defining how to implement a resilient information security

13
Paul Swarbrick, European CSO of the Year 2014 Dennis Dickstein, CISO, UBS Wealth Management Sponsors: Jacqueline Johnson, Head of IT Security, Nordea Bank Michael Colao, Head of UK Security, Axa Group Don Randall, CISO, Bank of England Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission Carles Solé, Chief Information Security Officer, CaixaBank Jeremiah Kung, Senior Director - IT Risk Management, Visa 18 - 19 November, 2014 Radisson Blu Portman Hotel, London Defining How To Implement A Resilient Information Security Strategy LEARN FROM: Information Security Strategy Discover the components required to implement a resilient information security strategy Governance, Risk & Compliance Learn how to build an integrated governance, risk and compliance structure Identity Access Management Ensure your IAM strategy is aligned to your business strategy and existing systems Cloud, Mobile and Social Media Improve your cloud, mobile and social media strategy to ensure your information is secure Early-Bird Discounts Available – Register Now! www.informationsecurityFS.com [email protected] +44 (0) 207 368 9465 Visit infosec.wbresearch.com to obtain your discount McAfee is now part of Intel Security.

Upload: others

Post on 24-Oct-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Defining How To Implement A Resilient Information Security

Paul Swarbrick, European CSO of the Year 2014

Dennis Dickstein, CISO, UBS Wealth Management

Sponsors:

Jacqueline Johnson, Head of IT Security, Nordea Bank

Michael Colao, Head of UK Security, Axa Group

Don Randall, CISO, Bank of England

Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission

Carles Solé, Chief Information Security Officer, CaixaBank

Jeremiah Kung, Senior Director - IT Risk Management, Visa

18 - 19 November, 2014 Radisson Blu Portman Hotel, London

Defining How To Implement A Resilient Information Security Strategy

LEArN froM:

Information Security StrategyDiscover the components required to

implement a resilient information security strategy

Governance, Risk & Compliance

Learn how to build an integrated governance, risk and compliance structure

Identity Access ManagementEnsure your IAM strategy is aligned to your

business strategy and existing systems

Cloud, Mobile and Social Media

Improve your cloud, mobile and social media strategy to ensure your information

is secure

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Visit

infos

ec.w

bres

earc

h.co

m

to obt

ain yo

ur disc

ount

McAfee is now part of Intel Security.

Page 2: Defining How To Implement A Resilient Information Security

Don Randall, CISO, Bank of England

Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission

Jacqueline Johnson, Head of IT Security, Nordea Bank

Carles Solé, Chief Information Security Officer, CaixaBank

BANKS & BUILDING SOCIETIES

Fernando De La Mata, Head of InfoSec Engineering and CISO I&T - ITRF&S, BBVA

Luis Saiz, Head Of Innovation In Security, BBVA

Roberto Baratta Martinez, Director of Loss Prevention, Business Continuity and Security, ABANCA

Ronald Rietveld, Head of Information Security Risk Management – International, ABN AMro Bank N.V

Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society

Jacqueline Johnson, Head of IT Security, Nordea Bank

Cal Waits, Director - Cyber, CITI

Philip Harrison, GE Capital

ASSET MANAGEMENT

Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

Veronique Uzan, Head of Front Office Information Systems, Amundi Asset Management

Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment

INSURANCE

Michael Colao, Head of UK Security, Axa Group

Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva

Keith Awcock Head of IS Security & BC/DR, rSA Group

Daniel Lagarcha, Head of Global Control Center CERT, Mapfre

PAYMENT SERVICES

Jeremiah Kung, Senior Director - IT Risk Management, Visa

Darren Remblence, Senior Manager, Information Security, Paypal

INFORMATION SECURITY EXPERTS

Jitender Arora, Information Security & Risk Executive,

John Colley, Managing Director EMEA, (ISC)2

Iain Sutherland, Managing Director, Information Security Solutions

Peter Warren, Chairman, Cyber Security research Institute

Martin Smith MBE FSyI, Chairman and Founder of both The Security Company (International) and The Security Awareness Special Interest Group

