As our reliance on technology deepens, organizations and cybersecurity leaders
must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware.
G
brings together cybersecurity leaders to explore the latest technology, insights and trends shaping the industry today.
Prepare for ongoing disruption with prioritized risk management
Embrace sustainability as a
competitive advantage
Integrate purpose-driven strategy
Accelerate digital supply chain transformation
Enable customer centricity and customer-driven business transformation
Your community is waiting. Join us, 23 – 25 September in London, U.K.,
to discover the future of cybersecurity, and gain the tools you need to
be resilient in a complex world.
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_984_3130937
Unleash the value of your security and risk management programs and initiatives
Engage with security and risk peers and Gartner experts in a variety of ways.*
Building Cybersecurity Resilience in a Complex World
*Topics are subject to change; please click here for the most up-to-date agenda.
An interactive experience like no other
DRAFT
Drive automation across planning, procurement and logistics
Accelerate circular economy outcomes
Support operational excellence
Advance progress on diversity, equity and inclusion (DEI) and environmental and social governance (ESG) goals
Recruit and develop talent
Increase visibility
Register Now
Gartner’s events serve
as a nexus for thought leaders, innovators and industry professionals. These gatherings foster invaluable networking opportunities, enabling participants to exchange ideas and forge strategic partnerships.”
Explore the latest security and risk management trends and Gartner Predicts, including:
2025
2025
2027
2025
By 2027, 45% of CISOs will expand
their remit beyond cybersecurity,
due to increasing regulatory pressure
and attack surface expansion.
Over 60% of organizations will embrace zero trust as a starting place for security by 2025. More than half will fail to realize the benefits.
Through 2025, generative AI will cause
a spike of cybersecurity resources required to secure it, causing more
than a 15% incremental spend on application and data security.
2025
2027
Source: Gartner
3
days
2,100+
attendees
90+
exhibitors
Conference by numbers
40+
experts
The CISO Circle Program
Designed specifically for chief information security officers and chief risk officers (CROs), the CISO Circle Program offers a curated executive experience, delivering presentations, discussions and networking opportunities throughout the conference. We recommend applying for this program when you register for the conference as seats for CISO Circle Program sessions are limited and fill up quickly.
What’s included
•
The opportunity to network and connect with
a community of CISOs and CROs
Exclusive interactive sessions focused on the most pressing priorities of CISOs and CROs
Priority access to book interactive sessions and one-on-one meeting(s) with a Gartner expert
CISO meals, featuring keynote presentations from visionaries and industry leaders
Learn More
Bring your team
Accelerate learning, strengthen your team and build a shared vision by attending as a group. Receive complimentary ticket(s) when you register as a team.*
A Gartner summit is an insightful event, which
is crucial to shape your security strategy. You
can meet experts and
peers to share views and experiences. It is useful
to benchmark your posture with the emerging trends and evolutions.”
Gavin Inns
Cyber Security Manager,
Eversholt Rail
Giovanni
Cybersecurity Expert, Arubacloud
•
•
•
Workshops
Workshops
Roundtables
Roundtables
Ask the Expert sessions
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
Gartner Magic Quadrant™ sessions
Gartner one-on-one meetings
Workshops
In these small-scale, interactive sessions, you can drill down on specific topics with a how-to focus. (Preregistration is required.)
View Agenda
Roundtables
These topic-driven, end-user forums are moderated by Gartner experts
to learn what peers are doing around particular issues across industries. (Preregistration is required.)
View Agenda
View Agenda
Ask the Expert sessions
These topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions. (Preregistration is required.)
View Agenda
Gartner Magic Quadrant™ sessions
Sessions are designed to discover how well IT solution providers are executing against their stated vision and what products best suit your use cases.
Gartner one-on-one meetings
View All Experts
Gartner one-on-one meetings
One 30-minute consultation with a Gartner expert provides targeted, personalized advice to help you plan proactively and invest wisely.
View Agenda
Agenda tracks
Designed for executives focused on these key initiatives
Attendees have access to six agenda tracks filled with 100+ sessions of the latest Gartner research specifically designed to help security and risk leaders meet the demands of the future.
D. Cybersecurity Operations
A. Cybersecurity Leadership
E. The CISO Circle Program
F. Cyber Risk Management
B. Infrastructure Security
C. Application and Data Security
Cybersecurity leaders must navigate economic uncertainty, distributed technology decisions, labor shortages, the rise of AI and an exponentially expanding attack surface — all while managing security threats and supporting business objectives.
