Visionaries























June 2, 2022
Attend this event
View other dates for the Think Tank
12:30 PM-1:30 PM
Registration & Networking Lunch
1:30 PM-1:40 PM
Welcome
1:40 PM-2:35 PM
Zero Trust Network
A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.
Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2022 more than any other year?
2:35 PM-2:50 PM
Networking Break
2:50 PM-3:35 PM
What’s AI Doing for You?
The terms "Artificial Intelligence" and "Advanced Machine Learning" are often thought of interchangeably. While there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather, one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.
3:40 PM-3:55 PM
The Explosion of API Security
How do CISOs get the most out of APIs while limiting the risk? 20 years ago the motives for hackers were website defacement and getting your name on all those defacements. That was the point of hacking. Now, it’s all about monetizing the data you can steal. Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they are benefiting from APIs, internal, via third parties, and often outwardly exposed. They just don’t know where they are, how much they support key services, and how they’re being used, or abused!
In this session we will discuss if APIs are meant to be exposed, and discuss if the startups API software companies are ready for the explosion.
3:55 PM-4:10 PM
Networking Break
4:10 PM-4:25 PM
Building Trust and Resilience Through Cloud Security and Compliance
With a mass migration to the cloud due to the ongoing pandemic, now is the perfect time to talk about cloud security and compliance. For organizations in every industry, the cloud is now omnipresent, and therefore, security is paramount. We’ll discuss the balancing act between security and compliance and explore how when security comes first, compliance follows. By understanding what goes into a successful cloud security program, how to implement those strategies and—most importantly and distinctively—how to use security and compliance as a differentiator, organizations will build trust with their clients, create cybersecurity resilience, and boost their brand.
4:30 PM-5:25 PM
Guarding the Doors: Navigating 3rd Party Risk
As organizations expand their third-party ecosystem, many are challenged with executing core activities that are critical to operations, risk profiles, and compliance posture without compromising the quality of data collection, evaluation, and mitigation measures increasingly outsourcing business activities to 3rd-party vendors. It is critical for an organization to be vigilant when selecting the right 3rd-party vendor with the appropriate security posture, as many vendors are hosting, processing and transmitting sensitive regulatory information with unrestrained access to our IT assets. At the highest level, third-party incidents can result in reputational damage, non-compliance, or even criminal activity, which can negatively impact earnings and shareholder value. To address this challenge, many organizations are investing in technology to support vendor risk management. Technology isn’t the entire answer to managing third-party risk, however the right technology or collection of technologies, coupled with optimal processes, can enable organizations to bridge the gap.
5:25 PM-5:30 PM
Closing Remarks
5:30 PM-6:30 PM
Cocktail Hour
Having been deluged by a smorgasbord of "vendors" trying to get us to sponsor CISO events literally multiple times a week it was hard to cut through all the noise. C-Vision laid out an articulate plan for us to be much more targeted, presented a stronger ROI and on top have come through with the Results they Promised. They really have become an adjunct "team for hire" building trust with us all along the way. There is no second guessing on this relationship and consistently over-deliver. My kind of Partner.
I had the pleasure of joining the C-Vision International, Nordics CISO Council Roundtable with a wonderful group of cyber executives. We had a wonderful, insightful conversation and the whole experience was enjoyable. I made great new contacts and reconnected with existing contacts on really important topics that matter to CISO’s and all in cybersecurity. I’d highly recommend joining in any C-Vision event.
C-Vision has helped my company a great deal. They have trusted deep relationships that make the sales process a lot easier. Everyone wants to get in front of C-level execs today. C-Vision cuts through the noise to help build long lasting business relationships!
C-Vision was really professional, responsive, listened and are very thoughtful in their approach. It showed from the information gathering stage, to the planning stage and then with execution. I call them a 'boutique' company - because they are very high touch and truly care about the customer and end result, and most importantly, the relationship building and next steps after the event. They do not overbook their calendar and it shows with their customer service. Our speakers (Senior Exec VP level) were impressed with the format, and who they brought to the table. We will be continuing to engage with them. I can't recommend them enough and with so many out there, it is hard to find the right fit!
Intimate, immersive experiences provided by a group of individuals always available to support our needs. Fantastic organization and very high-level executives. The promise was delivered!
C-vision's events combine relevant topics with a suitable audience. I found great value at my last attendance, and would definitely consider upcoming events.
Thoughtful discussion among experienced leaders regarding current challenges and complexities, and valuable exchange of pragmatic approaches and best practices. Well organized and facilitated.
A group very focused in bringing diversity to the discussion table
I love the engaging format of the councils. Very high level discussions and never a sales pitch. The C-Vision staff members are amazing.
A very warm welcome and interesting speakers. I was very pleased to be among such a dynamic group.
The process was very well organized by C-Vision. Perfect organization, honest and authentic speakers of high level.