DACHciso

20th – 21st March 2018

FRANKFURT, GERMANY

This inaugural DACHciso Summit is set to bring together key thought leaders within government, enterprise and key institutions from all areas of the DACH region. We will be evaluating the need for cyber awareness programs, the suitability of proposed and regulatory frameworks and how public-private partnerships can transform the cyber security landscape.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

DACHCiso – Securing DACH Region from Cyber Threats

20th – 21st March 2018FRANKFURT, GERMANY


The DACHciso Summit 2018 will bring together CISOs and CIOs from the major companies across the DACH region to raise awareness and share best practices. Among the issues that will be addressed are collaboration between companies and Government bodies, data protection, the region’s false sense of security, raising awareness through training, communication strategies in the C-suite and cyber strategy budget.

Being a cross-industry event, the exchange of ideas from different perspectives will stimulate executives to find creative solutions to face today’s ever-evolving challenges.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Make the most of your 2 days!

  • Learn how to achieve resiliency in the age of the cloud, digitalisation and industry 4.0
  • Define the steps to achieve full compliance and turn it into a competitive advantage
  • Design a peer-to-peer communication channel to share insights on the latest threats
  • Understand the benefits of IT/OT convergence
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01
20th March 2018
08:00 Registration
08:50 Opening Address from the Chairman
09:00 Opening Panel
Communication among Companies and Government Bodies: How is information Shared, Stored and Accessed?

  • How great is the need for communication between governments and the private sector? How can it be improved? What channels can companies use to exchange information in real time?
  • Does cybersecurity need to be addressed at a continental, country, organisational or individual level?
  • Are the companies identifying unauthorized access or transfer of sensitive data? How should we safeguard information security and privacy?
  • Is data appropriately managed and protected, in accordance to internal and external requirements?
09:40 Keynote
Reverting the Trend of Undetected Breaches

  • A guide to establishing an effective Security Operations Centree
  • Evaluating your current state and improving to the future desired capabilities
  • The key to resilience: monitoring, analytics and prompt detection. Understand what are the best approach for your business needs and the requirements to identify and respond to security incident
10:10 Networking Break & Business Crad Exchange
10:50 Case Study
Taking our Business to the Next Level: Our Risk-Based Cyber Strategy

  • Developing a mature information security programme and expanding operational risk to include cyber security
  • How our company’s CRO and CISO are collaborating to align to the wider Enterprise Risk Management strategy
  • How to transition to a risk management culture
11:20 Presentation
Privacy and Data Protection. What Role is the Legislation Playing in Shaping your Policy?

  • Review upcoming policies and how to implement them, from your headquarters to your outsourced activities
  • Understand how compliance can be measured with regards to regulations and how it can give your business a competitive advantage
11:50 Platform Presentation
5 Tips to Implement Patch Management
12:00 Keynote
Hunting Adversaries – The Ultimate Challenge for your Cyber Defense Operations

  • Harnessing the potential of threat intelligence to know your attacker and predict their next move
  • Learn how to incorporate threat intelligence in a lean way in your organisation
12:30 Seated Lunch
13:30 Case Study
Developing an Incident Response Plan. Preparation Across our Entire Company

  • How our IT department collaborated with the PR and HR departments to design a thorough incident response plan
  • Defining Key Performance Indicators in advance and holding test runs regularly to change and adapt the IR plan
  • Risk appetite: what is acceptable and what needs a remediation plan?
14:00 Platform Presentation
Data Monitoring, Segregation and Leakage Prevention
14:10 Keynote
Cyber Liability Insurance: A Must-Have

  • Understand to what extent risk can be mitigated and transferred
14:40 Break and Networking
15:10 Case Study
A Company-Wide Awareness Culture: Everyone Takes Responsibility

  • Phishing, pharming, fake-president frauds and BYOD. Raising awareness among our employees
  • Our comprehensive approach to making humans the strongest link
15:40 Keynote
Is Blockchain the Answer for Future-Proofing Enterprises’ Cybersecurity Measures?

