defining how to implement a resilient information security
TRANSCRIPT
Paul Swarbrick, European CSO of the Year 2014
Dennis Dickstein, CISO, UBS Wealth Management
Sponsors:
Jacqueline Johnson, Head of IT Security, Nordea Bank
Michael Colao, Head of UK Security, Axa Group
Don Randall, CISO, Bank of England
Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission
Carles Solé, Chief Information Security Officer, CaixaBank
Jeremiah Kung, Senior Director - IT Risk Management, Visa
18 - 19 November, 2014 Radisson Blu Portman Hotel, London
Defining How To Implement A Resilient Information Security Strategy
LEArN froM:
Information Security StrategyDiscover the components required to
implement a resilient information security strategy
Governance, Risk & Compliance
Learn how to build an integrated governance, risk and compliance structure
Identity Access ManagementEnsure your IAM strategy is aligned to your
business strategy and existing systems
Cloud, Mobile and Social Media
Improve your cloud, mobile and social media strategy to ensure your information
is secure
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
Visit
infos
ec.w
bres
earc
h.co
m
to obt
ain yo
ur disc
ount
McAfee is now part of Intel Security.
Don Randall, CISO, Bank of England
Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission
Jacqueline Johnson, Head of IT Security, Nordea Bank
Carles Solé, Chief Information Security Officer, CaixaBank
BANKS & BUILDING SOCIETIES
Fernando De La Mata, Head of InfoSec Engineering and CISO I&T - ITRF&S, BBVA
Luis Saiz, Head Of Innovation In Security, BBVA
Roberto Baratta Martinez, Director of Loss Prevention, Business Continuity and Security, ABANCA
Ronald Rietveld, Head of Information Security Risk Management – International, ABN AMro Bank N.V
Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society
Jacqueline Johnson, Head of IT Security, Nordea Bank
Cal Waits, Director - Cyber, CITI
Philip Harrison, GE Capital
ASSET MANAGEMENT
Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
Veronique Uzan, Head of Front Office Information Systems, Amundi Asset Management
Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment
INSURANCE
Michael Colao, Head of UK Security, Axa Group
Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva
Keith Awcock Head of IS Security & BC/DR, rSA Group
Daniel Lagarcha, Head of Global Control Center CERT, Mapfre
PAYMENT SERVICES
Jeremiah Kung, Senior Director - IT Risk Management, Visa
Darren Remblence, Senior Manager, Information Security, Paypal
INFORMATION SECURITY EXPERTS
Jitender Arora, Information Security & Risk Executive,
John Colley, Managing Director EMEA, (ISC)2
Iain Sutherland, Managing Director, Information Security Solutions
Peter Warren, Chairman, Cyber Security research Institute
Martin Smith MBE FSyI, Chairman and Founder of both The Security Company (International) and The Security Awareness Special Interest Group
Michael Sentonas, VP + Global CTO, McAfee
Paul Swarbrick, European CSO of the Year 2014
Guy Bunker, CTO, Clearswift
Dave Clemente, Senior Research Analyst, ISf
REGULATION
Jonathan Bamford, Head of Strategic Liaison, Information Commissioner’s office
Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission
GUEST SPEAKERS
Gianluca D’Antonio, Chief Information Security Officer, FCC Group, Member of PSG European Network and Information Security Agency (ENISA)
Kevin Williams, NCCU Head of Partnership Engagement, National Crime Agency
KEYNOTES
Learn from 35+ thought leaders including:
Speakers
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
An agenda designed for the industry by the industry
Advisory Board
Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment
Iain Sutherland, Managing Director, Information Security Solutions
Gianluca D’Antonio, Chief Information Security Officer, fCC Group, Member of PSG European Network and Information Security Agency (ENISA)
Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
Dear Colleagues,
As financial services brace for increased threats, there is no doubt that our
roles as information security professionals are becoming more important in
protecting our businesses. By 2018 there is an expected spend increase
of 22% on risk information technologies by the industry, amounting to a
staggering $97.3 billion in expenditure. To help the industry juggle these
complex projects across compliance, internal controls, credit risk and cyber
security, we, the 2014 advisory board have designed this solution focused
agenda to address our biggest information security challenges.
