Leaders Lunch & Learn

  • Stengthening Cybersecurity Strategy to Support Business Transformation in the Connected Enterprise

    Exclusively for holders of an Infosecurity Europe Leaders Pass

    Join us on Tuesday 5th June 2018, at Henley Suite 4, Olympia London, from 12:30-14:00 to discuss best practice strategy with your peers on this pressing issue facing information security leaders.

    Enterprises are becoming increasingly connected as technology rapidly evolves and the proliferation of mobile, IoT and cloud computing transforms business and information assets.

    The advent of tech savvy millennials entering the work environment and a demand for consumer driven technologies further challenges organisations to manage productivity and end user expectation with enterprise risk.

    Information security leaders are faced with the difficult task of developing a cybersecurity strategy to not only defend their networks and end users but also to support business transformation and growth while mitigating risks and threats.

    During this collaborative roundtable discussion, attendees are invited to discuss and debate this challenge with their peers in a trusted environment where Chatham House Rule applies. The objective of the discussion is to identify five key learning points that participants can apply to their own cybersecurity strategy.

    Questions for discussion include:

    • How to align a cybersecurity strategy with business strategy, risk appetite and threat landscape
    • How should cybersecurity strategy reflect changing working practices?
    • How should cybersecurity be architected to ensure end-user security?
    • What are the key elements of a robust cybersecurity framework?
    • How to continually evolve to keep pace with cybercrime

    Please note: You must be registered for the Infosecurity Europe Leaders Programme to attend this event. If you have not already, apply now for a Leaders Pass. Criteria applies.

    Register for the Leaders Lunch & Learn

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.