Michael Sentonas, VP + Global CTO, McAfee

Paul Swarbrick, European CSO of the Year 2014

Guy Bunker, CTO, Clearswift

Dave Clemente, Senior Research Analyst, ISf

REGULATION

Jonathan Bamford, Head of Strategic Liaison, Information Commissioner’s office

Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission

GUEST SPEAKERS

Gianluca D’Antonio, Chief Information Security Officer, FCC Group, Member of PSG European Network and Information Security Agency (ENISA)

Kevin Williams, NCCU Head of Partnership Engagement, National Crime Agency

KEYNOTES

Learn from 35+ thought leaders including:

Speakers

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Page 3: Defining How To Implement A Resilient Information Security

An agenda designed for the industry by the industry

Advisory Board

Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment

Iain Sutherland, Managing Director, Information Security Solutions

Gianluca D’Antonio, Chief Information Security Officer, fCC Group, Member of PSG European Network and Information Security Agency (ENISA)

Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Dear Colleagues,

As financial services brace for increased threats, there is no doubt that our

roles as information security professionals are becoming more important in

protecting our businesses. By 2018 there is an expected spend increase

of 22% on risk information technologies by the industry, amounting to a

staggering $97.3 billion in expenditure. To help the industry juggle these

complex projects across compliance, internal controls, credit risk and cyber

security, we, the 2014 advisory board have designed this solution focused

agenda to address our biggest information security challenges.

This makes Information Security FS the only conference dedicated to the

financial services industry - offering you a focused learning and networking

platform.

With 150+ financial services information security leaders in one place, this

conference will be incremental in driving our industry towards information

security best practice to stay ahead of tomorrow’s threats.

Key agenda highlights include:

• DonRandall,CISOatBankofEnglandwillpresentonrethinkingsecurityin

the new hyper-connected cyber world - how to prepare your business for

future threats

• CalWaits,Director-CyberatCitiwillspeakonreimaginingtechniquesto

prevent and protect your enterprise data against different types of cyber

attacks

• RonaldRietveld,HeadofInformationSecurityRiskManagement–

InternationalatABNAMROBankN.Vwilloutlinehowtoincreaseprofitsby

working on IT compliance

Do not miss the only information security conference specifically for financial

services.

We look forward to welcoming you to the conference in November.

Best Regards,

Information Security FS 2014 Advisory Board

Page 4: Defining How To Implement A Resilient Information Security

Jitender Arora, Information Security & Risk Expert

Innovative formats that deliver a captivating, interactive experience

Engage

fully engage with the most contentious and divisive issues currently facing your industry. Sit back and witness industry-leading figures pitting themselves against each other in a battle to deliver the knockout argument. Then, continue the debate in your own small roundtable groups until you reach a majority viewpoint. Will you reconsider your position? And will you walk away with a fresh mind-set and better prepared to take on this key conundrum?

These informal subject-specific roundtables give you a unique opportunity to drill down into the details of an issue that is really important to you by probing the knowledge and expertise of industry market leaders. Each roundtable is limited to 10 people for maximum interaction and is designed for you to meet like-minded peers and source practical solutions collaboratively. An exceptional way to genuinely get to grips with your key challenges.

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

DAY 1 - TRACK B EXPLOITING CLOUD, MOBILE AND SOCIAL MEDIA

Do the benefits of cloud computing outweigh the risks? » Can cloud computing be implemented fluently and successfully across your enterprise? » Will we ever reach full security and privacy in the cloud? » Will limited control and flexibility outweigh the benefits of having more convenience and

continuous availability? » Is increased vulnerability the barrier to successful cloud computing?

Moderator: Dave Clemente, Senior Research Analyst, ISF

Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society

DAY 1 - TRACK B REVISING YOUR TECHNOLOGY ROADMAP

Drill-Down Roundtables on cloud, mobile and social media strategy and technology

CLOUD ROUND TABLE Moderator: Luis Saiz, Head of Innovation In Security, BBVA

SOCIAL MEDIA ROUND TABLE Moderator: Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva

NEW THREATS ROUND TABLE Moderator: Peter Warren, Chairman, Cyber Security Research Institute

INSIDER THREAT ROUND TABLEModerator: Keith Awcock, Head of IS Security & BC/DR, RSA Group

Additional Moderator: Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment

“Provides a good opportunity to connect with peers and colleagues from industry and learn from their

experience on a similar journey.”

