Defending the digital realm
Navigate the wave of change as generative AI booms, SEC introduces new rules, and advanced threats surge. CISOs lead through uncertainty, enhancing efficiency, productivity, and growth. Yet, technology alone won't suffice – it can expose your enterprise. Empower secure investments, elevate decisions, and fortify your business with our expert guidance.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Agenda
1:10 pm - 1:35 pm
Keynote
Leading Through Innovation: Mastering Emerging Technologies
In today’s rapidly evolving technological landscape, effective leadership is crucial for organizations to successfully navigate the complexities of emerging technologies. This presentation explores the key principles of leadership that drive innovation and adaptability in a tech-driven environment. It emphasizes the importance of visionary thinking, agility, collaboration, and ethical considerations in harnessing the potential of new technologies. Join us to learn how to foster continuous learning, manage change, and invest in talent development. We’ll also cover practical ways to embrace technological advancements while prioritizing customer-centric solutions.
Join this keynote address to explore:
- Practical approaches for embracing tech advancements and prioritizing customer-centric solutions
- Fostering a culture of continuous learning, managing change, and investing in talent development
- Leveraging data analytics and AI for strategic planning and informed decision-making
1:40 pm - 2:20 pm
Panel
From Shadow IT to Shadow AI - Tackling Emerging Risks
Emerging technologies introduce fresh risks and balancing these while fostering seamless innovation is a constant challenge. The advent of Shadow AI adds another dimension of risk for security leaders, compounding the existing issues of concealed technical debt and shadow IT. The changing digital environment requires a fresh approach to risk management and governance. One that identifies existing shadows within your organization and proactively prevents new ones as you integrate emerging technologies.
In this session, we will delve into:
- Detecting hidden shadow AI that impedes agility, innovation, and security
- Developing centralized, scalable risk frameworks and governance
- Identify key applications for leveraging AI services in the cloud
2:20 pm - 2:45 pm
Diamond Keynote
Skip the Malware: Creating a Cybersecurity Playlist of Trusted Hits and Blocked Threats
Ever wish you could hit 'skip' on malware as easily as you do on bad songs? In this session, we'll explore how building your cybersecurity strategy is like curating a playlist of only your favorites. Say goodbye to ransomware and rogue apps like they’re those 90s boy bands you never wanted to hear again. With a mix of humor and practical insights, learn how to block the bad stuff and keep your cybersecurity playlist on repeat with only the greatest hits. No more surprises—just smooth, secure operations. And spoiler alert - No Nickelback!!!
Leave this keynote, know how to:
- Curate Your Playlist: Block the Threats You Don’t Want - Proactively block rogue apps and malware to maintain a secure and focused operational environment
- Consistency Over Chaos: Keep Your Cybersecurity on Repeat - Ensure steady and reliable operations by allowing only trusted applications, fostering resilience
- Zero Nickelback, Zero Malware: Say Goodbye to Unwanted Threats - Use application whitelisting to block unauthorized apps, reducing risks and enhancing control
3:00 pm - 4:00 pm
Roundtables
Track 1: Charting the New Cybersecurity Landscape - CISOs Under Scrutiny
The SEC has traditionally been a distant concern for CISOs, but recent events have changed the landscape dramatically. The criminal conviction of Uber’s former CISO, the fallout from the SolarWinds incident, and last year’s new cyber disclosure regulations highlight the increased risks CISOs now face in safeguarding their organizations—and themselves.
Join our expert panel as they delve into the intensified regulatory focus on cybersecurity breaches and the evolving responsibilities of CISOs. Key discussion points will include:
- The government’s approach to cyber cases involving both companies and individuals
- Strategies for CISOs to manage their expanded role in the disclosure process
- Essential indemnification and insurance considerations
Track 2: Essential Questions for Today’s CISOs: What Every Security Leader Must Know
The role of the leader of enterprise security has dramatically evolved over the last 5 years. The Chief Information Security Officer and senior security leaders have been transformed from technical leaders to someone who must possess business intelligence as well as a deep understanding of risks and threats to the business – more than that, they must have a plan. To that end, we will discuss some of the most important questions CISOs and senior security leaders - and where and how to get those answers:
- What inherent threats does our infrastructure (and the way we do business) pose to the business?
- How quickly can we identify and respond to novel threats to mitigate and remediate disruptions?
- How are we leveraging Artificial Intelligence to help our security resources become more efficient and effective?
