Special Interest Group Cyber Security Strategy – but best practice!
This is an interactive workshop – topic for next time:
Klick for the .ics file to save the date
In cooperation with Cyber Management Alliance’s CEO & Founder Amar Singh, Chair of ISACA’s UK Security Advisory Group, Head of UK & Europe CISO Council. More information at https://www.cm-alliance.com/about-us/
Cyber Myths, Legends and Folktales – Demystifying the Fear Uncertainty and Doubt around Cyberspace and its Security
About time we sat down and laid down solid foundations in cyber security and agree, as a collective of cyber professionals, on what works and what does not work in Cybersecurity and how we can protect, detect and most importantly recover from cyber attacks.
No, it’s not going to be easy, but we need to begin somewhere and getting the basics right must surely be the most important undertaking.
With this Special Interest Group, we are bringing together cyber professionals to share their experience and insights to collectively create and define practical and pragmatic guidance and shared knowledge. Together, we will begin by defining the key ingredients of a cyber security strategy and strive to create usable templates for all the group members.
The group members will also decide and determine future topics for ongoing CMA & SIGS roundtable events
You are invited to come, contribute and share your experience in this Special Interest Group. But be aware; it’s not only to consume; we want an interactive two way communication and need as well your active participation to make this platform successful for all!
We will make sure that there’s always a technical advisor on site who also can answer your questions from an architectural perspective and can help to design the right solutions.
||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects
||Vendors, Security Consultants and peoples from the Sales/Marketing part are not authorized as participants.|
||This platform is held under Chatham House Rules
||4.5 CPE (Continuing Professional Education) for attending this SIGS S
Special Interest Group. Please request a confirmation
||Landgasthof zu den Drei Sternen
There are a lot of free parking lots available
Shuttle buses from and to the railways stations around will be organized
|Date of Event
||14th of September2017
Further planned date: 12th of December 2017
Organization, presentations, beverages and aperitif included
|1:00 – 1:30
||Registration & Coffee
|1:30 – 2:00
||Amar Singh, Cyber Management Alliance’s CEO & Founder
Fight the Threat, Manage the Risk
“Take a risk based approach” has become a throw away phrase that almost every one uses when asked about a solution to the cyber threats facing organisations todayThe language of risk management, though straightforward, is widely misunderstood and problem is that when it comes to managing the risk, there appears to be nothing but confusion and chaos. Cutting through the clutter, Amar discusses some of the steps organisations can take to lay a strong foundation in Risk Management.
|2:00 – 2:30
||Martin Braendli, Senior Director, IT Risk & Compliance at GE Capital
Building an effective Application Risk Management Framework
“You should have an understanding of your application related risks.” IT risk assessment is the process of assessing risks and controls, tracking risks, facilitating decision making and reporting risk. Considerations for building a framework and run regular risk assessments for applications including key learnings will be shared.
How to add business value is key for a successful framework rather than focusing on a compliance exercise. Martin will talk about his experience from owning a global framework for a large financial institution and how it has matured over time.
|2:30 – 3:00
||Alain Thibaud, EMEA & APAC Director Systems Engineering at Forcepoint
Context as Enabler to effective Risk Management
In trying to protect an organization’s information, many tools exist to provide data on threats, activities and user behaviors. All this data can be helpful, but it can also be overwhelming, and finding an indicator of compromise can seem like finding a needle in a haystack. The usefulness of data from firewalls, directories, security appliances, etc. can often be hindered by a lack of structure and lack of context. I will discuss how the context of the data can be a strong enabler to effective risk management.
|3:00 – 3:45
|3:45 – 6:00
||Moderated Round Table Discussion/Workshop
Defining the key ingredients to the topic and strive to create usable templates for all the group members. You will get as well a result paper after the workshop.
|6:00 – open end
||Apéro Riche & Networking
The speakers will be onsite for Q&A
The sponsor of this event is:
Cancellations of registration are free of charge until 30 days before. Cancellations received beyond this point will incur 100% of the admission fee. You will get an invoice for the respective amount. In any case, however, a delegate may be sent at no additional costs.
So don’t wait and register here
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.