This makes Information Security FS the only conference dedicated to the
financial services industry - offering you a focused learning and networking
platform.
With 150+ financial services information security leaders in one place, this
conference will be incremental in driving our industry towards information
security best practice to stay ahead of tomorrow’s threats.
Key agenda highlights include:
• DonRandall,CISOatBankofEnglandwillpresentonrethinkingsecurityin
the new hyper-connected cyber world - how to prepare your business for
future threats
• CalWaits,Director-CyberatCitiwillspeakonreimaginingtechniquesto
prevent and protect your enterprise data against different types of cyber
attacks
• RonaldRietveld,HeadofInformationSecurityRiskManagement–
InternationalatABNAMROBankN.Vwilloutlinehowtoincreaseprofitsby
working on IT compliance
Do not miss the only information security conference specifically for financial
services.
We look forward to welcoming you to the conference in November.
Best Regards,
Information Security FS 2014 Advisory Board
Jitender Arora, Information Security & Risk Expert
Innovative formats that deliver a captivating, interactive experience
Engage
fully engage with the most contentious and divisive issues currently facing your industry. Sit back and witness industry-leading figures pitting themselves against each other in a battle to deliver the knockout argument. Then, continue the debate in your own small roundtable groups until you reach a majority viewpoint. Will you reconsider your position? And will you walk away with a fresh mind-set and better prepared to take on this key conundrum?
These informal subject-specific roundtables give you a unique opportunity to drill down into the details of an issue that is really important to you by probing the knowledge and expertise of industry market leaders. Each roundtable is limited to 10 people for maximum interaction and is designed for you to meet like-minded peers and source practical solutions collaboratively. An exceptional way to genuinely get to grips with your key challenges.
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
DAY 1 - TRACK B EXPLOITING CLOUD, MOBILE AND SOCIAL MEDIA
Do the benefits of cloud computing outweigh the risks? » Can cloud computing be implemented fluently and successfully across your enterprise? » Will we ever reach full security and privacy in the cloud? » Will limited control and flexibility outweigh the benefits of having more convenience and
continuous availability? » Is increased vulnerability the barrier to successful cloud computing?
Moderator: Dave Clemente, Senior Research Analyst, ISF
Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society
DAY 1 - TRACK B REVISING YOUR TECHNOLOGY ROADMAP
Drill-Down Roundtables on cloud, mobile and social media strategy and technology
CLOUD ROUND TABLE Moderator: Luis Saiz, Head of Innovation In Security, BBVA
SOCIAL MEDIA ROUND TABLE Moderator: Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva
NEW THREATS ROUND TABLE Moderator: Peter Warren, Chairman, Cyber Security Research Institute
INSIDER THREAT ROUND TABLEModerator: Keith Awcock, Head of IS Security & BC/DR, RSA Group
Additional Moderator: Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment
“Provides a good opportunity to connect with peers and colleagues from industry and learn from their
experience on a similar journey.”
