OPERATING MODEL IN YOUR DIGITAL SECURITY STRATEGY:
Traditional Enterprises Processes and Boundaries are being reshaped as companies move to a new App based economy to drive out their digital first strategies. Information Security has to step outside of it’s comfort zone and evolve both thinking and approach in order to manage risk in this brave world.
IT security leaders also require a next generation security strategy to match the progression and transformation of their internal technology offerings. This requires having integrated, automated, and effective controls in place to detect and prevent threats, both known and unknown, at every stage of the attack lifecycle, as well as a security platform that is built from the ground up for prevention. Businesses require visibility of throughout their network, their cloud platform and all endpoints, in order to protect themselves against the new age threat landscape.
In this panel, we will discuss the challenges of managing security across product lines and a potential operational model for Information Security for the future.
Moderated by: Tue Jagtfelt, Global Head of IT Security at ISS World Services
Oscar Wide, Group CISO at AF
Jarkko Rautula, Group CISO at IKEA
Brian O’toole, CISO at Ericsson
Marc Lueck, Group CISO at Zscaler
SSL DECRYPTION, PRIVACY and SECURITY, A BALANCING ACT
Speaker: Marc Lueck, Group CISO at Zscaler
The Importance of Culture – a look at strengthening “the weakest link” in Cybersecurity
When society is being digitally transformed, we impose a set of new technology onto a big, non-technical crowd. This can pose many risks, but done right might also produce great rewards. A speech looking at key actions to take to align security culture with the board, management and throughout the organization. The topics discussed will include a case study of actions performed within the Storebrand Group – a financial services company located in Norway and Sweden; Hypothesis’s vs. “the real world”, and some lessons learned
Speaker: Bjorn Watne, Group CISO at Storebrand
DIGITAL SECURITY STRATEGY
We, as a Cyber Security expert, are responsible for ensuring that data privacy and security are a primary focus when designing our Digital strategy solutions. And as an industry, if one of us fails in this area, it has ripple effects for us all as it slows down consumer and enterprise adoption of connected solutions. In this round table session, we will discuss considerations for designing digital security into your solution upfront.
-How cybersecurity threat is real in your Digital strategy?
-What steps to take when designing connected devices to mindfully minimise the data collected
-Additional best practices -know applicable laws, take caution with third party code, encrypt all data transmissions and more.
How we collate feedback and we plan to grow out the regions educational meetings.
Highlight the chapters outcomes and action the community can make from content explored.