Defending the digital realm
Navigate the wave of change as generative AI booms, SEC introduces new rules, and advanced threats surge. CISOs lead through uncertainty, enhancing efficiency, productivity, and growth. Yet, technology alone won't suffice – it can expose your enterprise. Empower secure investments, elevate decisions, and fortify your business with our expert guidance.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Agenda
1:10 pm - 1:35 pm
Keynote
Leading Through Innovation: Mastering Emerging Technologies
In today’s rapidly evolving technological landscape, effective leadership is crucial for organizations to successfully navigate the complexities of emerging technologies. This presentation explores the key principles of leadership that drive innovation and adaptability in a tech-driven environment. It emphasizes the importance of visionary thinking, agility, collaboration, and ethical considerations in harnessing the potential of new technologies. Join us to learn how to foster continuous learning, manage change, and invest in talent development. We’ll also cover practical ways to embrace technological advancements while prioritizing customer-centric solutions.
Join this keynote address to explore:
- Practical approaches for embracing tech advancements and prioritizing customer-centric solutions
- Fostering a culture of continuous learning, managing change, and investing in talent development
- Leveraging data analytics and AI for strategic planning and informed decision-making
1:40 pm - 2:20 pm
Panel
From Shadow IT to Shadow AI - Tackling Emerging Risks
Emerging technologies introduce fresh risks and balancing these while fostering seamless innovation is a constant challenge. The advent of Shadow AI adds another dimension of risk for security leaders, compounding the existing issues of concealed technical debt and shadow IT. The changing digital environment requires a fresh approach to risk management and governance. One that identifies existing shadows within your organization and proactively prevents new ones as you integrate emerging technologies.
In this session, we will delve into:
- Detecting hidden shadow AI that impedes agility, innovation, and security
- Developing centralized, scalable risk frameworks and governance
- Identify key applications for leveraging AI services in the cloud
2:20 pm - 2:45 pm
Keynote
3:00 pm - 4:00 pm
Roundtables
Track 1: Charting the New Cybersecurity Landscape - CISOs Under Scrutiny
The SEC has traditionally been a distant concern for CISOs, but recent events have changed the landscape dramatically. The criminal conviction of Uber’s former CISO, the fallout from the SolarWinds incident, and last year’s new cyber disclosure regulations highlight the increased risks CISOs now face in safeguarding their organizations—and themselves.
Join our expert panel as they delve into the intensified regulatory focus on cybersecurity breaches and the evolving responsibilities of CISOs. Key discussion points will include:
- The government’s approach to cyber cases involving both companies and individuals
- Strategies for CISOs to manage their expanded role in the disclosure process
- Essential indemnification and insurance considerations
Track 2: Ransomware: Are You Asking the Right Questions?
Ransomware continues to pose a serious threat to organizations of all sizes in 2024, with payouts surpassing $1 billion last year, according to research by ExtraHop. Cybercriminals are evolving their tactics, and while only 22% of organizations view ransomware as the biggest risk, incidents are increasing. This roundtable will discuss the evolution of ransomware, focusing on new trends in advanced encryption and evasion tactics. We’ll also explore proactive measures to stay ahead and highlight the costs of inaction. Are you ready to address the evolving threat of ransomware?
Join this roundtable to discuss:
- Evolving Tactics: Increased use of double and triple extortion and the rise of Ransomware-as-a-Service (RaaS)
- Proactive Measures: Implement enhanced incident response plans and invest in advanced security tools to reduce ransomware risk
- Cost of Inaction: Significant financial and reputational damage underscores the need for strong cybersecurity strategies
Track 3: Enhancing Threat Intelligence Operations - Strategies and Solutions
In the rapidly changing cyber threat landscape, it's crucial for leaders to effectively use threat intelligence to maintain strong security measures. Decision-makers are relying on actionable threat intelligence to strengthen cyber resilience and achieve important business goals. This roundtable session will offer insights into the strategic challenges and opportunities of transforming raw threat data into actionable intelligence and discuss leadership strategies to enhance threat intelligence operations.
Join us to explore:
- Transforming Data: Consolidate and contextualize threat data to eliminate redundancies and enhance actionable insights
- Real-time Access: Integrate real-time threat intelligence seamlessly into your security workflows
- Collaboration and Sharing: Leverage secure and efficient threat intelligence sharing to bolster collective defence efforts
4:10 pm - 4:40 pm
Learning Lab
Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify
Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations, and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board. Three in four CISOs in the U.S. report feeling burned out, putting them at risk of quitting. Are CISO’s and their teams getting the support they need?
4:45 pm - 5:15 pm
Workshop
Strategic Leadership in DevSecOps for CISOs
DevSecOps, despite being around for some time, is still not fully adopted in many organizations, presenting a significant challenge for CISOs striving to implement it effectively. Join us for an exclusive workshop tailored for security leaders focusing on strategic leadership in DevSecOps. This session will delve into effective strategies for integrating security into the development lifecycle, fostering a culture of security, and leveraging AI to enhance security measures.
Join this workshop to discuss:
- Seamless Security Integration: Embed security practices into development without hindering innovation
- Cultivating Security Culture: Foster a security-first mindset across your organization
- AI-Enhanced Vulnerability Management: Use AI to swiftly identify and address vulnerabilities
5:20 pm - 5:50 pm
Collaboration Corner
Quantifying Risk for Budget Approval: Strategies for CISOs
In today’s evolving threat landscape, CISOs often face a daunting challenge: quantifying cyber risks in a way that secures buy-in and budget approvals from CIOs and CTOs. This workshop explores the critical metrics and assessment strategies that make risk relatable to business outcomes, aiding CISOs in advocating for essential technology investments. Attendees will discuss best practices in translating risk assessments into compelling, data-driven cases, bridging the gap between security needs and executive priorities to secure crucial funding for new tools and initiatives.
