Cyber resilience strategies for a complex world
Navigate the wave of change as generative AI booms, SEC introduces new rules, and advanced threats surge. CISOs lead through uncertainty, enhancing efficiency, productivity, and growth.
Yet, technology alone won't suffice – it can expose your enterprise. Empower secure investments, elevate decisions, and fortify your business with our expert guidance.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Agenda
1:10 pm - 1:30 pm
Keynote
Leadership – The cornerstone of cybersecurity success
Every challenge and solution in cybersecurity ultimately stems from one core element: leadership. Whether a breach occurs or a defense holds strong, leadership is at the heart of the outcome. As cybersecurity threats evolve, so too must our leadership approaches, particularly in an industry where four distinct generations of workers coexist.
Each generation brings unique strengths, perspectives, and challenges. Leading a diverse, multigenerational team requires more than just understanding technology—it requires understanding people. The strategies that resonate with seasoned professionals likely differ from those that inspire the youngest members of your team.
In this keynote session, we'll explore why leadership is the foundation of every successful cybersecurity initiative. We'll also dive into the nuances of leading across generations, offering proven tactics to effectively manage, motivate, and unify your team. Discover how to harness the potential of every team member, regardless of their age or background, to build a resilient and cohesive cybersecurity strategy.
1:35 pm - 2:15 pm
Panel
Modern cyber threats: Building risk-resilient enterprises
Join leading CISOs and cybersecurity experts as they discuss strategic frameworks and actionable insights for enhancing organizational resilience. Attendees will gain a deeper understanding of how to anticipate and respond to emerging threats, foster a culture of security awareness, and implement robust risk management practices that ensure business continuity and protect critical infrastructure. This session is essential for senior executives committed to fortifying their organization's defenses in an increasingly complex threat landscape.
2:15 pm - 2:40 pm
Keynote
Comprehensive pentesting: Overcoming the talent gap and enabling business innovation
Most security testing today is indistinguishable from the methods we used over 15 years ago. The constant delivery of new technologies in applications and infrastructure have made it impossible for any individual pen tester to remain fluent in every method and architecture. The rate of change has also increased dramatically as agile methodologies are leveraged in applications and beyond. These changes combined with an ever more pervasive cyber threat have created a talent gap that has many defensive teams outmatched by attackers who use incentives, communities and open markets to systematize and accelerate network breach and exploitation.
But what if a comprehensive approach to security testing could enable organizations to aggressively innovate and take full advantage of business opportunities by overcoming the current cyber talent gap and delivering strategic value to the business?
New comprehensive, adversarial pen testing delivered as a service (PtaaS) approaches allow business units to innovate at speed while minimizing and managing risk. A comprehensive approach to security testing takes the best of various approaches like scanning, pentest, bug bounty, and VDP to deliver the attackers perspective and vulnerability remediation management to reduce risk for mission critical, Internet facing applications and infrastructure.
Join us for a discussion on how comprehensive security testing delivers strategic value to security teams and the organization.
3:00 pm - 4:00 pm
Roundtables
Track 1: Materiality - Answering the toughest questions at the worst possible time
Corporate Security Officers (CISOs and their equivalent) are now painfully aware that they must have answers to the question of materiality. These are difficult questions to answer with certainty in calm times, but during a potential incident this can feel impossible. This roundtable will focus on the burden of judging materiality from the CISO's perspective - and the questions and technology capabilities that can bring order into a chaotic situation.
Track 2: Safeguarding Data in the AI era
In the age of AI, data privacy and security have become more critical than ever. The vast amounts of data collected and processed by AI systems amplify the risk of data breaches, which can lead to significant trust issues and legal ramifications due to unauthorized access to sensitive information.
AI introduces additional complexities, including the risks of bias, discrimination, and hallucination. As privacy regulations become increasingly stringent, organizations must ensure their data governance practices not only comply with these regulations but also adapt to the rapid advancements in AI technology.
This roundtable will delve into three pivotal discussion points:
- Emerging Security and Privacy Threats: What new threats to data security and privacy are emerging in the age of AI, and how can we proactively address them to protect sensitive information?
- Balancing Innovation and Regulation: How can organizations strike a balance between fostering AI innovation and adhering to stringent privacy regulations? What best practices can help ensure security without stifling technological advancements?
- Ethical AI and Bias Mitigation: What strategies can be implemented to mitigate the risks of bias and discrimination in AI systems, ensuring ethical data use and enhancing trust among stakeholders?
Join this round table to explore these crucial issues and develop actionable insights to enhance data security in the dynamic landscape of AI.
Track 3: Minutes to meltdown
Minutes to Meltdown is an interactive workshop allowing participants to experience the realities of a ransomware attack first-hand. The event blends role-play exercises with real-world cybersecurity challenges, giving attendees the chance to make their own decisions, face the consequences, and grasp the broader business implications—all in a controlled setting. Each participant is assigned a role on the Leadership Team of a pseudo company as they attempt to mitigate risk and control the fallout of the attack. Participants will leave the workshop knowing that ransomware attacks are inevitable while asking themselves if their organization's security plan is up to the task.
Please note: this session is split over 2 days, please ensure that you register for both sessions.
4:10 pm - 4:40 pm
Learning Lab
Aligning Cybersecurity Strategies with National and International Obligations
- Developing cybersecurity strategies that align with national and international standards.
- Balancing operational needs with cybersecurity requirements.
- Case studies on aligning NATO's cyber defense strategies with member nations.