Page 5: Defining How To Implement A Resilient Information Security

❱❱ Combat cyber security - Identify global trends in cyber security and learn how to prepare for future threats

❱❱ rethink risk and regulation - Learn how to build an integrated governance, risk and compliance structure- streamlining your IT, finance, operations, and legal departments

❱❱ New frontiers in cloud - Hear proven case studies on how to securely and cost effectively adopt cloud to reduce information leakage risks

❱❱ Dissect data protection - Define a best practice data protection roadmap to protect your data from internal and external threats

❱❱ future technology - Get insight on new technologies transforming information security in financial services in the next 10 years

❱❱ Cost efficient IT compliance - Define critical success factors to deliver compliance IT projects cost efficiently

❱❱ Peer to peer networking - Network with and learn from the experience of 150+ information security leaders in financial services

❱❱ Solutions zone - Meet with recommended solution providers in one place to accelerate your vendor selection process

❱❱ Interactive Q&A - Get your most pressing questions answered by experts who have first hand experience in implementing key information security projects

❱❱ Social events - Create a personal connection with your peers and providers in a social context over breakfast, coffee, lunch and drinks

❱❱ Drill-down roundtables - We profile and group our delegates to ensure you meet with like minded peers to drill down details of similar issues on expert led roundtables led by an expert

❱❱ Synergy workshops - Join a classroom session with 25 information security leaders to turn theory around, using big data to build an intelligence-driven security strategy into practice

CUTTING-EDGE CONTENTTO ADDRESS YOUR TOP CHALLENGES

UN-MATCHED NETWORKING TO ENSURE YOU MEET THE RIGHT PEOPLE

Why Attending Information Security FS 2014 Delivers A Valuable ROI

Key Benefits

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Page 6: Defining How To Implement A Resilient Information Security

TEAMBRING A

Information Security Director

Managing Director

EMEA Head of Security Engineering and Delivery

Business Information Security Officer

With so much content and two parallel tracks each afternoon, make sure you

bring the right people in your teams to reap the full benefits of the agenda. Below are examples of the teams that other financial

companies sent to ISFS last year:

The only industry gathering of everyone in financial services information security

Who Attends

n CISO ................................................. 20%

n Head of Information Security ............ 17%

n Head of Information Risk and Compliance ............................... 12%

n Head of IAM ...................................... 11%

n Head of Cyber Security .................... 10%

n Head of Network Security ................... 8%

n UK ..................................................... 65%

n Europe (excluding UK) ..................... 30%

n US ....................................................... 5%

n Banks ................................................ 50%

n Assest Management ........................ 20%

n ExchangesandVenues .................... 15%

n Hedge Funds ...................................... 5%

n Insurance ............................................ 5%

n Insurance Companies ........................ 5%

jOB TITLE

REGION

INDUSTRY

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Information Security Risk Manager

Head of Technology Risk Management EMEA

Head of Global Identity and Access Management

Head of Central Technology Risk Management

Chief Information Security Officer

Architect Security Infrastructure Leader

Information Risk Senior Vice President

Head of Identity and Access Management

IT Risk Controller

Co-head of Security

Global Head of Information Risk

Chief Technology Officer

Head of Information Security Strategy

Chief Information Security Officer

Information Technology Security Specialist

Divisional Information Security Officer

Ab

Page 7: Defining How To Implement A Resilient Information Security

08.00 Registration and Breakfast

08.45 Chair’s opening remarks Dennis Dickstein, Chief Privacy and Information Security

Officer, UBS Wealth Management

COMBATING CYBER SECURITY

09.00 OPENING KEYNOTE Rethinking security in the new hyper-connected cyber world: How to prepare your business for future threats » Identifying global trends in the cyber security: Implications for your strategy

» How you can prepare for future threats and avoid increasing corporate financial and reputational damage

» Learn from the experiences of financial industry thought leaders to discover how to address key challenges in the new era of cyber threats

» Gain best practice advice on the main industry challenges, such as risk and compliance, DLP, data protection, BYOD, mobility and many more

Don Randall, CISO, Bank of England

09.20 ALL STAR PANEL What are the components required for a resilient information security strategy? Hear more about the Cyber-Ex 2014 - the largest cyberexercise in Europe for the Private Sector » Cyberexercise: Learning how to be resilient.

