Taking place for just 1.5 hours per day across 3 days, this event delivers the content you cannot find anywhere else, delivered by Europe's leading CISOs and Information Security leaders.
Sharing their successes, failures, and lessons learned in a bitesize and interactive format, this is your chance to get up-to-speed with the latest and greatest innovations.
Simply sign-up, log on and learn.
Are you ready to accelerate your information security journey?
20
Keynote Fireside Chat: Building Resilient Organisations - a Fireside Chat with TX Group and Detectify
Speakers:
Intermission
Take a break, grab a drink or meet fellow attendees in the chatroom
Panel Discussion: How Can You Succeed With the New Realities of Information Security?
Panelists:
Intermission
Take a break, grab a drink or meet fellow attendees in the chatroom
Keynote Presentation: Securing the Future of Work with Cyber AI
Speaker:
Speaker Meet & Greet
Join a selection of today’s speakers and your fellow attendees for this bonus session. Hear the speakers share additional insights, following on from their session, and ask the questions you want the answers to, face-to-face.
Speakers:
Speakers:
Intermission
Take a break, grab a drink or meet fellow attendees in the chatroom
Keynote Presentation: How to Respond Effectively to a Cyber Breach
Intermission
Take a break, grab a drink or meet fellow attendees in the chatroom
Keynote Fireside Chat: Next Generation Defence - Using Hackers to Beat Hackers
Speakers:
Speaker Meet & Greet
Join a selection of today’s speakers and your fellow attendees for this bonus session. Hear the speakers share additional insights, following on from their session, and ask the questions you want the answers to, face-to-face.
Speakers:
Intermission
Take a break, grab a drink or meet fellow attendees in the chatroom
Panel Discussion: How do You Build Confidence Around Third-Party Risk Management?
Moderated by:
Panelists:
Speaker Meet and Greet
Join a selection of today’s speakers and your fellow attendees for this bonus session. Hear the speakers share additional insights, following on from their session, and ask the questions you want the answers to, face-to-face.
Speakers:
Darktrace is a leading autonomous cyber security AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,700 organizations to protect against threats to the cloud, email, SaaS, traditional networks, IoT devices, endpoints, and industrial systems.
The company has over 1,500 employees and is headquartered in Cambridge, UK. Every second, Darktrace AI fights back against a cyber-threat, before it can cause damage.
https://www.darktrace.com/en/
Detectify is a SaaS based website security service founded by ethical hackers that will help you automate scanning for continuous coverage. We audit your site’s security so your teams can focus on web development.
Detectify analyzes and monitors the security level of your website by applying a broad range of emulated hacker attacks. We then provide the owner with an easy to understand report that describes the identified vulnerabilities and their potential risk in the hands of malicious hackers.
We work with some of the best white hat hackers in the world through our Detectify Crowdsource platform and our internal security research team to continually build more security tests into our tool.
We now scan for over 2000+ known vulnerabilities.
Go Hack Yourself or someone else will
Get secure: www.detectify.com
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
ManageEngine crafts comprehensive IT management software with a focus on making your job easier. With our 90+ products and free tools cover everything your IT needs, you can take complete control of your IT infrastructure and services—both on-premises and in the cloud.
For more information, visit https://www.manageengine.co.uk/
OneTrust is the #1 fastest growing and most widely used technology platform to help organizations be more trusted, and operationalize privacy, security, data governance, and compliance programs.
More than 7,500 customers, including half of the Fortune 500, use OneTrust to build integrated programs that comply with the CCPA, GDPR, LGPD, PDPA, ISO27001 and hundreds of the world’s privacy and security laws. The OneTrust platform is backed by 130 patents and powered by the OneTrust Athena™ AI and robotic automation engine.
Our offerings include OneTrust Privacy Management Software; OneTrust PreferenceChoice™ consent and preference management; OneTrust Vendorpedia™ third-party risk exchange; OneTrust GRC integrated risk management; OneTrust Ethics ethics and compliance; OneTrust DataGuidance™ regulatory research; OneTrust DataDiscovery™ AI-powered discovery and classification software; and OneTrust DataGovernance™.
www.OneTrust.com
OneTrust Vendorpedia™ is the largest and most widely-used technology platform to operationalize third-party risk. The offering enables both enterprises and their vendors with technology solutions that include: the Third-Party Risk Exchange, a community of shared (and pre-completed) vendor risk assessments with 70,000+ participating vendors; Questionnaire Response Automation, a tool that helps organizations answer incoming security questionnaires; and Third-Party Risk Management software, a platform to streamline the entire vendor lifecycle, from onboarding to offboarding. More than 7,500 customers of all sizes use OneTrust, which is powered by 75 awarded patents, to offer the most depth and breadth of any third-party risk, security, and privacy solution in the market. OneTrust Vendorpedia offers purpose-built software designed to help organizations manage vendor relationships with confidence, including and integrates seamlessly with the entire OneTrust platform, including – OneTrust Privacy Management Software, OneTrust DataDiscovery™, OneTrust DataGovernance™, OneTrust GRC, OneTrust Ethics, OneTrust PreferenceChoice™, OneTrust ESG, and OneTrust DataGuidance™.
