The Future of IT & Cybersecurity
CISO & CIO Think Tank
October 5, 2023 - London, UK
VISIONARIES


Think Tank Speaker


Think Tank Speaker


Think Tank Speaker
Steve is an experienced Cyber Security Specialist who has worked in many financial organisations. With over 15 years in Cyber Security and a further 25 years in IT in general giving Steve and wide knowledge based to build upon. Steve’s speciality is Vulnerability and Risk Management and is a mentor to junior members of the Security Teams.




Think Tank Speaker




Think Tank Speaker
I am an experienced software and systems security engineer with over five years experience in various industries including health, consulting and internet services. I am interested in working on challenging software design and implementation problems within the areas of web technologies, mobile computing, big data and general distributed systems. I am proficient in Java, C# and JavaScript (including Node.js) and I can quickly pick up any new technology. I have worked on various implementations of data driven systems that utilise databases such as MySQL, MS SQL Server, MongoDB, Redis and Casandra. My specialities include software architecture design. security analysis, programming, application of agile methodologies and data extraction algorithm design.


Think Tank Speaker






Think Tank Speaker




Think Tank Speaker


Think Tank Speaker








Think Tank Speaker


Think Tank Speaker









Think Tank Speaker


Think Tank Speaker
October 5, 2023
Attend this event
View other dates for the Think Tank
9:00 AM-9:55 AM
Registration & Morning Networking
9:55 AM-10:00 AM
Opening Remarks
10:00 AM-10:20 AM
Digital Transformation
CIOs play a crucial role in driving their organization's digital transformation efforts. The COVID-19 pandemic has accelerated the adoption of digital technologies, and CIOs must continue to lead the way to stay competitive and meet the evolving needs of customers and employees. This requires a deep understanding of the organization's goals, processes, and IT infrastructure, as well as collaboration with other business leaders. By successfully leading digital transformation, CIOs can position their company for long-term success in a digital world.


10:25 AM-11:10 AM
Bridging the Gap Between IT & the Business
Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.
For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.








11:15 AM-11:30 AM
Navigating the Interplay between UK and EU Data and proposed AI Regulation in the Digital Age
This session explores the intricate relationship of the UK and EU regulatory compliance in data protection, privacy concerns, artificial intelligence (AI), and ethical considerations in the contemporary digital landscape. It delves into how organizations and their partners must adhere to UK and EU regulations while leveraging AI-driven data insights and upholding ethical standards and individual privacy rights. The discussion will encompass the challenges, strategies, and emerging trends in this complex domain within the context of the UK and the European Union's regulatory landscape.


11:35 AM-11:50 AM
Poor Cyber Hygiene
In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2023, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.
11:50 AM-12:50 PM
Lunch & Disruptor Showcase
12:35 PM-12:50 PM
Enhancing the Resilience of Your Organization's Final Barrier: The Human Firewall
In today's digital landscape, social engineering attacks like phishing, Business Email Compromise (BEC), and Ransomware are increasingly prevalent. These cunning tactics rely on manipulating humans to gain unauthorized access to protected systems and sensitive data. As the frequency of such cyber-attacks rises, it is crucial to fortify your organization's last line of defense: the human firewall.
In this session we will look into case studies around:
- Regular, tailored security awareness training to educate employees about social engineering threats.
- Foster a reporting culture for prompt identification of suspicious activities.
- Strengthen password policies and use multi-factor authentication (MFA) to reduce risks.
12:55 PM-1:30 PM
Threat Intelligence
Threat intelligence is vital for Cloud detection and response, particularly in modern threat-hunting. To address the business need for robust security, the CISO must focus on obtaining actionable intelligence. This entails gathering real-time information on emerging threats, vulnerabilities, and attack methods specific to the Cloud. Such intelligence can be acquired from various sources, including security vendors, threat feeds, and incident response teams. By leveraging actionable intelligence, the CISO can enhance their organization's defense strategies, enabling proactive identification and mitigation of threats in Cloud environments
1:35 PM-2:20 PM
Cloud Security
Cloud computing services have revolutionized business operations, but the threat of cloud vulnerabilities is increasing. To mitigate risks, businesses must implement robust security measures like multi-factor authentication and encryption. Automated detection systems like Cloud Security Posture Management (CSPM) are crucial for real-time monitoring. Regular training and adaptable defences are necessary due to the rapidly changing cloud landscape. Comprehensive incident response plans tailored to cloud environments are essential. By embracing these measures, organizations can protect themselves and their customers, ensuring a secure cloud environment and leveraging the benefits of cloud computing.