Track 3: Enhancing Threat Intelligence Operations - Strategies and Solutions
In the rapidly changing cyber threat landscape, it's crucial for leaders to effectively use threat intelligence to maintain strong security measures. Decision-makers are relying on actionable threat intelligence to strengthen cyber resilience and achieve important business goals. This roundtable session will offer insights into the strategic challenges and opportunities of transforming raw threat data into actionable intelligence and discuss leadership strategies to enhance threat intelligence operations.
Join us to explore:
- Transforming Data: Consolidate and contextualize threat data to eliminate redundancies and enhance actionable insights
- Real-time Access: Integrate real-time threat intelligence seamlessly into your security workflows
- Collaboration and Sharing: Leverage secure and efficient threat intelligence sharing to bolster collective defence efforts
4:10 pm - 4:40 pm
Interactive Panel
You Decide: Tackling Today's Security and Culture Challenges
Topic areas:
• Proving Value of Security & Innovative ways to get funding
• Burnout/Empathy & How do you really get things done
• How do you define what good looks like & measure initiatives
4:45 pm - 5:15 pm
Workshop
Strategic Leadership in DevSecOps for CISOs
DevSecOps, despite being around for some time, is still not fully adopted in many organizations, presenting a significant challenge for CISOs striving to implement it effectively. Join us for an exclusive workshop tailored for security leaders focusing on strategic leadership in DevSecOps. This session will delve into effective strategies for integrating security into the development lifecycle, fostering a culture of security, and leveraging AI to enhance security measures.
Join this workshop to discuss:
- Seamless Security Integration: Embed security practices into development without hindering innovation
- Cultivating Security Culture: Foster a security-first mindset across your organization
- AI-Enhanced Vulnerability Management: Use AI to swiftly identify and address vulnerabilities
5:20 pm - 5:50 pm
Case Study
Beyond Prevention: Real-World Lessons in Mitigating Cloud and SaaS Threats
As attackers increasingly target cloud and SaaS, traditional prevention falls short. Today’s focus must shift to mitigation—detecting and responding swiftly to limit damage. This session explores the essential components of an effective SaaS and Cloud TDIR strategy through real-world examples, highlighting visibility, threat hunting, and incident response. We’ll also cover how to effectively communicate and justify these security investments to stakeholders, demonstrating clear ROI and securing critical support.
Boosting Visibility: Practical ways to enhance visibility across cloud and SaaS to detect threats faster.
Proactive Threat Hunting: Real-world approaches to threat hunting and swift incident response.
Justifying Security Investments: Tips for communicating TDIR ROI to secure stakeholder support.
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
AI’s Impact on Evolving Threats
This presentation dives into AI's double-edged role in today’s digital landscape, showcasing the rapid rise of both innovation and risk. With generative AI tools more accessible than ever, cybercriminals now deploy convincing deepfakes, synthetic audio, and AI-generated phishing at an unprecedented scale. Learn how organizations can stay ahead, leveraging insights from real-world cases and new regulatory safeguards, like the FTC's compliance efforts and Google's AI watermarking, to outsmart emerging threats and fortify their defenses in the AI age.
Key takeaway include:
- AI’s Dual Impact: understating AI as a catalyst for both innovation and risk
- Real-World Insights: Learn from real-world cases to stay ahead of AI-driven threats
- Regulatory Safeguards: Explore new measures to combat emerging threats, such as the FTC’s compliance efforts
8:00 am - 8:40 am
Panel
Building Operational Resilience Through Continuity Planning
In today’s landscape, the question for organizations isn’t if cyberattacks will target them, but when and how. With sophisticated attack methods becoming more accessible and risks from cloud services, AI, and third-party software, complete risk elimination is unrealistic. Resiliency is the new business goal. Resilient companies endure disruptions and economic fluctuations while creating value. This session will explore operational resiliency, and how security leaders can maintain business operations amid inevitable cyber threats.
Key topics include:
- Business continuity management – understanding your minimum viable level
- Strategies for cultivating a strong security culture within your organization
- Combating key risk areas such as increasing supply chain resilience, reducing preventable loss and protecting reputational damage
8:40 am - 9:10 am
Keynote
AI and the Mind: Unveiling Tomorrow's Cyber Threat Landscape
As artificial intelligence reshapes industries, it simultaneously opens the door to sophisticated cyber threats that challenge traditional defenses. This session uncovers the evolving risks AI poses, especially its capacity to exploit cognitive biases and influence human behavior. Attendees will gain a unique perspective on how blending psychological insights with technological strategies can fortify cybersecurity approaches, addressing AI's dual role as both a tool and a target.
Key Takeaway Bullet Points:
- Discover Emerging AI-Driven Threats: Understand how AI can be used both defensively and offensively in the cyber landscape.