- Interactive Elements: Group discussions on policy challenges, scenario-based exercises to draft strategies,
- and a collaborative analysis of real-world case studies.
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
8:00 am - 8:40 am
Panel
The importance of partnerships in the fight against cybercrime
Collaboration between public and private sectors is not new but in the evolving world of cybercrime and data manipulation, law enforcement can—and should—play a critical role in preventing criminal activity. This partnership is more imperative today. And it needs to be supported not only by business executives, but also driven by the C-suite and the board.
Public and private sector organizations each must leverage all available resources, and partnerships need to be a strategic part of commitment. Of course, private organizations continue to ensure the development and advancement of their capabilities by maximizing use of next-generation technologies and techniques. At the same time, it’s vital to adopt a “culture of collaboration” both inside organizations and with third parties.
8:40 am - 9:10 am
Keynote
Offense Driven Defense: The Future of Cybersecurity
After observing nearly 60k autonomous pentests run by security pros just like you, the security challenges organizations face today are all too clear. What’s it going to take to resolve these challenges once and for all?
Join this session to learn how attackers:
• Use OSINT and password spraying to takeover systems without ever targeting CVEs.
• Land and expand with legitimate credentials, then poison assets to take over domains.
• Find cloud credentials then compromise cloud services.
9:20 am - 10:20 pm
Roundtables
Track 1: Materiality - Answering the toughest questions at the worst possible time
Corporate Security Officers (CISOs and their equivalent) are now painfully aware that they must have answers to the question of materiality. These are difficult questions to answer with certainty in calm times, but during a potential incident this can feel impossible. This roundtable will focus on the burden of judging materiality from the CISO's perspective - and the questions and technology capabilities that can bring order into a chaotic situation.
Track 2: Safeguarding Data in the AI era
In the age of AI, data privacy and security have become more critical than ever. The vast amounts of data collected and processed by AI systems amplify the risk of data breaches, which can lead to significant trust issues and legal ramifications due to unauthorized access to sensitive information.
AI introduces additional complexities, including the risks of bias, discrimination, and hallucination. As privacy regulations become increasingly stringent, organizations must ensure their data governance practices not only comply with these regulations but also adapt to the rapid advancements in AI technology.
This roundtable will delve into three pivotal discussion points:
- Emerging Security and Privacy Threats: What new threats to data security and privacy are emerging in the age of AI, and how can we proactively address them to protect sensitive information?
- Balancing Innovation and Regulation: How can organizations strike a balance between fostering AI innovation and adhering to stringent privacy regulations? What best practices can help ensure security without stifling technological advancements?
- Ethical AI and Bias Mitigation: What strategies can be implemented to mitigate the risks of bias and discrimination in AI systems, ensuring ethical data use and enhancing trust among stakeholders?
Join this round table to explore these crucial issues and develop actionable insights to enhance data security in the dynamic landscape of AI.
Track 3: Minutes to meltdown
Minutes to Meltdown is an interactive workshop allowing participants to experience the realities of a ransomware attack first-hand. The event blends role-play exercises with real-world cybersecurity challenges, giving attendees the chance to make their own decisions, face the consequences, and grasp the broader business implications—all in a controlled setting. Each participant is assigned a role on the Leadership Team of a pseudo company as they attempt to mitigate risk and control the fallout of the attack. Participants will leave the workshop knowing that ransomware attacks are inevitable while asking themselves if their organization's security plan is up to the task.
Please note: this session is split over 2 days, please ensure that you register for both sessions.
10:30 am - 11:00 am
Future Focus Speakers
Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify
Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations, and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board. Three in four CISOs in the U.S. report feeling burned out, putting them at risk of quitting. Are CISO’s and their teams getting the support they need?
11:05 am - 11:35 am
Workshop
Collaborative security: Integrating development, security and operational teams to reduce cyber risk
In this session, George Garza from Manhattan Associates, will breakdown how he created a strong collaboration between his development, security and operational teams to reduce risk by enhancing code security supporting their solutions and services.
The DevSecOps process allows for seamless identification and action plans for software vulnerabilities regardless of owner or source. The process employs integrated tools and practices that prioritize and minimize the time spent on fixing security issues.
Join George as he highlights the key requirements, milestones and gains along the journey. He will discuss strategies for managing risk across the software portfolio, building developer security competencies, reducing capacity demand, and securing every phase of the solution set.
12:45 pm - 1:10 pm
Closing Keynote
Midnight Worries: Navigating Headline Fears and Liability with Confidence
What keeps CISOs and cyber leaders awake at night? Is it the dread of seeing their organization in the headlines due to a breach, or the fear of finding their own name amidst a public scandal? In an era where cybersecurity incidents can have profound legal and reputational repercussions, the stakes have never been higher. However, with the right approaches, we can navigate these challenges and steer our profession towards a brighter future, delivering great security for our organizations.
Join Joe Sullivan, a seasoned cybersecurity expert, as he delves into the complexities of leadership and liability in today's digital landscape. This interactive session will feature real-world scenarios and audience participation, providing you with practical strategies to manage risks and protect your organization—and yourself—from becoming the next headline. Together, we will explore how to turn midnight worries into opportunities for resilience and growth.
1:10 pm - 1:30 pm
Beyond the Challenges
Ritz Carlton Naples, Tiburon, FL
Nestled among native wetlands and migratory bird preserves The Ritz-Carlton Naples, Tiburón offers a sanctuary with serene spaces.
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.