A. Cybersecurity Leadership
D. Cybersecurity Operations
E. The CISO Circle Program
F. Cyber Risk Management
B. Infrastructure Security
C. Application and Data Security
Gartner Security & Risk Management Summit 2024, 23 – 25 September, in London, U.K.,
Security leaders are struggling with myriad security products/services and not enough security staff. This track explores the evolving landscape of infrastructure security solutions, from managed and unmanaged endpoints to the rapidly evolving network requirements to support cloud workloads and remote workspaces.
New technologies mean new threats and an increasing attack surface, not all of which are visible by the teams responsible for threat management. This track explores the latest developments, future roadmaps and new approaches to traditional application and
data security problems, including the rapid progression of AI and generative AI as security tools and sources of security threats.
Security operations (SecOps) is a crucial component of an effective security program.
This track helps security and risk management leaders increase business resilience through effective threat and exposure visibility, innovative applications of AI, response planning and risk prioritization for your organization.
Effectiveness in the chief information security officer (CISO) role continues to be a “moving
target” in the face of ever-increasing business expectations for agility, greater transparency
of cybersecurity performance and a dynamic
threat environment. The CISO Circle Program curates the best Gartner insight and guidance
in highly interactive sessions.
This track covers risks relevant to AI, privacy, supply chains and cybersecurity. Learn how to communicate value, correlate risk data to automate control monitoring, enable decision making for the defensible outcomes and integrate cyber-risk management processes with enterprise risk management.
ExCeL London
Royal Victoria Dock, 1 Western Gateway
London, E16 1XL
U.K.
You must be registered to book your accommodation, which can be reserved directly through the online registration system by visiting the conference website.
Venue
Attending for the
first time?
1.
2.
3.
4.
5.
Here are the top 5 things you must do:
Discuss challenges faced and winning strategies with peers across industries during interactive sessions.
Grab a drink or snack at one of the exhibitor receptions; it’s on them!
Strike up a conversation with someone you don’t know at breakfast, lunch or in between sessions.
Book time with a Gartner expert and chat about projects, priorities and plans — you’ll have their undivided attention.
Get a lay of the land and plan your daily schedule by downloading the Gartner Conference Navigator app.
If you do just one of these things — download the Gartner Conference Navigator app! The session slides are housed there,
so you can focus on the content instead of taking photos during
the most important presentations. Plus, you can opt in to networking and connecting with other leaders on-site.
*See Group Rate Discount terms and conditions.
Group Rate Discount
Total cost
€16,300 + VAT
25% group savings
€12,225 + VAT
4
Total cost
€20,375 + VAT
20% group savings
€16,300 + VAT
5
Total cost
€24,450 + VAT
16% group savings
€20,375 + VAT
6
Total cost
€28,525 + VAT
28% group savings
€20,375 + VAT
7
Total cost
€32,600 + VAT
25% group savings
€24,450 + VAT
8
Total cost
€36,675 + VAT
22% group savings
€28,525 + VAT
9
Total cost
€40,750 + VAT
30% group savings
€28,525 + VAT
10
Total cost
€44,825 + VAT
27% group savings
€32,600 + VAT
11
Total cost
€48,900 + VAT
25% group savings
€36,675 + VAT
12
Total cost
€52,975+ VAT
23% group savings
€40,750 + VAT
13
Total cost
€57,050 + VAT
28% group savings
€40,750 + VAT
14
Thought Leadership Theaters
VP Analyst
Pete Shoard
Register Now
Gartner Security & Risk Management Summit
23 – 25 September 2024 | London, U.K.
gartner.com/eu/securityrisk
Return to Top
Register Now
Testimonials
Agenda Tracks
Interactive Experience
CISO Circle
Exhibitors
Bring Your Team
Testimonials
Agenda Tracks
Interactive Experience
CISO Circle
Exhibitors
Bring Your Team
Total cost
$67,875
20% group savings
$54,300
15
Total cost
$72,400
19% group savings
$58,825
16
Total cost
$76,925
18% group savings
$63,350
17
Total cost
17% group savings
$67,875
18
Total cost
$85,975
16% group savings
$72,400
19
Total cost
$90,500
20% group savings
$72,400
20
$81,450
Discover what your peers are saying about our conference
Helen Lowe
Head of Security Assurance,
Simply Business
I’ve had the chance to meet new peers, talk to prospective vendors, learn news things and share/hear great ideas and viewpoints. There are so many sessions to choose from and each of my three days are packed with informational sessions, one-on-ones, meet the experts and roundtables.”