❱❱ Combat cyber security - Identify global trends in cyber security and learn how to prepare for future threats
❱❱ rethink risk and regulation - Learn how to build an integrated governance, risk and compliance structure- streamlining your IT, finance, operations, and legal departments
❱❱ New frontiers in cloud - Hear proven case studies on how to securely and cost effectively adopt cloud to reduce information leakage risks
❱❱ Dissect data protection - Define a best practice data protection roadmap to protect your data from internal and external threats
❱❱ future technology - Get insight on new technologies transforming information security in financial services in the next 10 years
❱❱ Cost efficient IT compliance - Define critical success factors to deliver compliance IT projects cost efficiently
❱❱ Peer to peer networking - Network with and learn from the experience of 150+ information security leaders in financial services
❱❱ Solutions zone - Meet with recommended solution providers in one place to accelerate your vendor selection process
❱❱ Interactive Q&A - Get your most pressing questions answered by experts who have first hand experience in implementing key information security projects
❱❱ Social events - Create a personal connection with your peers and providers in a social context over breakfast, coffee, lunch and drinks
❱❱ Drill-down roundtables - We profile and group our delegates to ensure you meet with like minded peers to drill down details of similar issues on expert led roundtables led by an expert
❱❱ Synergy workshops - Join a classroom session with 25 information security leaders to turn theory around, using big data to build an intelligence-driven security strategy into practice
CUTTING-EDGE CONTENTTO ADDRESS YOUR TOP CHALLENGES
UN-MATCHED NETWORKING TO ENSURE YOU MEET THE RIGHT PEOPLE
Why Attending Information Security FS 2014 Delivers A Valuable ROI
Key Benefits
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
TEAMBRING A
Information Security Director
Managing Director
EMEA Head of Security Engineering and Delivery
Business Information Security Officer
With so much content and two parallel tracks each afternoon, make sure you
bring the right people in your teams to reap the full benefits of the agenda. Below are examples of the teams that other financial
companies sent to ISFS last year:
The only industry gathering of everyone in financial services information security
Who Attends
n CISO ................................................. 20%
n Head of Information Security ............ 17%
n Head of Information Risk and Compliance ............................... 12%
n Head of IAM ...................................... 11%
n Head of Cyber Security .................... 10%
n Head of Network Security ................... 8%
n UK ..................................................... 65%
n Europe (excluding UK) ..................... 30%
n US ....................................................... 5%
n Banks ................................................ 50%
n Assest Management ........................ 20%
n ExchangesandVenues .................... 15%
n Hedge Funds ...................................... 5%
n Insurance ............................................ 5%
n Insurance Companies ........................ 5%
jOB TITLE
REGION
INDUSTRY
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
Information Security Risk Manager
Head of Technology Risk Management EMEA
Head of Global Identity and Access Management
Head of Central Technology Risk Management
Chief Information Security Officer
Architect Security Infrastructure Leader
Information Risk Senior Vice President
Head of Identity and Access Management
IT Risk Controller
Co-head of Security
Global Head of Information Risk
Chief Technology Officer
Head of Information Security Strategy
Chief Information Security Officer
Information Technology Security Specialist
Divisional Information Security Officer
Ab
08.00 Registration and Breakfast
08.45 Chair’s opening remarks Dennis Dickstein, Chief Privacy and Information Security
Officer, UBS Wealth Management
COMBATING CYBER SECURITY
09.00 OPENING KEYNOTE Rethinking security in the new hyper-connected cyber world: How to prepare your business for future threats » Identifying global trends in the cyber security: Implications for your strategy
» How you can prepare for future threats and avoid increasing corporate financial and reputational damage
» Learn from the experiences of financial industry thought leaders to discover how to address key challenges in the new era of cyber threats
» Gain best practice advice on the main industry challenges, such as risk and compliance, DLP, data protection, BYOD, mobility and many more
Don Randall, CISO, Bank of England
09.20 ALL STAR PANEL What are the components required for a resilient information security strategy? Hear more about the Cyber-Ex 2014 - the largest cyberexercise in Europe for the Private Sector » Cyberexercise: Learning how to be resilient.
» Collaboration between public and private sectors: How can you stay on top of the emerging threats and make sure your strategy is aligned?
» How can you fulfil new regulatory requirements and establish a secure business environment?
» Financial services have become more global, more mobile, and more cloud based: What do these trends mean for your information security and risk strategy?
» What are the future threats likely to transform your information risk management strategy?