» Collaboration between public and private sectors: How can you stay on top of the emerging threats and make sure your strategy is aligned?

» How can you fulfil new regulatory requirements and establish a secure business environment?

» Financial services have become more global, more mobile, and more cloud based: What do these trends mean for your information security and risk strategy?

» What are the future threats likely to transform your information risk management strategy?

Moderator: Gianluca D’Antonio, Chief Information Security Officer, FCC Group, Member of PSG European Network and Information Security Agency (ENISA)

Carles Solé, Chief Information Security Officer, CaixaBank

Fernando De La Mata, Head of InfoSec Engineering and CISO I&T - ITRF&S, BBVA

Daniel Lagarcha, Head of Global Control Center CERT, Mapfre

10.00 The New Normal of Enterprise Security : How to implement an orchestrated defense to stop recent attacksSecurity processes and tools only matter if they are used in full and with other technology in the enterprise. In isolation, each generates a number of high severity alerts, creating an environment where critical issues are considered “normal” events. We will discuss the need for context, analytics and an orchestrated defense to stop recent attacks.

In this session Michael Sentonas will discuss the need for context, analytics and an orchestrated defence to deal with every attack with a focus on:

» Learning how to facilitate instrumentation for faster breach notification

» Real life examples on how an orchestrated defence and response can be achieved

» Technical strategies to lessen the effects of these attacks

» Explain and demonstrate how a solution approach is critical

McAfee is now part of Intel Security.

Michael Sentonas, VP & Global Technology Officer, McAfee

10.20 Morning networking break

RETHINKING RISK AND REGULATION

11.00 GOVERNMENT KEYNOTE Regulation and legislation around data protection: Latest update on the direction it’s taking to help you move towards compliance » Learn about the latest update on the regulation and legislation developments in the UK

and Europe and how can you ensure you are compliant

» Navigating data protection and compliance issues by adopting cloud

» Multiple geographical jurisdictions: New tactics and strategies to ensure global compliance in finance services

» Understanding the impact of the new European Cyber Security Strategy and identifying existing industry coordination mechanisms in the event of a major cyber attack

Jakub Boratyński, Head of Unit Trust and Security in DG Connect, European Commission

11:20 The new personal data regulation: General Data Protection Regulation » Gain knowledge about the regulation’s content and implications (for financial

institutions dealing with private customers)

» Understanding the key challenges in the proposed regulation?

» Can you cloud partner pay fees of 5% of your company’s global turnover? Strengthen your sourcing process to avoid incompliances.

» What do you need to prepare to comply with the regulation?

Jacqueline Johnson, Head of IT Security, Nordea

11.40 REGULATION PANEL DISCUSSION Preparing for the new regulation and understanding the impact on Financial Services Organisations » Understanding and mapping the regulation changing landscape for financial institutions

» Identifying areas of improvement driven by new technology and benchmarking opportunities to achieve cyber readiness

» Strengthen cooperation and coordination between key stakeholders in the private and public sectors

» How to respond effectively to new regulations and evolving business risks to achieve continuous compliance

Moderator: Jonathan Bamford, Head of Strategic Liaison, Information Commissioner’s Office

Jacqueline Johnson, Head of IT Security, Nordea

Darren Remblence, Senior Manager, Information Security, PayPal

Jakub Boratyński, Head of Unit Trust and Security in DG CONNECT, European Commission

Main Conference Day 1 - 18 November 2014

Day 1

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Page 8: Defining How To Implement A Resilient Information Security

Main Conference Day 1 - 18 November 2014

Day 1

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

BEST STRATEGIES TO PROTECT YOUR ENTERPRISE

12.25 ALL STAR PANEL Examining the various scenarios of being attacked: How should you respond? Let’s pretend we all have been attacked. Now let’s discuss what we would have done. Each panellists will come up with a strategy to answer:

» What are the best strategies to protect your enterprise?

» What could have been done to prevent the attack?

» How do we pass the information within the community?

» What technology to use to prevent the attack?

Q&A Audience: Best question will get a prize. Audience will get to pick the best strategy.