2024 sessions
Spotlight tracks
Artificial Intelligence
Technical Insights for Security Practitioners
AI will durably disrupt cybersecurity in positive ways but will also create many short-term challenges. Security and risk management leaders need to accept that 2023 was only the starter for generative AI and need to prepare
for its evolution. Learn how to effectively integrate AI into your cybersecurity roadmap.
The Technical Insights spotlight track leverages Gartner for Technical Professionals research to deliver actionable, technical insights into security best practices, methodologies and tools that your organization needs to assure operational success. Learn how to successfully design, implement
and operate security controls for the
modern enterprise.
Artificial Intelligence
Technical Insights for Security Practitioners
Return to Top
Return to Top
Return to Top
Return to Top
3
days
Guest keynotes
Bear Grylls
Never Give Up
New tracks
Demystify the hype, understand the risks and opportunities of generative AI and build an effective roadmap for integrating AI into your cybersecurity strategy.
Explore Agenda
What’s new for 2024
Experienced practitioners and thought leaders help you expand your thinking and discover new approaches to make smarter business decisions.
Explore Speakers
Founder, Cybermindz
Adventurer
Peter Hinssen
The Never Normal
Entrepreneur, Keynote Speaker and Author
Rahaf Harfoush
Digital Zen: Mastering Well-Being in a Constantly Connected World
Digital Anthropologist and Executive Director of Red Thread Institute of Digital Culture
Workshop: Baseline and Build Your Cyber Strategy Using the Gartner Cybersecurity Controls Assessment
Workshop: AI Public Policy and Regulations Top Trends 2024
Workshop: Defend Your Cybersecurity Investments With Executives Through Outcome-Driven Metrics
Workshop: The Gamification of Threat Modeling
•
•
•
•
2024 sessions
Roundtable: Beyond Risk Assessments — Building Win-Win Partnerships With Your Third Parties
Roundtable: Cost-Effective Ways to Enhance Your Cybersecurity Program Effectiveness
Roundtable: Is It Time for the CISO Role to Be Elevated to Report to the Board?
Roundtable Technical Insights: Protecting Data and Endpoints When Traveling to High-Risk Locations
Roundtable: How to Effectively Use GenAI for Cybersecurity Operations
•
•
•
•
Roundtable: What Works and What Doesn’t in Security Configuration Management
Roundtable: Bringing Forward Diverse Voices in Your Teams!
Roundtable: Augmented Cybersecurity Leadership — What Next?
Roundtable: Should Cybersecurity
Own the Third-Party Cyber-Risk Management Process?
Roundtable: What Are Realistic Expectations for AI-Enhanced SecOps?
•
•
•
•
•
•
2024 sessions
Ask the Expert: Unlocking Culture Change — Next-Gen Security Training Strategies
Ask the Expert: Risk-Based Vulnerability Management
Ask the Expert: Demystifying Cyber Insurance
Ask the Expert: Cloud Security — Managing and Securing Public Cloud and SaaS
Ask the Expert: Modern SOC Challenges
Ask the Expert: Creating and Governing Usable Cybersecurity Policies
Ask the Expert: Top Cybersecurity Trends in China for 2024 and Beyond
•
Ask the Expert: Architecting Zero Trust Into IaaS and PaaS Deployments
Ask the Expert: How to Implement Attack Surface Management
Ask the Expert: How to Secure Your APIs From Exploits and Abuse
Ask the Expert: Top Cybersecurity Challenges Faced by Every MNC Operating in China
Ask the Expert: AI and Cybersecurity
Ask the Expert: Can Gartner’s Cybersecurity Controls Assessment Elevate Your Security Strategy and Roadmap?
•
•
•
•
•
•
•
•
•
•
•
•
2024 sessions
Magic Quadrant for Security Service Edge
Magic Quadrant and Critical Capabilities for SIEM
•
•
Peter Coroneos
Spotlight Track: Artificial Intelligence
Special demonstrations
Learn from a Gartner expert how to use the Gartner framework assessment tool.
Workshop: Baseline and Build Your Cyber Strategy Using the Gartner Cybersecurity Controls Assessment
Explore Agenda
Security Summit Today for Top Trends in Security
Workshop: Defend Your Cybersecurity Investments With Executives Through Outcome-Driven Metrics*
CISO Circle Program Workshop: The Gamification of Threat Modelling**
Special workshops
Explore Agenda
Hear from Gartner security experts on the top trends discussed at the conference, in a casual, conversational format.