Moderator: Gianluca D’Antonio, Chief Information Security Officer, FCC Group, Member of PSG European Network and Information Security Agency (ENISA)
Carles Solé, Chief Information Security Officer, CaixaBank
Fernando De La Mata, Head of InfoSec Engineering and CISO I&T - ITRF&S, BBVA
Daniel Lagarcha, Head of Global Control Center CERT, Mapfre
10.00 The New Normal of Enterprise Security : How to implement an orchestrated defense to stop recent attacksSecurity processes and tools only matter if they are used in full and with other technology in the enterprise. In isolation, each generates a number of high severity alerts, creating an environment where critical issues are considered “normal” events. We will discuss the need for context, analytics and an orchestrated defense to stop recent attacks.
In this session Michael Sentonas will discuss the need for context, analytics and an orchestrated defence to deal with every attack with a focus on:
» Learning how to facilitate instrumentation for faster breach notification
» Real life examples on how an orchestrated defence and response can be achieved
» Technical strategies to lessen the effects of these attacks
» Explain and demonstrate how a solution approach is critical
McAfee is now part of Intel Security.
Michael Sentonas, VP & Global Technology Officer, McAfee
10.20 Morning networking break
RETHINKING RISK AND REGULATION
11.00 GOVERNMENT KEYNOTE Regulation and legislation around data protection: Latest update on the direction it’s taking to help you move towards compliance » Learn about the latest update on the regulation and legislation developments in the UK
and Europe and how can you ensure you are compliant
» Navigating data protection and compliance issues by adopting cloud
» Multiple geographical jurisdictions: New tactics and strategies to ensure global compliance in finance services
» Understanding the impact of the new European Cyber Security Strategy and identifying existing industry coordination mechanisms in the event of a major cyber attack
Jakub Boratyński, Head of Unit Trust and Security in DG Connect, European Commission
11:20 The new personal data regulation: General Data Protection Regulation » Gain knowledge about the regulation’s content and implications (for financial
institutions dealing with private customers)
» Understanding the key challenges in the proposed regulation?
» Can you cloud partner pay fees of 5% of your company’s global turnover? Strengthen your sourcing process to avoid incompliances.
» What do you need to prepare to comply with the regulation?
Jacqueline Johnson, Head of IT Security, Nordea
11.40 REGULATION PANEL DISCUSSION Preparing for the new regulation and understanding the impact on Financial Services Organisations » Understanding and mapping the regulation changing landscape for financial institutions
» Identifying areas of improvement driven by new technology and benchmarking opportunities to achieve cyber readiness
» Strengthen cooperation and coordination between key stakeholders in the private and public sectors
» How to respond effectively to new regulations and evolving business risks to achieve continuous compliance
Moderator: Jonathan Bamford, Head of Strategic Liaison, Information Commissioner’s Office
Jacqueline Johnson, Head of IT Security, Nordea
Darren Remblence, Senior Manager, Information Security, PayPal
Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission
Main Conference Day 1 - 18 November 2014
Day 1
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
Main Conference Day 1 - 18 November 2014
Day 1
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
BEST STRATEGIES TO PROTECT YOUR ENTERPRISE
12.25 ALL STAR PANEL Examining the various scenarios of being attacked: How should you respond? Let’s pretend we all have been attacked. Now let’s discuss what we would have done. Each panellists will come up with a strategy to answer:
» What are the best strategies to protect your enterprise?
» What could have been done to prevent the attack?
» How do we pass the information within the community?
» What technology to use to prevent the attack?
Q&A Audience: Best question will get a prize. Audience will get to pick the best strategy.