Moderator: Iain Sutherland, Managing Director, Information Security Solutions

Kevin Williams, NCCU Head of Partnership Engagement, National Crime Agency

Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

Philip Harrison, CISO International/Europe, GE Capital

Guy Bunker, CTO, Clearswift

13.10 Networking lunch break

CHOOSE YOUR TRACK 4A, 4B

4 TRACK A CISO STRATEGIES

Chairman: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

14.10 Doing more with less: How to reduce costs and maximise benefits from existing projects and technologies » Managing your information security on a budget: Keeping up with emerging cost

efficient smart technologies

» Identifying and evaluating your priorities to balance spend and risk » How to ensure you optimise your existing systems » Evaluating your risks and setting up the right goals

Veronique Uzan, Head of Front Office Information Systems, Amundi Asset Management

14.30 The changing role of the CISO » The increasingly important role of information security and the CISO » Speaking board members language: Measuring the value by using analytics and KPIs » Assessing the implication on the specific job profile - which key skills are needed » Recruiting and staff selection for your IS teams to prepare your organisation for the new

reality

Paul Swarbrick, European CSO of the Year 2014

14.50 How to present Risk to the Board level management: key takeaways from Visa » Finding the right balance between business needs, risk and security » Speaking board members’ language: understanding the goals and showing the value to

the business » Security assessment for risk management

Jeremiah Kung, Senior Director - IT Risk Management, Visa

4 TRACK B EXPLOITING CLOUD,

MOBILE AND SOCIAL MEDIAChairman: Dave Clemente, Senior Research Analyst, ISF

14.10 Uncovering real examples in adopting cloud computing to cost efficiently reduce risks » Examining opportunities in adopting cloud security in your enterprise » Cloud and mobile security: Identifying the gaps and industry initiatives available today » Exploring brokering clouds: Uncovering real examples and solutions that can be

implemented in your enterprise » New frontiers in identity & access management in the cloud: How can you reduce your

enterprise security risks and costs

Keith Awcock Head of IS Security & BC/DR, RSA Group

14.30 Do the benefits of cloud computing outweigh the risks? » Can cloud computing be implemented fluently and successfully across your enterprise? » Will we ever reach full security and privacy in the cloud? » Will limited control and flexibility outweigh the benefits of having more convenience

and continuous availability? » Is increased vulnerability the barrier to successful cloud computing?

Moderator: Dave Clemente, Senior Research Analyst, ISF

Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society

15.30 Networking break

Page 9: Defining How To Implement A Resilient Information Security

Main Conference Day 1 - 18 November 2014

Day 1

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

CHOOSE YOUR TRACK 4A, 4B

4 TRACK A CISO STRATEGIES

16.00 How to be successful in running a security function, run it like your own consulting businessSharing experiences of getting first leadership role to build, run and manage a security function » Outlining the number of areas where security functions either miss out or don’t do

enough » How we can be more successful in running and managing an information security

function » Is the only way if “We Run Security Function As Our Own Consulting Business”

Jitender Arora, Information Security & Risk Executive,

16.20 ALL STAR PANEL What are the skillsets required to respond to future threats to create a secure working environment? » Achieving security on employee-owned and corporate devices: How to decide who gets

access to what data? » Monitoring Bring Your Own Device: What employers need to know and how you can

monitor employers enforcing these policies » What formal training can you put in place to prepare your employees for future threats? » Will the skill set of information security professionals have to radically change in the

next 5-10 years?

Moderator: Jitender Arora, Information Security & Risk Executive,

Roberto Baratta Martinez Director of Loss Prevention, Business Continuity and Security en ABANCA

Jeremiah Kung, Senior Director - IT Risk Management, Visa

Paul Swarbrick, European CSO of the Year 2014

4 TRACK B REVISING YOUR TECHNOLOGY ROADMAP

16.00 Drill-Down Roundtables on cloud, mobile and social media strategy and technology

CLOUD ROUND TABLE: Putting your services into the cloud: Are data centres still the best to deliver your services?

Moderator: Luis Saiz, Head of Innovation In Security, BBVA

SOCIAL MEDIA ROUND TABLE: Establishing new social engineering strategies: How to exploit social media benefits and overcome potential new threats

Moderator: Dave Canham MIRM, Head of Operational Risk - IT & Operations, Aviva

NEW THREATS ROUND TABLE: It’s easier to protect your organisation today if you can anticipate what’s coming tomorrow – what are the best ways of staying up-to-date with the fast developing threat horizon?

