Expand Your Cyber Expertise. Secure Your Future.

Similar documents
Expand Your Cyber Expertise. Secure Your Future.

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BRING EXPERT TRAINING TO YOUR WORKPLACE.

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Securing Digital Transformation

Run the business. Not the risks.

Sage Data Security Services Directory

CYBER SOLUTIONS & THREAT INTELLIGENCE

Security Awareness Training Courses

ISACA Enterprise. Solutions and Resources

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

BHConsulting. Your trusted cybersecurity partner

CYBER SECURITY TRAINING

CYBER SECURITY AIR TRANSPORT IT SUMMIT

SANS/REN-ISAC Partnership

Certified in Risk and Information Systems ControlTM Certification Training - Brochure

FOR FINANCIAL SERVICES ORGANIZATIONS

Angela McKay Director, Government Security Policy and Strategy Microsoft

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Which Side Are You On?

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

DIGITAL TRUST Making digital work by making digital secure

General Data Protection Regulation (GDPR): Securing Data, Leading with both Legal and Technical Expertise

to Enhance Your Cyber Security Needs

BHConsulting. Your trusted cybersecurity partner

RISK MANAGEMENT Education and Certification

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Cybersecurity. Securely enabling transformation and change

Intro to Capture the Flag

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

Emerging Technologies The risks they pose to your organisations

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Building a Resilient Security Posture for Effective Breach Prevention

Continuous protection to reduce risk and maintain production availability

WELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT

Les joies et les peines de la transformation numérique

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

Department of Management Services REQUEST FOR INFORMATION

Caribbean Cyber Security: Not Only Government s Responsibility

Cognizant Cloud Security Solution

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Experience Security, Risk, and Governance

Cyber Security School

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Defensible and Beyond

M&A Cyber Security Due Diligence

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

EARN UP TO 18 CPE CREDITS

2018 Trends in Hosting & Cloud Managed Services

New Zealand Government IBM Infrastructure as a Service

HOSTED SECURITY SERVICES

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

A new approach to Cyber Security

ISACA West Florida Chapter - Cybersecurity Event

THALES DATA THREAT REPORT

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

EU General Data Protection Regulation (GDPR) Achieving compliance

New Zealand Government IbM Infrastructure as a service

Address C-level Cybersecurity issues to enable and secure Digital transformation

ITIL Intermediate Service Transition (ST) Certification Training - Brochure

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

Executive Insights. Protecting data, securing systems

The fast track to top skills and top jobs in cyber. Guaranteed.

The Modern SOC and NOC

Micro Focus Partner Program. For Resellers

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

MITIGATE CYBER ATTACK RISK

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Project Management Professional Training

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

Google Cloud & the General Data Protection Regulation (GDPR)

Leading the Digital Transformation from the Centre of Government

General Data. Protection Regulations MAY Martin Chapman Head of Ops & Sales Microminder. Presentation Micro Minder Ltd 2017

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

Career Paths In Cybersecurity

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

Changing the Game: An HPR Approach to Cyber CRM007

Global Security Consulting Services, compliancy and risk asessment services

Itu regional workshop

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Best Practices in Securing a Multicloud World

Effective COBIT Learning Solutions Information package Corporate customers

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Reading the Tea Leaves of the 2015 RSA Conference Submissions

Modern Database Architectures Demand Modern Data Security Measures

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

ITIL Intermediate Service Design (SD) Certification Training - Brochure

Adaptive & Unified Approach to Risk Management and Compliance via CCF

Transcription:

Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around the world. CSX 2018 enables you to: Embrace fresh insights, better understand your enemy and discover solutions that will help you safeguard the future of your organisation. Earn up to 32 CPE credit hours. Choose from 50+ interactive sessions and workshops in cybersecurity, security and more. Network with global experts and peers at every level throughout the conference to advance your career.

Take advantage of more than 50 sessions and workshops that align to the newly released cyber-focused tracks EMERGING SECURITY TOOLS & TECHNIQUES Embrace new insight and understanding of the cutting-edge technological developments reshaping the world of information systems and cybersecurity. Explore blockchain and cognitive technologies. Identify best practices, the potential rewards of these emergent technologies and their risk implications. As more and more enterprises seek out the advantages, ensure that you are among the professionals equipped with strategies and tools for keeping impacted data secure. SESSIONS INCLUDE: Data Protection in a Borderless Serverless Distributed World Five Ways for Securing SD-Wan Penetrating Blockchain: How to Harden Distributed Blockchain Implementations Cyber Security Performance: A Quantitative Approach FinTechs Between the Rise & the Challenge No Silver Bullets: Cybersecurity in the Cognitive Era New Approach to Data-Centric Security Blockchain: Everyone is Selling, But is it Right? Trends in Applicantion Security: Good & Bad Decisions The Coming Security & Privacy Risks Behind BCI Solutions