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
AI’s Impact on Evolving Threats
8:00 am - 8:40 am
Panel
Building Operational Resilience Through Continuity Planning
In today’s landscape, the question for organizations isn’t if cyberattacks will target them, but when and how. With sophisticated attack methods becoming more accessible and risks from cloud services, AI, and third-party software, complete risk elimination is unrealistic. Resiliency is the new business goal. Resilient companies endure disruptions and economic fluctuations while creating value. This session will explore operational resiliency, and how security leaders can maintain business operations amid inevitable cyber threats.
Key topics include:
- Business continuity management – understanding your minimum viable level
- Strategies for cultivating a strong security culture within your organization
- Combating key risk areas such as increasing supply chain resilience, reducing preventable loss and protecting reputational damage
8:40 am - 9:10 am
Keynote
AI and the Mind: Unveiling Tomorrow's Cyber Threat Landscape
As artificial intelligence reshapes industries, it simultaneously opens the door to sophisticated cyber threats that challenge traditional defenses. This session uncovers the evolving risks AI poses, especially its capacity to exploit cognitive biases and influence human behavior. Attendees will gain a unique perspective on how blending psychological insights with technological strategies can fortify cybersecurity approaches, addressing AI's dual role as both a tool and a target.
Key Takeaway Bullet Points:
- Discover Emerging AI-Driven Threats: Understand how AI can be used both defensively and offensively in the cyber landscape.
- Human Behavior Insights for Cyber Defense: Learn how AI can predict and counteract human vulnerabilities exploited by cybercriminals.
- Psychology Meets Technology in Cybersecurity: Explore actionable strategies to incorporate psychological insights into advanced cybersecurity protocols.
9:20 am - 10:20 am
Roundtables
Track 1: Charting the New Cybersecurity Landscape - CISOs Under Scrutiny
The SEC has traditionally been a distant concern for CISOs, but recent events have changed the landscape dramatically. The criminal conviction of Uber’s former CISO, the fallout from the SolarWinds incident, and last year’s new cyber disclosure regulations highlight the increased risks CISOs now face in safeguarding their organizations—and themselves.
Join our expert panel as they delve into the intensified regulatory focus on cybersecurity breaches and the evolving responsibilities of CISOs. Key discussion points will include:
- The government’s approach to cyber cases involving both companies and individuals
- Strategies for CISOs to manage their expanded role in the disclosure process
- Essential indemnification and insurance considerations
Track 2: Ransomware: Are You Asking the Right Questions?
Ransomware continues to pose a serious threat to organizations of all sizes in 2024, with payouts surpassing $1 billion last year, according to research by ExtraHop. Cybercriminals are evolving their tactics, and while only 22% of organizations view ransomware as the biggest risk, incidents are increasing. This roundtable will discuss the evolution of ransomware, focusing on new trends in advanced encryption and evasion tactics. We’ll also explore proactive measures to stay ahead and highlight the costs of inaction. Are you ready to address the evolving threat of ransomware?
Join this roundtable to discuss:
- Evolving Tactics: Increased use of double and triple extortion and the rise of Ransomware-as-a-Service (RaaS)
- Proactive Measures: Implement enhanced incident response plans and invest in advanced security tools to reduce ransomware risk
- Cost of Inaction: Significant financial and reputational damage underscores the need for strong cybersecurity strategies
Track 3: Enhancing Threat Intelligence Operations - Strategies and Solutions
In the rapidly changing cyber threat landscape, it's crucial for leaders to effectively use threat intelligence to maintain strong security measures. Decision-makers are relying on actionable threat intelligence to strengthen cyber resilience and achieve important business goals. This roundtable session will offer insights into the strategic challenges and opportunities of transforming raw threat data into actionable intelligence and discuss leadership strategies to enhance threat intelligence operations.
Join us to explore:
- Transforming Data: Consolidate and contextualize threat data to eliminate redundancies and enhance actionable insights
- Real-time Access: Integrate real-time threat intelligence seamlessly into your security workflows
- Collaboration and Sharing: Leverage secure and efficient threat intelligence sharing to bolster collective defence efforts
10:30 am - 11:00 am
Future Focus Speakers
Overcoming the Pressures and Building a Supportive Leadership Community
The role of a CISO and senior security leaders embodies immense pressure and responsibility, often feeling like a single point of failure. It requires strength and resilience to navigate these challenges. Despite these demands, CISOs and their teams rise to the occasion, knowing their leadership is crucial to safeguarding their organisation’s future. This session will explore how security leaders can manage these challenges by fostering a culture of shared responsibility and personal development. Join us for a candid discussion where senior security leaders can share their experiences and strategies for managing the stresses of their roles. This session aims to create a supportive space for sharing personal journeys and empowering each other in leadership.
12:35 pm - 1:00 pm
Closing Keynote
2:15 pm - 2:30 pm
Beyond the Challenges
Rancho Bernardo Inn - San Diego, CA
Tucked away among the rolling hills of San Diego’s North County and bounded by a championship golf course and stately private residences, this 265-acre resort is a respite from the mundane.
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.