•
•
•
*Preregistration is required. These sessions are available to end users only.
**Application to the CISO Circle Program is required. Register to apply.
*Application to the CISO Circle Program is required. Register to apply.
Exhibit Showcase
Gain access to vendors at the forefront of technology, and save time
in finding the right solutions. Don’t miss this opportunity to meet your peers and 90+ providers — all under one roof.
Premier Plus
View All Exhibitors
Sir Lenny Henry
Award-Winning Actor, Comedian, Writer, Producer and Co-Founder of Comic Relief
Guest Keynote
Thinking Big: Rising to the Surface
Sir Lenny Henry shares his insights into how being resilient and facing adversity head on has influenced his life and work. Through his pioneering career in British entertainment and role in the creation and success of a major charitable institution, Sir Lenny brings into focus the importance of adapting to and embracing change. His keynote offers real-world stories and experiences, demonstrating how he has dealt with challenges, and how important it is to celebrate triumphs.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Guest Speaker
Executive Story: Outcome-Driven Metrics and Their Impact on Danfoss’s Cybersecurity Program
This session focuses on how Danfoss is using outcome-driven metrics in their cybersecurity program. Morten Pors Simonsen guides attendees through their planning and roadmap stages, engagement with senior leadership and outlines the lessons identified establishing effective metrics (both positive and negative).
Morten Pors Simonsen
CISO and Head of Information Security, Danfoss Group
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Sir Lenny Henry
Thinking Big: Rising to the Surface
Award-Winning Actor, Comedian, Writer, Producer and Co-Founder of Comic Relief
Morten Pors Simonsen
Executive Story: Outcome-Driven Metrics and Their Impact on Danfoss’s Cybersecurity Program
CISO and Head of Information Security, Danfoss Group
Guest speakers
Tom-Martijn Roelofs
Executive Story: Resiliency on the Roadmap — DORA’s Blessings and Global Impact
Global Head of Security Strategy and Data, CISO department, ING Bank
Moona Ederveen
Executive Story: Resilience and Information
Sharing — Why Is It Getting Enshrined in Regulation?
Executive Director EMEA, FS-ISAC
Guest Speaker
Executive Story: Resiliency on the Roadmap — DORA’s Blessings and Global Impact
The European Digital Operational Resilience Act (DORA) is now close to its effective date in January 2025. In this Executive Story, Beate Zwijnenberg first looks at why resilience is increasingly important, how DORA is pushing this field forward, and why the effect of the act is extending beyond financial institutions and outside of the EU. She looks at the technical standards that were published for DORA and the effect on the implementation of DORA within ING. Which approach is working, what are the challenges, the lessons learned and the benefits of the rollout of the DORA program? And finally, she reflects on how the situation after the effective date will look like in terms of regulatory attention on the basis of earlier experiences with new acts.
Tom-Martijn Roelofs
Global Head of Security Strategy and Data, CISO department, ING Bank
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Explore Speakers
Explore Speakers
Guest Speaker
Executive Story: Resilience and Information Sharing — Why Is It Getting Enshrined in Regulation?
Operational resilience is the new security paradigm. The ability to operate during and recover from cyberattacks is key in all industries — and actively sharing cyberinformation is a crucial mechanism of resilience. This approach is well-understood in the financial services sector; highly regulated and under constant assault, the sector has leveraged FS-ISAC for 25 years to share information, best practices and to exercise incident scenarios. The positive impact of information-sharing on resilience is also clear to regulators of critical infrastructure around the globe: An attack against one is an attack against all. Related legislation is emerging in multiple jurisdictions and industries. In this session, you can learn more about the regulation and how it enhances the resilience of your company (regardless of size or cyber maturity), and decrease the systemic risk to your sector.