Moderator: Iain Sutherland, Managing Director, Information Security Solutions
Kevin Williams, NCCU Head of Partnership Engagement, National Crime Agency
Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
Philip Harrison, CISO International/Europe, GE Capital
Guy Bunker, CTO, Clearswift
13.10 Networking lunch break
CHOOSE YOUR TRACK 4A, 4B
4 TRACK A CISO STRATEGIES
Chairman: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
14.10 Doing more with less: How to reduce costs and maximise benefits from existing projects and technologies » Managing your information security on a budget: Keeping up with emerging cost
efficient smart technologies
» Identifying and evaluating your priorities to balance spend and risk » How to ensure you optimise your existing systems » Evaluating your risks and setting up the right goals
Veronique Uzan, Head of Front Office Information Systems, Amundi Asset Management
14.30 The changing role of the CISO » The increasingly important role of information security and the CISO » Speaking board members language: Measuring the value by using analytics and KPIs » Assessing the implication on the specific job profile - which key skills are needed » Recruiting and staff selection for your IS teams to prepare your organisation for the new
reality
Paul Swarbrick, European CSO of the Year 2014
14.50 How to present Risk to the Board level management: key takeaways from Visa » Finding the right balance between business needs, risk and security » Speaking board members’ language: understanding the goals and showing the value to
the business » Security assessment for risk management
Jeremiah Kung, Senior Director - IT Risk Management, Visa
4 TRACK B EXPLOITING CLOUD,
MOBILE AND SOCIAL MEDIAChairman: Dave Clemente, Senior Research Analyst, ISF
14.10 Uncovering real examples in adopting cloud computing to cost efficiently reduce risks » Examining opportunities in adopting cloud security in your enterprise » Cloud and mobile security: Identifying the gaps and industry initiatives available today » Exploring brokering clouds: Uncovering real examples and solutions that can be
implemented in your enterprise » New frontiers in identity & access management in the cloud: How can you reduce your
enterprise security risks and costs
Keith Awcock Head of IS Security & BC/DR, RSA Group
14.30 Do the benefits of cloud computing outweigh the risks? » Can cloud computing be implemented fluently and successfully across your enterprise? » Will we ever reach full security and privacy in the cloud? » Will limited control and flexibility outweigh the benefits of having more convenience
and continuous availability? » Is increased vulnerability the barrier to successful cloud computing?
Moderator: Dave Clemente, Senior Research Analyst, ISF
Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society
15.30 Networking break
Main Conference Day 1 - 18 November 2014
Day 1
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
CHOOSE YOUR TRACK 4A, 4B
4 TRACK A CISO STRATEGIES
16.00 How to be successful in running a security function, run it like your own consulting businessSharing experiences of getting first leadership role to build, run and manage a security function » Outlining the number of areas where security functions either miss out or don’t do
enough » How we can be more successful in running and managing an information security
function » Is the only way if “We Run Security Function As Our Own Consulting Business”
Jitender Arora, Information Security & Risk Executive,
16.20 ALL STAR PANEL What are the skillsets required to respond to future threats to create a secure working environment? » Achieving security on employee-owned and corporate devices: How to decide who gets
access to what data? » Monitoring Bring Your Own Device: What employers need to know and how you can
monitor employers enforcing these policies » What formal training can you put in place to prepare your employees for future threats? » Will the skill set of information security professionals have to radically change in the
next 5-10 years?
Moderator: Jitender Arora, Information Security & Risk Executive,
Roberto Baratta Martinez Director of Loss Prevention, Business Continuity and Security en ABANCA
Jeremiah Kung, Senior Director - IT Risk Management, Visa
Paul Swarbrick, European CSO of the Year 2014
4 TRACK B REVISING YOUR TECHNOLOGY ROADMAP
16.00 Drill-Down Roundtables on cloud, mobile and social media strategy and technology
CLOUD ROUND TABLE: Putting your services into the cloud: Are data centres still the best to deliver your services?
Moderator: Luis Saiz, Head of Innovation In Security, BBVA
SOCIAL MEDIA ROUND TABLE: Establishing new social engineering strategies: How to exploit social media benefits and overcome potential new threats
Moderator: Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva
NEW THREATS ROUND TABLE: It’s easier to protect your organisation today if you can anticipate what’s coming tomorrow – what are the best ways of staying up-to-date with the fast developing threat horizon?