Rapid7 is advancing security with visibility, analytics, and automation delivered through our Insight cloud.
Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Over 9,000 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organisations.
www.rapid7.com
Synack, the most trusted crowdsourced security testing platform, delivers on-demand security testing, intelligence, and operations through a continuous, offensive SaaS platform with crowdsourced talent. The company combines the world's most skilled and trusted ethical hackers with AI-enabled technology to create a scalable, effective security solution. Headquartered in Silicon Valley with regional offices around the world, Synack protects leading global banks, the top 10 global consulting firms and security companies, DoD classified assets, and over $6 trillion in Fortune 500and G2000 revenue. Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.
https://www.synack.com/products/
Her Majesty The Queen graciously granted the Chartered Institute of Information Security a Royal Charter of Incorporation at the Privy Council meeting on Wednesday 12th December 2018.
A Royal Charter is an instrument of incorporation, granted by The Queen, which confers independent legal personality on an organisation and defines its objectives, constitution and powers to govern its own affairs. Incorporation by Charter is a prestigious way of acquiring legal personality and reflects the high status of that body. Charters are granted rarely, and a body applying for a Charter would normally be expected to demonstrably meet several criteria, regarding its reputation, its standing and its contribution to the profession. CIISec meets those criteria, which reflects how strong and respected our membership is in the professional community and the influence we bring to bear in shaping the information security profession.
Computing Security magazine is a bimonthly publication bringing our registered readers the latest news, thought leadership and product reviews relating to IT security. It covers the major Cyber Security issues that businesses encounter as they seek out the best solutions, advice and strategies to keep their operations safe, productive and always ahead of the game. The magazine discusses the processes and mechanisms by which digital equipment, information and services can be protected from unintended or unauthorised access, change or destruction, and attempts to highlight the growing importance of education and training, as well as showcasing emerging technologies needed in line with the increasing reliance on computer systems of most businesses worldwide.
ounter Terror Business magazine, launched in 2010, is a specialist digital publication distributed on a tightly controlled, fully requested basis to 6,500 heads of security, intelligence officers, procurement officials and department heads in local and central government. Its target audience includes the intelligence services, police, ambulance, fire and rescue services, Home Office, Ministry of Defence, Armed Forces, environment agencies, border control agencies, customs, aviation and port authorities. Also included in its distribution are heads of private sector concerns and other organisations involved in security and defence.
Editorially we regularly run features on: counter terrorism strategies, the latest news stories from local and central government, the Armed Forces and national defence strategies, CBRN, terrorism and organised crime, fraud, identity theft, cyber terrorism and security, emergency planning, crisis management and public safety, event security, specialist training and much more.
Additional digital copies are also e-distributed at key global exhibitions through the year, where we are Media Partner to the sectors’ leading events.
Your blog post content here…
Global Risk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the world's premier Risk forum and contribute to a better understanding of the complex world of risk.
Learn More: https://globalriskcommunity.com/
1. Learn from the most successful leaders in the information security world, and explore the strategic issues that matter to you. We have years of experience in creating events that deliver valuable insights.
2. Enjoy the convenience of an online event. There’s no need to spend time & money on travel, no time out of the office, and you can fit the short webinars around your schedule.
3. Interact with the information security community’s leading executives. Our technology and live broadcasts mean you can put your specific pain points & questions to our expert speakers, and get direct, actionable answers.
4. Can't attend all the sessions live? Catch up later at the time most convenient to you, On-Demand. Approved recordings will be shared with all registrants, post-event.
5. All for free! There’s no fee to register and no travel costs. All you need is access to the internet, from anywhere in the world, on any device!
Across 3 days we broadcast two 45-minute webinar sessions directly to your desk. Throughout the week you will benefit from our insightful sessions, delivered by outstanding information security executives, covering your most pertinent challenges.
CISO Champions, Online - Europe uses the latest browser-based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
Yes!
Yes, all approved sessions will be made available on-demand after the event to registrants. You must sign-up to receive access to the recorings.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Swoogo.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com
Data protection
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at inquiries@coriniumintel.com