Essential ingredients for ISMS implementation success
|Target Audience||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
|CPE Credits||Earn 4.25 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.|
|Location||Radisson Blu Hotel
More information at https://www.radissonblu.com/de/hotel-zurichairport/standort
|Date of Event||7th of November 2017|
|Language||English, if non-German speaking people will attend, otherwise German|
|Schedule||see agenda below|
|Participation Costs||Fr. 55.— per participants
Organization, presentations, beverages and aperitif included
|2:00 – 2:30||Registration & Coffee|
|2:30 – 2:30||Welcome & Introduction by the moderator|
|2:30 – 3:00||David Doret, GRC Consulting Practice Lead at Kudelski Security
ISMS2: How to manage a complex ISMS program with a GRC platform
Experience shows that the complexity of such a program is more than the sum of its ISMSes, hence the concept of ISMS2. This level of complexity leads to inefficiencies (at best) and ineffectiveness (at worst). Through hard-won field experience and lessons learned, we gained insights into what works and what doesn’t.
Come and listen to how a GRC platform may help you address the scaling challenge of ISMS2.
|3:00 – 3:30||RSA
(Details will follow)
|3:30 – 4:00||Pascal Reiniger, Chief Information Security Officer at Canton of Basel-Stadt
A practical approach to implement a risk based ISMS
This presentation is showing a possible approach to align risk management with the different tools and processes as well as how to implement such an ISMS.
|4:00 – 4:45||Break|
|4:45 – 5:30||HR Ing Martin EBNER, BSc MSc, Head of Cyber Security Operations in the (new) Service Support & Cyber Defence Command of the Austrian Armed Forces
Risk Management within 11 Layers
After having done the basic security homework, the next questions must be answered: are there reasons for an attack and who could be the actors?
Even when we implement an aligned security standard, we have to deal with a situation where the attackers easily are informed about our problems and failures. They are willing to exploit them, insofar as they have a motivation to do that.
|5:30 – 6:00||Prof. Dr. Hannes P. Lubich, University of Applied Sciences and Arts Northwestern Switzerland
Interoperability between ISMS and IT Service Management – Lessons Learned and Potential Stumbling Blocks
This presentation will discuss some of these difficulties, as well as potential solution ap-proaches.
|6:00 – 6:30||Panel Discussion moderated|
|6:30 – open end||Apéro Riche & Networking
The speakers will be onsite for Q&A
The Sponsors of this event are:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.