OPERATING MODEL IN YOUR DIGITAL SECURITY STRATEGY:
Traditional Enterprises Processes and Boundaries are being reshaped as companies move to a new App based economy to drive out their digital first strategies. Information Security has to step outside of it’s comfort zone and evolve both thinking and approach in order to manage risk in this brave world.
IT security leaders also require a next generation security strategy to match the progression and transformation of their internal technology offerings. This requires having integrated, automated, and effective controls in place to detect and prevent threats, both known and unknown, at every stage of the attack lifecycle, as well as a security platform that is built from the ground up for prevention. Businesses require visibility of throughout their network, their cloud platform and all endpoints, in order to protect themselves against the new age threat landscape.
In this panel, we will discuss the challenges of managing security across product lines and a potential operational model for Information Security for the future.
Moderated by: Bjorn Watne, CISO at Storebrand/SPP
Oscar Wide, Group CISO at AF
Jarkko Rautula, CISO at IKEA
Tue Jagtfelt, Head of IT Security at ISS World Services
Marc Lueck, Group CISO at Zscaler
Speaker: Marc Lueck, Group CISO at Zscaler
The Importance of Culture – a look at strengthening “the weakest link” in Cybersecurity
When society is being digitally transformed, we impose a set of new technology onto a big, non-technical crowd. This can pose many risks, but done right might also produce great rewards. A speech looking at key actions to take to align security culture with the board, management and throughout the organization. The topics discussed will include a case study of actions performed within the Storebrand Group – a financial services company located in Norway and Sweden; Hypothesis’s vs. “the real world”, and some lessons learned
Speaker: Bjorn Watne, Group CISO at Storebrand
DIGITAL SECURITY STRATEGY
We, as a Cyber Security expert, are responsible for ensuring that data privacy and security are a primary focus when designing our Digital strategy solutions. And as an industry, if one of us fails in this area, it has ripple effects for us all as it slows down consumer and enterprise adoption of connected solutions. In this round table session, we will discuss considerations for designing digital security into your solution upfront.
-How cybersecurity threat is real in your Digital strategy?
-What steps to take when designing connected devices to mindfully minimise the data collected
-Additional best practices -know applicable laws, take caution with third party code, encrypt all data transmissions and more.
How we collate feedback and we plan to grow out the regions educational meetings.
Highlight the chapters outcomes and action the community can make from content explored.