Moderator: Peter Warren, Chairman, Cyber Security Research Institute
INSIDER THREAT ROUND TABLE: Implementing a holistic approach and building a programme to protect your enterprise from the insider threat
Moderator: Keith Awcock, Head of IS Security & BC/DR, RSA Group
Additional Moderator: Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment
17.00 Networking Drinks Reception
ENGAGE
ENGAGE
08.30 Registration and breakfast
09.00 Chair’s opening remarks Dennis Dickstein, Chief Privacy and Information
Security Officer, UBS Wealth Management
DISSECTING DATA PROTECTION
09.15 KEYNOTE Reimagining techniques to prevent and protect your enterprise data against different types of cyber attacks » Redefining the ever expanding threat landscape in financial services: how you can
increase cybercrime detection rates
» Exploring motivation driving cyber crime: How you can use this insight to anticipate future cyber attacks
» How to cost efficiently fight cyber crime threats
» Developing a threat assessment process and architecture that protects your enterprise data
Cal Waits, Director - Cyber, Citi
09.45 ALL STAR PANEL Rethinking the insider threat in a new digital era: What risks does this new reality bring to your enterprise? » New dimensions of internal threats: what are the main motivations of employee
misconduct?
» Monitoring employers, contractors and partners: what is your strategy for detecting who is a potential insider threat?
» Defining a holistic approach: which technologies should you use to protect your enterprise from the insider threat?
» What are the challenges and trends specific to the insider threat problem from multiple viewpoints, such as information technology, behavioural sciences, or criminology?
Moderator: Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society
Michael Colao, Head of UK Security, Axa Group
Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment
Martin Smith MBE FSyl, Chairman and Founder of both The Security Company (International) and The Security Awareness Special Interest Group
Darren Remblence, Senior Manager, Information Security, PayPal
10.40 Morning networking break
COST EFFICIENT IT COMPLIANCE
11.10 Using risk management methodology to improve security capability
» Setting and working towards risk appetite
» Using a management framework
» Working with the second line to achieve your objectives
Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
11.40 How to increase profits by working on IT compliance: ensuring your business remains ahead of requirements » Sharing lessons learned in implementing IT compliance in complex international
environments
» Our success formula explained: detailing the COBIT standard with some smart additions
» Ensuring the business remains compliant internally as well as externally through outsource providers
» Delivering compliance in a cost effective manner: critical success factors for successful implementation
» Going beyond just satisfying regulators and achieving real benefits for the business
Ronald Rietveld, Head of Information Security Risk Management – International, ABN AMRO Bank N.V
THE FUTURE OF TECHNOLOGY
12.00 How to guard your client and corporate data in the new era of advanced technology » Building a data protection and DLP roadmap to overcome business risks
» Efficient DLP tools to tackle data breaches and network intrusion
» Overcome data protection risks when moving data to the cloud: implementing effective controls and performance systems within your enterprise
» Navigating quick ways to recover and manage data loss policies across endpoints, mobile devices, and network and storage systems
Michael Colao, Head of UK Security, Axa Group
12.20 Leveraging security to develop new digital banking models » Brief review of the IT Risk, Fraud and Security role in the past years
» Digital Bank: A new paradigm where security will be the foundation of customer relationship models
» Obstacles in the journey: reinventing part of the security job description and coping with the “best-practice” models
» Opportunities and Strategies; security as part of the business
Luis Saiz, Head Of Innovation In Security, BBVA
12.50 Networking lunch break
Main Conference Day 2 - 19 November 2014
Day 2
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
Main Conference Day 2 - 19 November 2014
Day 2
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
CHOOSE YOUR TRACK 4A, 4B
4 TRACK A CISO STRATEGIES
Chairman: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
14.10 LIVE EXERCISE Exploring the mind of the attacker: how to manage and prevent a range of cyber attacks whilst considering the intentions and mind-set of hackers » What are the motivations driving cyber crime? » What are the best practice tips to effectively address the cyber attacks and more
importantly prevent them? » How to think ahead of hacktivists, members of organised crime syndicates » How to think like a cyber attacker to make your security defence stronger
Keith Awcock Head of IS Security & BC/DR, RSA Group
Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Asset Management
Paul Swarbrick, European CSO of the Year 2014
4 TRACK B IMPLEMENTING IDENTITY AND
ACCESS MANAGEMENT
14.10 Identity Centric Business Processes: IAM in merge/split scenariosChange has become the new normal into the financial sector, with mergers and splits being a key concern for modern banks. An identity governance plan, not only technology and processes but also people and governance, could drive those changes in a cost and time effective project where technology supports decisions and promotes dynamism. Merging and splitting challenges involve more than provisioning, role management and workflows; it requires business support aligning the project scope with corporate objectives while keeping efficiency, compliance and operations. Roberto Martinez will lead this exciting presentation featuring an ABANCA case study covering the last four years.
Roberto Baratta Martinez Director of Loss Prevention, Business Continuity and Security en ABANCA
15.00 Afternoon networking break
THE FUTURE OF INFORMATION SECURITY IN FINANCE
15.30 ALL STAR PANEL How will information security in finance evolve in 5-10 years? » Rethinking the increasingly important role of information security: how can you be the
first to navigate this change?
» How will the skill set of the CISO have to evolve in light of these changes?
» What are the critical success factors required to gain customer trust and effectively build new business profit channels?
» How can you avoid increasing corporate financial and reputational damage?
Moderator: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management
Jeremiah Kung, Senior Director - IT Risk Management, Visa
Luis Saiz, Head Of Innovation In Security, BBVA
John Colley, Managing Director EMEA, (ISC)2
16.30 End of the ISFS 2014 Conference
ENGAGE
A FINANCIAL HUBNot only is London a major financial centre, but a diverse and exciting city with some of the world’s best sights and attractions. Gathering in London’s West End means there is no doubt you will find plenty to do with the range of exclusiveshops,restaurants,hotelsandbar.VisiticonicBritish attractions such as nearby Buckingham Palace or SelfridgesonOxfordStreet.HeadtoLeicesterSquaretofeed your cultural side with a visit.
AN IDEAL VENUEReside in style at the luxury Radisson Blu Portman Hotel in the fashionable West End. The Portman Hotel provides comfortably elegant conference facilities, perfect for enjoying the agenda sessions and networking breaks. The hotel is locatedintheheartofLondonnearOxfordStreetaswellasthe major attractions of Hyde Park and Buckingham Palace.
The Perfect Location To Mix Business With Pleasure
Venue
EVENING DRINKS As part of the formal conferenceschedule, you’re invited to join usfor the cocktail drinks reception on the evening of day one, November 18th. Wind down with industry leaders to make new contacts and reconnect with your peers.
Venue Details:radisson Blu Portman Hotel,22 Portman SquareLondonW1H 7BG +44 (0) 207 2086000
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
FLOORPLAN
Keep your brand front of mind to ensure you make the shortlist when information security professionals are evaluating solution providers
Maximise your sales teams’ time by accessing the most senior information security decision makers in one place
Gain market and competitive insights to help tailor your information security offering
Showcase your solution and run product demos to drive demand
Generate qualified leads and follow up with meetings over the two days
AS A TRUSTED PARTNER…
Gianluca D’Antonio, Chief Information Security Officer, fCC Group, Member of PSG European Network and Information Security Agency (ENISA)
“Information Security FS is the place where peers’ experiences become knowledge for the information security community. It’s the best way to understand where we are going and how we have to prepare ourselves for this journey.”
Contact [email protected]
or + 44 207 368 9583
Industry-wide exposure to clients and key prospects
Why Sponsor
Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465
4 Bespoke Booth Space and Networking Areas to Suit Your Needs
4 Private Meeting rooms Nearby to Host Key Clients
4 No Hidden Charges