2:20 PM-2:40 PM
Networking Break
2:40 PM-3:25 PM
Building Security into DevSecOps
Many organizations struggle with how and where to introduce automation and integrations efficiently. Conventional approaches to application security can’t keep pace with cloud-native environments that use agile methodologies and API-driven architectures, microservices, containers, and serverless functions. Application security testing is evolving to meet the speed at which DevOps teams operate. DevSecOps teams are challenged with how to make sense of the noise their AppSec tools generate once they’ve been automated into DevOps pipelines.
Processes and tools are more fast-paced and rely on integration and automation to maintain efficiency throughout the software development life cycle. A new approach to DevSecOps is required addressing a change in the security mindset. How do CISOs achieve this without the buy-in from stakeholders?
3:25 PM-3:45 PM
Networking Break
3:45 PM-4:00 PM
The Greatest Fears?
The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?


4:05 PM-4:50 PM
Insider Threats
Despite advancements in technology, human error remains one of the most significant causes of data breaches. Whether it's due to a bad day or intentional misconduct, a single vulnerability can lead to the theft of millions of pieces of sensitive information and even jeopardize an entire organization. According to a report by Verizon on data breaches, approximately 34 percent of all attacks can be directly or indirectly attributed to employees. Therefore, it is crucial to create a culture of awareness within the organization to safeguard data in every way possible. This involves educating employees on data security best practices and implementing stringent measures to prevent insider threats. By taking a proactive approach to data protection, organizations can mitigate risks and safeguard their reputation while maintaining the trust of their stakeholders.




I am an experienced software and systems security engineer with over five years experience in various industries including health, consulting and internet services. I am interested in working on challenging software design and implementation problems within the areas of web technologies, mobile computing, big data and general distributed systems. I am proficient in Java, C# and JavaScript (including Node.js) and I can quickly pick up any new technology. I have worked on various implementations of data driven systems that utilise databases such as MySQL, MS SQL Server, MongoDB, Redis and Casandra. My specialities include software architecture design. security analysis, programming, application of agile methodologies and data extraction algorithm design.
4:50 PM-4:55 PM
Closing Remarks & Raffle Giveaway
4:55 PM-5:55 PM
Cocktail Hour
C-Vision laid out an articulate plan for us to be much more targeted, presented a stronger ROI and on top have come through with the Results they Promised. They really have become an adjunct "team for hire" building trust with us all along the way. There is no second guessing on this relationship and consistently over-deliver. My kind of Partner.
I had the pleasure of joining the C-Vision International, Nordics CISO Council Roundtable with a wonderful group of cyber executives. We had a wonderful, insightful conversation and the whole experience was enjoyable. I made great new contacts and reconnected with existing contacts on really important topics that matter to CISO’s and all in cybersecurity. I’d highly recommend joining in any C-Vision event.
C-Vision has helped my company a great deal. They have trusted deep relationships that make the sales process a lot easier. Everyone wants to get in front of C-level execs today. C-Vision cuts through the noise to help build long lasting business relationships!
C-Vision was really professional, responsive, listened and are very thoughtful in their approach. They are very high touch and truly care about the customer and end result. Our speakers were impressed with the format, and who they brought to the table. I can't recommend them enough and with so many out there, it is hard to find the right fit!
Intimate, immersive experiences provided by a group of individuals always available to support our needs. Fantastic organization and very high-level executives. The promise was delivered!
C-vision's events combine relevant topics with a suitable audience. I found great value at my last attendance, and would definitely consider upcoming events.
Thoughtful discussion among experienced leaders regarding current challenges and complexities, and valuable exchange of pragmatic approaches and best practices. Well organized and facilitated.
A group very focused in bringing diversity to the discussion table
I love the engaging format of the councils. Very high level discussions and never a sales pitch. The C-Vision staff members are amazing.
A very warm welcome and interesting speakers. I was very pleased to be among such a dynamic group.
The process was very well organized by C-Vision. Perfect organization, honest and authentic speakers of high level.