  • Refreshing cyber security perspectives and using Blockchain to tackle network vulnerabilities
  • Possible employments of blockchain and evaluation of pros and cons
16:10 Case Study
The Next Step to User Authentication: How We are Incorporating 2FA in the Age of the Cloud

  • Learn how we are incorporating two-factor authentication in our IT infrastructure as an additional layer of security
  • Hands-ondvice on maintaining compliance
09:00 Group Discussion
How Can Cyber Security be Framed as a Business-enabling Facet of the Enterprise?

  • Information security is an asset for the company, not a mere cost. How can such culture change be achieved?
  • How can cyber security strategy be integrated in non-financial risk management?
  • How should budget be distributed between prevention and response?
17:20 Chairman’s Closing Address
17:30 Networking Drinks and Canapés
DAY 02
21st March 2018
08:00 Registration
08:50 Welcome Address from the Chair
09:00 Opening Panel
Is the Region Hiding behind a False Sense of Security? – The “Them not Us Syndrome”

  • What practical steps should we take to raise awareness across the region?
  • What is the impact of digitalisation and disruptive technologies on your security perception and cyber strategy?
09:40 Keynote
Robust Incident Response

  • Understanding Security in the Context of Digitalisation and Industry 4.0
  • What you need to do to ensure that security is considered at every stage of digital transformation
  • Machine learning and AI as an aid to cyber security
10:10 Morning Refreshments and Networking
10:50 Case Study
Collaborating Securely with Third Party Vendors

  • Industry 4.0 opportunities and IT Security risks of digitalization
  • Our journey of implementing industry 4.0 in our business
  • Practical considerations on how industry 4.0 has changed my approach to security
11:20 Keynote
How to Work Collaboratively with Development and Infrastructure Operations Teams

  • Cyber risk: a growing threat for African stock markets
  • How to build in resiliency into your systems – reviewing emerging trends and approaches in cyber security
  • Practical advice for making the transition to agile processes smooth
  • Tips for CISOs to bring security into the DevOps era
  • How ITIL, Cobit and ISO norms should be implemented
11:50 Platform Presentation
Common Frailties of Embedded Systems and Methods of Attack
12:00 Keynote
You Have Been Breached: Now What?

  • How to fight back – a checklist
  • Assess your current incident response plan and optimise it
  • Minimising damage, recovering compromised data and preserving evidence for legal action
12:30 Seated Lunch
13:30 Case Study
Cyber-Securing Industrial Control Systems. Our IT-OT Alignment Roadmap

  • Preparing our IT staff for protecting ICS systems and our engineering staff for new security requirements
  • The steps we have taken to implement SA/IEC 62443 standards
  • Conducting self-assessments of ICS
14:00 Keynote
Keeping under Lock and Key your Most Valuable (and Endangered) Asset: Intellectual Property

  • Preventing the vast amounts of IP stored electronically from being stolen: access restriction and monitoring and encryption
  • Developing guidelines and procedures on the handling of confidential data
14:30 Refreshments & Networking
15:00 Case Study
Security A to Z: From our Factory Floor to our Supply Chain

  • How we prevent confidentiality, integrity and availability from being compromised
  • Making our plants breach-proof
  • Implementing ISO 28000 and our approach to managing information risk in the supply chain
15:30 Case Study
A Story of Success: Resorting to Artificial Intelligence to Streamline Security Operations

  • Automating the hunt for cyber attackers and prioritizing the highest-risk threats
  • Enabling our security team to focus on threat containment, remediation and forensics
16:00 Group Discussion
What Should the Skillset of the CISO Look Like?

  • What is the balance between technical knowledge and business language skills?
  • What are the effective strategies to inform and educate the C-suite?
16:50 Chairman’s Closing Remarks
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Sponsors

Sponsorship Opportunities

Opportunities Available

Please contact info@qatalystglobal.com for all sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Online Partner

Online Partner

Please contact Kimberley Ward on kim.ward@qatalystglobal.com for more information on partnership opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

History

 

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Testimonials

Register

Primary Market

Oil & Gas, Government, Academia, Utilities, Manufacturing

(Group discounts available)

€749

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

(Group discounts available)

€1,899

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Contact Us

GET IN TOUCH
Qatalyst Global
Dowgate Hill House
14 – 16 Dowgate Hill,
London, EC4R 2SU, UK
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

WordPress Image Lightbox

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: