s tools. Many believe that a new approach is needed to prevent cybersecurity staff burnout increasing the demand for more automated solutions since yesterday’s tools are not nearly as successful at stopping attacks as state-of-the-art methods, in addition to increasing the workload for cybersecurity staff, using them also exposes organizations to major losses.
3:55 PM-4:10 PM
Data Security and the Internet of Things
Enterprises are taking action on IoT security, but are they doing enough?
Intelligent, connected objects offer multiple opportunities for value creation and capture, but can also create tremendous risk, demanding new strategies for value protection. A single vulnerable device can leave an entire ecosystem open to attack, with potential disruptions ranging from individual privacy breaches to massive breakdowns of public systems. Being secure, vigilant, and resilient in the connected age is more important than ever as vast amounts of real-time information are captured by a growing number of connected devices we touch, pass, and encounter every day. Thanks to the IoT, data security risks will very likely go beyond embarrassing privacy leaks to, potentially, the hacking of important public systems.
4:15 PM-4:30 PM
CISOs face a huge headache trying to understand how to know when they were attacked, what data attackers have corrupted? How quickly can they recover from the attack? And do they have to pay a ransom to get the data back?
Ransomware remains a significant challenge for companies, not simply because it has become ubiquitous, but also because of the significant impact a single ransomware attack may have on a company and every other company or customer that relies on that company.
Cybersecurity and risk management have always been vital for the flow of any business. However, the current condition of the global supply chain makes it exceptionally vulnerable to severe damage from an attack more so than usual. When the supply chain is barely getting by, criminals are more likely to assume they have leverage over businesses. A ransomware attacker may be more brazen and exercise higher demands than they might have a few years ago.
4:30 PM-4:45 PM
Closing Remarks & Raffle Giveaway
4:45 PM-5:45 PM
C-Vision laid out an articulate plan for us to be much more targeted, presented a stronger ROI and on top have come through with the Results they Promised. They really have become an adjunct "team for hire" building trust with us all along the way. There is no second guessing on this relationship and consistently over-deliver. My kind of Partner.
I had the pleasure of joining the C-Vision International, Nordics CISO Council Roundtable with a wonderful group of cyber executives. We had a wonderful, insightful conversation and the whole experience was enjoyable. I made great new contacts and reconnected with existing contacts on really important topics that matter to CISO’s and all in cybersecurity. I’d highly recommend joining in any C-Vision event.
C-Vision has helped my company a great deal. They have trusted deep relationships that make the sales process a lot easier. Everyone wants to get in front of C-level execs today. C-Vision cuts through the noise to help build long lasting business relationships!
C-Vision was really professional, responsive, listened and are very thoughtful in their approach. They are very high touch and truly care about the customer and end result. Our speakers were impressed with the format, and who they brought to the table. I can't recommend them enough and with so many out there, it is hard to find the right fit!
Intimate, immersive experiences provided by a group of individuals always available to support our needs. Fantastic organization and very high-level executives. The promise was delivered!
C-vision's events combine relevant topics with a suitable audience. I found great value at my last attendance, and would definitely consider upcoming events.
Thoughtful discussion among experienced leaders regarding current challenges and complexities, and valuable exchange of pragmatic approaches and best practices. Well organized and facilitated.
A group very focused in bringing diversity to the discussion table
I love the engaging format of the councils. Very high level discussions and never a sales pitch. The C-Vision staff members are amazing.
A very warm welcome and interesting speakers. I was very pleased to be among such a dynamic group.
The process was very well organized by C-Vision. Perfect organization, honest and authentic speakers of high level.