SECURITY RISK & COMPLIANCE Maximise your risk and compliance know-how while minimising your enterprise s security vulnerabilities. Explore web risks, system configurations and common misconfigurations, and more. The Security Risk & Compliance track focuses on computing security concepts, including access control and management, governance, and risk-management strategies and best practices and can also keep you and your enterprise out of the pitfalls of growing global security-related regulation and compliance. SESSIONS INCLUDE: Designing a Simple & Effective ISMS Cloud Security & Risk Management: Security as a Service & Security Compliance in the Cloud Prepare Against Ransomware Integrating Data Protection Aspects into Development of Cyber Physical Systems DPIA in Practice Crypto Agility: Security Event Response Do you Protect your Machine Identites? Third Party Risk Management Cyber Crisis Management

CYBER THREAT INTELLIGENCE & TECHNOLOGIES Go beyond surfing for solutions and go deep into cybersecurity threats associated with operating on the web. Virtually no enterprise network or infrastructure is totally immune from connectivity s evolving threats, and no successful enterprise can pull the plug on the web s convenience and value. Arm yourself with a thorough knowledge of the common and emerging methods used to attack corporate networks and how, with the right intel tools, you can apply some of the smartest solutions to preventing them. SESSIONS INCLUDE: Hacking Closed Networks Rise of the Machines: Protecting the New Identities A Framework for Choosing an ISMS Threat Intelligence Sharing: Trusted Circles & ISAC's Applying a Threat Based Approach to Security Testing Cyber Warfare & the New Threat to Security Breaches 2013-18: What Can We Learn? The Supply Chain: A Major Threat? The Art of Red Teaming Without Insulting The Five P s of Breach Response

SECURITY GOVERNANCE Learn how to create an effective security programme that leverages components of the globally recognized NIST Cybersecurity Framework and complies with European Privacy regulations and more. Embrace expert insights as well as proven tools and techniques, together with concepts and processes that will help you conceptualize and create a governance programme for sustainable enterprise security. SESSIONS INCLUDE: How to Build Valuable CSIRT/SOC's with Constrained Budgets Challenges in Cybersecurity Program Development IoT Privacy Maturity Framework & Solutions Shadows of the Cloud: Dealing with Shadow IT Why Awareness Efforts Fail The Ocean is Full of Phish Impact of GDPR on Third Party & M&A Security Chief Security Officer: A View of the Equifax Breach DevSecOps: Bringing the Security: The Missing Link in Delivering on the Promise of Business Velocity and Quality to DevOps Creating Adaptable Security Awareness Program in a Global Corporation

Secure the Cyber Insights of CSX 2018 Europe Keynotes OPENING KEYNOTE James Lyne Cybersecurity Expert, Global Head of Security Research at Sophos, & Founder of Helical Levity CLOSING KEYNOTE Keren Elazari Strategic Cybersecurity Analyst, Author & Researcher Gain insights from one of UK s top cybersecurity experts. Lyne brings years of technical expertise spanning a variety of security domains from forensics to offensive security. He is passionate about talent development, regularly participating in initiatives to identify and develop the next generation of security talent. James is also a certified instructor for the SANS Institute and has appeared on TED Talks, CNN, NBC, and BBC News. From cyberpunks to political hacktivists, Keren Elazari is well versed in the evolving role of hackers in changing the Internet and enterprise cybersecurity. The strategic cybersecurity analyst and author's TED Talk on how hackers strengthen the Internet s immune system has been viewed by millions online, translated into 27 languages and selected for TED's list of Most Powerful Ideas in 2014 and Inc.com s list of Top TED Talks of 2014.

Attend CSX 2018 Europe in London, UK, 29 31 October 2018 Don t Miss Europe s Leading Cyber Event REGISTER NOW AND SAVE US $200* www.isaca.org/csxeuro2018 #csxeuro GET TO KNOW WHY ATTENDEES RAVE: Phenomenal educational and networking opportunity. I look forward to attending in the future. *See website for pricing details and limitations. ISACA, the Cybersecurity Nexus (CSX) trademark, and ISACA s Cybersecurity Nexus (CSX) products, certifications, and services are not affiliated with CSX Corporation or its subsidiaries, including CSX Transportation, Inc. EARN UP TO 32 CPE CREDIT HOURS!