Moona Ederveen
Executive Director EMEA, FS-ISAC
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Hannah Fry
The Trouble With Automation
Professor in the Mathematics of Cities
Megan Poortman
Executive Story: Gatwick’s “Flight Path” for Mastering Security Service Requirements
Head of Cybersecurity at Gatwick Airport
Hannah Fry
Professor in
the Mathematics
of Cities
Guest Keynote
The Trouble With Automation
We like to think of ourselves as master decision makers — as perfectly rational creatures, grounded in reason and logic. It’s a nice idea, but the reality is rather different. In truth, humans are a mess of competing incentives, of bad memories and of blind, impulsive biases. The modern era of data analytics is, in some sense, an attempt to automate our decision making, iron out some of the fallibilities and biases built into our choices. But decisions driven by data have blind spots, too. And all this leads us to a conundrum: Humans are flawed; machines are flawed. So who do we want to leave in charge of our decision making? Who should be the ultimate arbiter when there are very real dangers of leaving any one side in charge? This keynotes features lots of audience interaction, and aims to uncover some of the hidden flaws in our own decision making, as well as those of the systems we’ve built to replace us: To explore some of the greatest ironies of automation, and put into perspective some of the hardest challenges facing the future.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Explore Speakers
Guest Speaker
Executive Story: Gatwick’s “Flight Path” for Mastering Security Service Requirements
Join us on an exhilarating journey as London Gatwick’s head of cybersecurity unveils their flight plan for mastering security service requirements when procuring services. Buckle up as we explore how Gatwick Airport leverages security as a strategic lever, forging powerful partnerships between business
units and suppliers.
Megan Poortman
Head of Cybersecurity
at Gatwick Airport
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Key take-aways:
•
•
Discover how Gatwick ensures services procured today remain relevant tomorrow, adapting seamlessly to the ever-changing organizational landscape.
Hear firsthand from the head of cyber about their
risk-based approach to service scoping, ensuring robust protection without compromising agility.
Soaring Beyond Boundaries: Navigating the Skies of Cybersecurity
Navigating turbulence.
Risk-based altitude.
Jan Joost Bierhoff
Executive Story: The Art of Saying No as CISO
CISO, Heineken
Małgorzata Grabiec-Bąk
Scrum Master of Global Information Security Teams, Heineken
Jan Joost Bierhoff
CISO Circle Program Lunch: Fireside Chat — Most Skeptical CISO Benefits From Embracing Agile
CISO, Heineken
Małgorzata Grabiec-Bąk
Scrum Master of Global Information Security Teams, Heineken
Explore Speakers
Guest Speaker
Executive Story: The Art of Saying No as CISO
Key take-aways:
This Executive Story is particularly relevant in today's digital landscape.
As we navigate through an era where cybersecurity incidents are not a matter
of “if” but “when,” it’s crucial to acknowledge the persistent high likelihood of such events. This is attributed to the increasing number of attacks coupled with the expansion of our digital footprint. To mitigate the impact and safeguard our digital integrity, it is imperative to exercise discernment in our initiatives. This entails a deliberate focus on what truly matters by having the courage to say
no to numerous endeavors that stretch the capacity of our already limited security community.
Jan Joost Bierhoff, Director of Global Information Security at Heineken International, takes the stage with the team’s main Scrum Master, Małgorzata Grabiec-Bąk, to share the transformative journey. They have embraced a synergy of Gartner Outcome-Driven Metrics and an agile methodology to hone the focus that’s essential in today’s fast-paced environment. They impart valuable insights and experiences that promise to inspire and encourage experimentation within your own teams and organizations.
Jan Joost Bierhoff
CISO, Heineken
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Discover how Gatwick ensures services procured today remain relevant tomorrow, adapting seamlessly to the ever-changing organizational landscape.
Hear firsthand from the head of cyber about their
risk-based approach to service scoping, ensuring robust protection without compromising agility.
Risk-based altitude.
Navigating turbulence.
Explore Speakers
Guest Speaker
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Małgorzata Grabiec-Bąk
Scrum Master of Global Information Security Teams, Heineken
CISO Circle Program Lunch: Fireside Chat —
Most Skeptical CISO Benefits From Embracing Agile
Should cybersecurity teams (including CISO) change to agile product model? Learn from the Heineken CISO and Scrum Master why they made this change, how they achieved it and what it brings them.
Jan Joost Bierhoff
CISO, Heineken
Małgorzata Grabiec-Bąk
Scrum Master of Global Information Security Teams, Heineken
No
Glenn Wilkinson
CISO Circle Program Lunch: Hacker Evolution — From Mainframes to Ransomware
Ethical Hacker
CISO Circle Lunch: Hacker Evolution: From Mainframes to Ransomware
Ever since the first hackers bypassed software copy protection on Atari 800s and Apple II there has been an arms race back and forth between attackers and defenders, with defenders constantly raising the bar, and attackers jumping over, walking around, or simply removing the bar. With the advent of the internet and our modern connected lives this only intensified — with data leaks, compromises, and ransomware a commonplace headline in today's world. The talk lifts the veil behind the evolution of computer hacking, ransomware, and offers solutions to tackle the problems.
Glenn Wilkinson
Ethical Hacker
Explore Speakers
Guest Speaker
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
•
•