Moderator: Peter Warren, Chairman, Cyber Security Research Institute

INSIDER THREAT ROUND TABLE: Implementing a holistic approach and building a programme to protect your enterprise from the insider threat

Moderator: Keith Awcock, Head of IS Security & BC/DR, RSA Group

Additional Moderator: Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment

17.00 Networking Drinks Reception

ENGAGE

ENGAGE

Page 10: Defining How To Implement A Resilient Information Security

08.30 Registration and breakfast

09.00 Chair’s opening remarks Dennis Dickstein, Chief Privacy and Information

Security Officer, UBS Wealth Management

DISSECTING DATA PROTECTION

09.15 KEYNOTE Reimagining techniques to prevent and protect your enterprise data against different types of cyber attacks » Redefining the ever expanding threat landscape in financial services: how you can

increase cybercrime detection rates

» Exploring motivation driving cyber crime: How you can use this insight to anticipate future cyber attacks

» How to cost efficiently fight cyber crime threats

» Developing a threat assessment process and architecture that protects your enterprise data

Cal Waits, Director - Cyber, Citi

09.45 ALL STAR PANEL Rethinking the insider threat in a new digital era: What risks does this new reality bring to your enterprise? » New dimensions of internal threats: what are the main motivations of employee

misconduct?

» Monitoring employers, contractors and partners: what is your strategy for detecting who is a potential insider threat?

» Defining a holistic approach: which technologies should you use to protect your enterprise from the insider threat?

» What are the challenges and trends specific to the insider threat problem from multiple viewpoints, such as information technology, behavioural sciences, or criminology?

Moderator: Mike Jolley, Head of Information Security and Risk, Yorkshire Building Society

Michael Colao, Head of UK Security, Axa Group

Debbie Saffer, Head of Information Risk & Business Continuity, Insight Investment

Martin Smith MBE FSyl, Chairman and Founder of both The Security Company (International) and The Security Awareness Special Interest Group

Darren Remblence, Senior Manager, Information Security, PayPal

10.40 Morning networking break

COST EFFICIENT IT COMPLIANCE

11.10 Using risk management methodology to improve security capability

» Setting and working towards risk appetite

» Using a management framework

» Working with the second line to achieve your objectives

Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

11.40 How to increase profits by working on IT compliance: ensuring your business remains ahead of requirements » Sharing lessons learned in implementing IT compliance in complex international

environments

» Our success formula explained: detailing the COBIT standard with some smart additions

» Ensuring the business remains compliant internally as well as externally through outsource providers

» Delivering compliance in a cost effective manner: critical success factors for successful implementation

» Going beyond just satisfying regulators and achieving real benefits for the business

Ronald Rietveld, Head of Information Security Risk Management – International, ABN AMRO Bank N.V

THE FUTURE OF TECHNOLOGY

12.00 How to guard your client and corporate data in the new era of advanced technology » Building a data protection and DLP roadmap to overcome business risks

» Efficient DLP tools to tackle data breaches and network intrusion

» Overcome data protection risks when moving data to the cloud: implementing effective controls and performance systems within your enterprise

» Navigating quick ways to recover and manage data loss policies across endpoints, mobile devices, and network and storage systems

Michael Colao, Head of UK Security, Axa Group

12.20 Leveraging security to develop new digital banking models » Brief review of the IT Risk, Fraud and Security role in the past years

» Digital Bank: A new paradigm where security will be the foundation of customer relationship models

» Obstacles in the journey: reinventing part of the security job description and coping with the “best-practice” models

» Opportunities and Strategies; security as part of the business

Luis Saiz, Head Of Innovation In Security, BBVA

12.50 Networking lunch break

Main Conference Day 2 - 19 November 2014

Day 2

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Page 11: Defining How To Implement A Resilient Information Security

Main Conference Day 2 - 19 November 2014

Day 2

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

CHOOSE YOUR TRACK 4A, 4B

4 TRACK A CISO STRATEGIES

Chairman: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

14.10 LIVE EXERCISE Exploring the mind of the attacker: how to manage and prevent a range of cyber attacks whilst considering the intentions and mind-set of hackers » What are the motivations driving cyber crime? » What are the best practice tips to effectively address the cyber attacks and more

importantly prevent them? » How to think ahead of hacktivists, members of organised crime syndicates » How to think like a cyber attacker to make your security defence stronger

