Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around the world. CSX 2018 enables you to: Embrace fresh insights, better understand your enemy and discover solutions that will help you safeguard the future of your organisation. Earn up to 32 CPE credit hours. Choose from 50+ interactive sessions and workshops in cybersecurity, security and more. Network with global experts and peers at every level throughout the conference to advance your career.
Take advantage of more than 50 sessions and workshops that align to the newly released cyber-focused tracks EMERGING SECURITY TOOLS & TECHNIQUES Embrace new insight and understanding of the cutting-edge technological developments reshaping the world of information systems and cybersecurity. Explore blockchain and cognitive technologies. Identify best practices, the potential rewards of these emergent technologies and their risk implications. As more and more enterprises seek out the advantages, ensure that you are among the professionals equipped with strategies and tools for keeping impacted data secure. SESSIONS INCLUDE: Data Protection in a Borderless Serverless Distributed World Five Ways for Securing SD-Wan Penetrating Blockchain: How to Harden Distributed Blockchain Implementations Cyber Security Performance: A Quantitative Approach FinTechs Between the Rise & the Challenge No Silver Bullets: Cybersecurity in the Cognitive Era New Approach to Data-Centric Security Blockchain: Everyone is Selling, But is it Right? Trends in Applicantion Security: Good & Bad Decisions The Coming Security & Privacy Risks Behind BCI Solutions
SECURITY RISK & COMPLIANCE Maximise your risk and compliance know-how while minimising your enterprise s security vulnerabilities. Explore web risks, system configurations and common misconfigurations, and more. The Security Risk & Compliance track focuses on computing security concepts, including access control and management, governance, and risk-management strategies and best practices and can also keep you and your enterprise out of the pitfalls of growing global security-related regulation and compliance. SESSIONS INCLUDE: Designing a Simple & Effective ISMS Cloud Security & Risk Management: Security as a Service & Security Compliance in the Cloud Prepare Against Ransomware Integrating Data Protection Aspects into Development of Cyber Physical Systems DPIA in Practice Crypto Agility: Security Event Response Do you Protect your Machine Identites? Third Party Risk Management Cyber Crisis Management
CYBER THREAT INTELLIGENCE & TECHNOLOGIES Go beyond surfing for solutions and go deep into cybersecurity threats associated with operating on the web. Virtually no enterprise network or infrastructure is totally immune from connectivity s evolving threats, and no successful enterprise can pull the plug on the web s convenience and value. Arm yourself with a thorough knowledge of the common and emerging methods used to attack corporate networks and how, with the right intel tools, you can apply some of the smartest solutions to preventing them. SESSIONS INCLUDE: Hacking Closed Networks Rise of the Machines: Protecting the New Identities A Framework for Choosing an ISMS Threat Intelligence Sharing: Trusted Circles & ISAC's Applying a Threat Based Approach to Security Testing Cyber Warfare & the New Threat to Security Breaches 2013-18: What Can We Learn? The Supply Chain: A Major Threat? The Art of Red Teaming Without Insulting The Five P s of Breach Response
SECURITY GOVERNANCE Learn how to create an effective security programme that leverages components of the globally recognized NIST Cybersecurity Framework and complies with European Privacy regulations and more. Embrace expert insights as well as proven tools and techniques, together with concepts and processes that will help you conceptualize and create a governance programme for sustainable enterprise security. SESSIONS INCLUDE: How to Build Valuable CSIRT/SOC's with Constrained Budgets Challenges in Cybersecurity Program Development IoT Privacy Maturity Framework & Solutions Shadows of the Cloud: Dealing with Shadow IT Why Awareness Efforts Fail The Ocean is Full of Phish Impact of GDPR on Third Party & M&A Security Chief Security Officer: A View of the Equifax Breach DevSecOps: Bringing the Security: The Missing Link in Delivering on the Promise of Business Velocity and Quality to DevOps Creating Adaptable Security Awareness Program in a Global Corporation
Secure the Cyber Insights of CSX 2018 Europe Keynotes OPENING KEYNOTE James Lyne Cybersecurity Expert, Global Head of Security Research at Sophos, & Founder of Helical Levity CLOSING KEYNOTE Keren Elazari Strategic Cybersecurity Analyst, Author & Researcher Gain insights from one of UK s top cybersecurity experts. Lyne brings years of technical expertise spanning a variety of security domains from forensics to offensive security. He is passionate about talent development, regularly participating in initiatives to identify and develop the next generation of security talent. James is also a certified instructor for the SANS Institute and has appeared on TED Talks, CNN, NBC, and BBC News. From cyberpunks to political hacktivists, Keren Elazari is well versed in the evolving role of hackers in changing the Internet and enterprise cybersecurity. The strategic cybersecurity analyst and author's TED Talk on how hackers strengthen the Internet s immune system has been viewed by millions online, translated into 27 languages and selected for TED's list of Most Powerful Ideas in 2014 and Inc.com s list of Top TED Talks of 2014.
Attend CSX 2018 Europe in London, UK, 29 31 October 2018 Don t Miss Europe s Leading Cyber Event REGISTER NOW AND SAVE US $200* www.isaca.org/csxeuro2018 #csxeuro GET TO KNOW WHY ATTENDEES RAVE: Phenomenal educational and networking opportunity. I look forward to attending in the future. *See website for pricing details and limitations. ISACA, the Cybersecurity Nexus (CSX) trademark, and ISACA s Cybersecurity Nexus (CSX) products, certifications, and services are not affiliated with CSX Corporation or its subsidiaries, including CSX Transportation, Inc. EARN UP TO 32 CPE CREDIT HOURS!