The CIO was first introduced to lead the Data Processing and Information Systems departments of the past. Today, the job is a much different role. The skillset and responsibilities are worlds apart from what they were a decade or two ago. And the role continues to adapt to the changing face of the modern business enterprise.
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CIO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CIO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
November 10 2022
Cybersecurity Executive Order
Consider it Done with Zero Trust Segmentation
360 View on Cybersecurity
Managing Cloud Security Risk without Slowing Application Delivery
Your Digital Transformation is Being Sabotaged
Digital transformation promises business growth by providing value to customers by leveraging emerging technologies and supporting skills for new business models. At its core, data-driven decisions are the lifeblood of digital transformation. When data is poisoned, stolen, and misused for malicious intent, progress slows resulting in poor customer experience and satisfaction. In this session, we will explore how sophisticated bot attacks are contaminating top digital transformation trends related to automation, data analytics, and application architectures that should be part of every security strategy to solve in 2022.
Mitigating Digital Supply Chain Threat's We've Ignored for Too Long
The Impact of Emerging Technologies: Shifting Left to Secure Your Software Supply Chain
As organizations shift to cloud, they are increasingly building and using cloud-native software running in containers. However, this shift creates a need for new processes and approaches to ensure this software is secure. SolarWinds and other recent breaches have highlighted the need to protect the software supply chain. Organizations are now working diligently to better understand their software supply chains and protect software as it’s being built, before it ever goes into production. The software bill of materials (SBOM) is becoming a foundation for transparency, while new technologies are emerging to ensure the security of the software supply chain. This panel will delve into the critical challenges organizations face and the emerging technologies and approaches they are using to advance the security of the software they build and use.
New Approaches to Prevent Advanced Email Threats
Email has long been the primary communication channel for business, and amidst the world’s massive shift to remote work, it also maintains its position as one of the most attractive attack vectors for threat actors. One of the biggest takeaways of several recent attacks is that your security is only as good as your partners' and vendors’ email security.
Abnormal Security uses an innovative behavioral data science-based approach to protect enterprises from sophisticated business email compromise attacks, account takeovers and supply chain compromises.
During this keynote, Abnormal Security CISO Mike Britton, will share real-world examples of attacks and how a new approach can detect and stop them. You’ll also hear from a large California-based organization about their experience with Abnormal, including what they’ve done to protect themselves against the most dangerous attacks.
Where We’re Going, We Don’t Need Rules: Anomaly-Based Threat Detection
Most security tools battle cyber threats using the tried-and-true method of rules-based detection. But this industry standard has its limitations. What if, instead of endlessly writing (and maintaining) rules to identify bad actors and irregularities, we could base security on the normal, healthy operations of an environment? This session will explore how a new approach to anomaly-based threat detection is driving fundamentally better security outcomes while streamlining investigations
Why Ransomware Continues To Be So Elusive and Pervasive
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.