- Human Behavior Insights for Cyber Defense: Learn how AI can predict and counteract human vulnerabilities exploited by cybercriminals.
- Psychology Meets Technology in Cybersecurity: Explore actionable strategies to incorporate psychological insights into advanced cybersecurity protocols.
9:20 am - 10:20 am
Roundtables
Track 1: Charting the New Cybersecurity Landscape - CISOs Under Scrutiny
The SEC has traditionally been a distant concern for CISOs, but recent events have changed the landscape dramatically. The criminal conviction of Uber’s former CISO, the fallout from the SolarWinds incident, and last year’s new cyber disclosure regulations highlight the increased risks CISOs now face in safeguarding their organizations—and themselves.
Join our expert panel as they delve into the intensified regulatory focus on cybersecurity breaches and the evolving responsibilities of CISOs. Key discussion points will include:
- The government’s approach to cyber cases involving both companies and individuals
- Strategies for CISOs to manage their expanded role in the disclosure process
- Essential indemnification and insurance considerations
Track 2: Essential Questions for Today’s CISOs: What Every Security Leader Must Know
The role of the leader of enterprise security has dramatically evolved over the last 5 years. The Chief Information Security Officer and senior security leaders have been transformed from technical leaders to someone who must possess business intelligence as well as a deep understanding of risks and threats to the business – more than that, they must have a plan. To that end, we will discuss some of the most important questions CISOs and senior security leaders - and where and how to get those answers:
- What inherent threats does our infrastructure (and the way we do business) pose to the business?
- How quickly can we identify and respond to novel threats to mitigate and remediate disruptions?
- How are we leveraging Artificial Intelligence to help our security resources become more efficient and effective?
Track 3: Enhancing Threat Intelligence Operations - Strategies and Solutions
In the rapidly changing cyber threat landscape, it's crucial for leaders to effectively use threat intelligence to maintain strong security measures. Decision-makers are relying on actionable threat intelligence to strengthen cyber resilience and achieve important business goals. This roundtable session will offer insights into the strategic challenges and opportunities of transforming raw threat data into actionable intelligence and discuss leadership strategies to enhance threat intelligence operations.
Join us to explore:
- Transforming Data: Consolidate and contextualize threat data to eliminate redundancies and enhance actionable insights
- Real-time Access: Integrate real-time threat intelligence seamlessly into your security workflows
- Collaboration and Sharing: Leverage secure and efficient threat intelligence sharing to bolster collective defence efforts
10:30 am - 11:00 am
Future Focus Speakers
Overcoming the Pressures and Building a Supportive Leadership Community
The role of a CISO and senior security leaders embodies immense pressure and responsibility, often feeling like a single point of failure. It requires strength and resilience to navigate these challenges. Despite these demands, CISOs and their teams rise to the occasion, knowing their leadership is crucial to safeguarding their organisation’s future. This session will explore how security leaders can manage these challenges by fostering a culture of shared responsibility and personal development. Join us for a candid discussion where senior security leaders can share their experiences and strategies for managing the stresses of their roles. This session aims to create a supportive space for sharing personal journeys and empowering each other in leadership.
12:35 pm - 1:00 pm
Closing Keynote
AI’s Next Frontier: Building Resilience in Cybersecurity
As AI transforms cybersecurity, it brings unprecedented opportunities to build resilient defenses while introducing complex challenges that test traditional frameworks. This closing session with Shri Peterzeil, Deputy Risk Officer and Business Information Security Officer at Kaiser Permanente, will outline how leaders can harness AI to foster a more resilient cybersecurity future. Attendees will explore the importance of ethical AI practices, the development of an AI-centric culture, and the power of strategic partnerships to bolster security in a rapidly evolving landscape.
Key Takeaway Bullet Points:
- Balancing Innovation with Resilience: Discover strategies to integrate AI-driven innovation while maintaining a robust cybersecurity framework.
- Ethical AI for Cybersecurity: Gain insights into building AI solutions that respect data privacy and minimize bias.
- Creating an AI-Centric Culture: Learn how to prepare your team to fully leverage AI for enhanced cybersecurity efforts.
- Cross-Industry Collaboration: Explore how partnerships across sectors can help secure a future where AI acts as a force for resilience, not risk.
2:15 pm - 2:30 pm
Beyond the Challenges
Rancho Bernardo Inn - San Diego, CA
Tucked away among the rolling hills of San Diego’s North County and bounded by a championship golf course and stately private residences, this 265-acre resort is a respite from the mundane.
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.