Keith Awcock Head of IS Security & BC/DR, RSA Group

Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Asset Management

Paul Swarbrick, European CSO of the Year 2014

4 TRACK B IMPLEMENTING IDENTITY AND

ACCESS MANAGEMENT

14.10 Identity Centric Business Processes: IAM in merge/split scenariosChange has become the new normal into the financial sector, with mergers and splits being a key concern for modern banks. An identity governance plan, not only technology and processes but also people and governance, could drive those changes in a cost and time effective project where technology supports decisions and promotes dynamism. Merging and splitting challenges involve more than provisioning, role management and workflows; it requires business support aligning the project scope with corporate objectives while keeping efficiency, compliance and operations. Roberto Martinez will lead this exciting presentation featuring an ABANCA case study covering the last four years.

Roberto Baratta Martinez Director of Loss Prevention, Business Continuity and Security en ABANCA

15.00 Afternoon networking break

THE FUTURE OF INFORMATION SECURITY IN FINANCE

15.30 ALL STAR PANEL How will information security in finance evolve in 5-10 years? » Rethinking the increasingly important role of information security: how can you be the

first to navigate this change?

» How will the skill set of the CISO have to evolve in light of these changes?

» What are the critical success factors required to gain customer trust and effectively build new business profit channels?

» How can you avoid increasing corporate financial and reputational damage?

Moderator: Dennis Dickstein, Chief Privacy and Information Security Officer, UBS Wealth Management

Jeremiah Kung, Senior Director - IT Risk Management, Visa

Luis Saiz, Head Of Innovation In Security, BBVA

John Colley, Managing Director EMEA, (ISC)2

16.30 End of the ISFS 2014 Conference

ENGAGE

Page 12: Defining How To Implement A Resilient Information Security

A FINANCIAL HUBNot only is London a major financial centre, but a diverse and exciting city with some of the world’s best sights and attractions. Gathering in London’s West End means there is no doubt you will find plenty to do with the range of exclusiveshops,restaurants,hotelsandbar.VisiticonicBritish attractions such as nearby Buckingham Palace or SelfridgesonOxfordStreet.HeadtoLeicesterSquaretofeed your cultural side with a visit.

AN IDEAL VENUEReside in style at the luxury Radisson Blu Portman Hotel in the fashionable West End. The Portman Hotel provides comfortably elegant conference facilities, perfect for enjoying the agenda sessions and networking breaks. The hotel is locatedintheheartofLondonnearOxfordStreetaswellasthe major attractions of Hyde Park and Buckingham Palace.

The Perfect Location To Mix Business With Pleasure

Venue

EVENING DRINKS As part of the formal conferenceschedule, you’re invited to join usfor the cocktail drinks reception on the evening of day one, November 18th. Wind down with industry leaders to make new contacts and reconnect with your peers.

Venue Details:radisson Blu Portman Hotel,22 Portman SquareLondonW1H 7BG +44 (0) 207 2086000

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

Page 13: Defining How To Implement A Resilient Information Security

FLOORPLAN

Keep your brand front of mind to ensure you make the shortlist when information security professionals are evaluating solution providers

Maximise your sales teams’ time by accessing the most senior information security decision makers in one place

Gain market and competitive insights to help tailor your information security offering

Showcase your solution and run product demos to drive demand

Generate qualified leads and follow up with meetings over the two days

AS A TRUSTED PARTNER…

Gianluca D’Antonio, Chief Information Security Officer, fCC Group, Member of PSG European Network and Information Security Agency (ENISA)

“Information Security FS is the place where peers’ experiences become knowledge for the information security community. It’s the best way to understand where we are going and how we have to prepare ourselves for this journey.”

Contact [email protected]

or + 44 207 368 9583

Industry-wide exposure to clients and key prospects

Why Sponsor

Early-Bird Discounts Available – Register Now! www.informationsecurityfS.com [email protected] +44 (0) 207 368 9465

4 Bespoke Booth Space and Networking Areas to Suit Your Needs

4 Private Meeting rooms Nearby to Host Key Clients

4 No Hidden Charges