VIRTUAL

DACH CISO Virtual Executive Summit

17 November 2020 | 09:00 - 15:30 CET

17 November 2020 | 09:00 - 15:30 CET

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the DACH CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organisation

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Governing Body Co-Chairs

Martin Bally

Fiat Chrysler Automobiles
CISO

Sascha Brock

Deutsche Post
VP Chief Information Security Officer

Peter Dornheim

OMV Group
CISO

John Petersen

Nestlé
CISO

Judith Wunschik

Siemens Energy
Chief Cyber Security Officer

Agenda


17 November 2020

09:00 - 10:00  CET Virtual Summit Keynote

Defending Your Data in a Remote Working World

Andrew Rose headshot

Andrew Rose

Resident CISO, EMEA

Proofpoint

Adenike Cosgrove headshot

Adenike Cosgrove

Cybersecurity Strategist

Proofpoint

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organisation. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

In this session Adenike Cosgrove, Cybersecurity Strategist, and Andrew Rose, Resident CISO, EMEA, for Proofpoint discuss:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data




10:00 - 11:00  CET Virtual Summit Boardroom

How will IT security adapt to the changing cloud environment?

Paul D'Cruz headshot

Paul D'Cruz

Director Cyber Security EMEAR

Cisco Systems

Richard Archdeacon headshot

Richard Archdeacon

Advisory CISO

Cisco Systems

Flavio Aggio headshot

Flavio Aggio

CISO & Head of Enterprise Architecture

World Health Organization

Enterprises have had to deal with more changes in 2020 than ever before. As organisations turn to the cloud in order to reduce complexity and deliver greater flexibility, they must also adapt to, and enact more, through consistent information security enforcement to meet these changes head on.  

In this interactive roundtable discussion, we’ll discuss;  

  • How will cloud adoption effect business challenges and how must organisations adapt their roadmap and vision as we head into 2021 and beyond? 
  • How organisations are adapting to employees and customers working from home and the added responsibility this has on the CISO and the security team?
  • What KPIs should be considered to measure effective cloud security through this ever-changing environment, and what does good actually look like?



10:00 - 11:00  CET Virtual Summit Boardroom

Rethinking Security Talent – recruiting and retaining staff in the new era

Ric Longenecker headshot

Ric Longenecker

CISO

Open Systems

Hans de Jong headshot

Hans de Jong

CISO

International Atomic Energy Agency

CISOs globally are struggling with the primacy of technology outpacing the availability and skill development of their talent. What does it take to create opportunities for the next generation to thrive in an information security career?

Join this roundtable to discuss:

  • Building diverse teams to increase innovation
  • Upskilling and reallocating talent to meet changing demands
  • Looking for talent in non-traditional spaces


10:00 - 11:00  CET Virtual Summit Boardroom

The New Language of Risk

Ross McCulloch headshot

Ross McCulloch

Head of Customer Success

BitSight

Andreas Gaetje headshot

Andreas Gaetje

CISO

Körber

From front-line employees to top-level directors, CISOs have a big part to play in communicating cyber risk in a way that compels others to act. The CISO must develop a comprehensive strategy for dealing with cyber security and associated risks. But what metrics, measures, methods and messages resonate in today’s risk environment?

Join your peers in this virtual boardroom to discuss:

  • How organizations are assessing cybersecurity and risk
  • Metrics that matter
  • Tips for improving cybersecurity programs using these metrics, and raising executive awareness


10:00 - 11:00  CET Virtual Summit Boardroom

Managing Third-Party Risk with First-Rate Partnership

Jeremy Snyder headshot

Jeremy Snyder

VP Business Development and Corporate Development

DivvyCloud

Andreas Melzer headshot

Andreas Melzer

Head of IT Security EMEA

Olympus Europe

Benedikt Heintel headshot

Benedikt Heintel

CISO

Viega

In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.

Join this session to learn:

  • How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
  • How to get off on the right foot, and to maintain strong partnerships with third parties
  • Technologies that help manage third-party risk

11:00 - 11:45  CET Virtual Summit Keynote

The human factor in security - or the gap between knowledge and behavior!

Detlev Weise headshot

Detlev Weise

Beirat / Senior Adviser

KnowBe4

With around 9 out of 10 successful cyber attacks run via the "human interface“, classical employee training alone is by no means sufficient to educate users to become an effective human firewall.

Why? Because knowledge and behavior are two different things!

Join this virtual keynote to understand;

  • The difference between knowledge and behavior and how to model behavior
  • Why people can become victims of social engineering attacks again and again despite training
  • The basic factors for the successful construction of a Human Firewall    


11:45 - 12:15  CET Break

Midday Break

Midday Break

12:15 - 13:00  CET Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Neil Thacker headshot

Neil Thacker

CISO EMEA

Netskope

Peter Gerdenitsch headshot

Peter Gerdenitsch

Head of Group Information & Cyber Security / Group CISO

Raiffeisen Bank International

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, we will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today


13:00 - 14:00  CET Virtual Summit Boardroom

The Next-Generation CISO

Jimmy Heschl headshot

Jimmy Heschl

Head of Digital Security

Red Bull

Peter Dornheim headshot

Peter Dornheim

CISO

OMV Group

While it may be hard to imagine in today’s digital world, the CISO didn’t always exist. Born of necessity amid a growing cyberthreat landscape, this leadership role has matured to a core member of a strong enterprise C-suite. Yet in a fast-evolving global economy where all norms are challenged, what will it take to move the CISO to the next level?

Join this session to learn: 

  • Leadership lessons from the past years of enterprise cybersecurity
  • Variations in reporting structure and scope of responsibility for security executives
  • The CISO of 2030, 2040 and beyond – what’s next?"

13:00 - 14:00  CET Virtual Summit Boardroom

Is the human factor in security underestimated or an unsolvable problem?

Detlev Weise headshot

Detlev Weise

Beirat / Senior Adviser

KnowBe4

David King headshot

David King

Regional ISO, EMEA

Omnicom Group

Organizations invest the majority of their IT security budgets in technical protection measures. What are the possible reasons?

Join your peers in this virtual boardroom to discuss:

  • Whether security leaders already consider the technical measures to be sufficient and underestimate the human factor in their security strategy?
  • Is it simply less difficult to get a budget for technical protection than for security awareness measures?
  • If organizations already consider the human factor in their security strategy, what are the important lessons learned and what are the obstacles to implementation?

13:00 - 14:00  CET Virtual Summit Boardroom

Optimizing Security Operations

Oran Hollander headshot

Oran Hollander

CISO

Telefonica Deutschland

Martin Dion headshot

Martin Dion

Chief Security Officer

BCV

Joachim Fritschi headshot

Joachim Fritschi

CISO

GLS Group

Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.

Join this session to learn:

  • Models for effective insource, outsource and hybrid SOCs
  • Leadership best practices for keeping employees engaged and alert
  • The latest workflows for effective incident response

14:00 - 14:30  CET Networking

CISO “Live” Networking

An informal and interactive opportunity for you to network with peers in small groups. 

14:30 - 15:30  CET Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow DACH CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to participate

Please contact your Program Manager to participate.

17 November 2020

Your Community Partners


CISO Thought Leaders
Key Partners
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Luis Arango Abello

Programme Manager

+44 (0)1784 267 880

luis.arangoabello@gartner.com