CIO/CISO Vancouver Summit

CIO/CISO Vancouver Summit
The global pandemic has changed the way we all live and work and now more than ever the IT/security department has become crucial in keeping businesses growing and employees connected. One of the unexpected, positive, changes for CIOs, CISOs and senior tech executives has been the rapid shift in digital technology to ensure businesses can stay ahead of their competitors and discover new opportunities to drive business growth whilst lowering costs, as we attempt to get back to normality.

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r


OTHER PAST CONFERENCES

IT Security Insights 2024

January 31, 2024 | Sweden

Welcome to the 8th Edition of the IT Security Insights Conference, which will bring together key stakeholders in the cybersecurity marketplace in Sweden. These key stakeholders include IT security practitioners, technology providers, start-ups, and academics, all of whom work with information security and cybersecurity matters. The purpose of this conference is to discuss current IT Security challenges faced by leading Nordic and global organizations. On the 31st of January, 2024, the event will take place at the Hotel Birger Jarl in Stockholm, Sweden, and will utilize a hybrid format with both online and in-person participation.

Nordic IT Security Event

May 23, 2024 | Sweden

The most reputable cyber security summit in Scandinavia, Nordic IT Security, has been around for 17 years acting as a steering wheel for navigation through the Nordic’s “cybersecurity watch-out” scheme. With its notable speakers and partners the summit provides a platform for seasoned industry professionals to come together and discuss business critical topics. Covering the latest cutting-edge technology the event is designed to secure all the aspects of the 21st century’s global communities challenges. Our research has shown that a great majority of businesses and companies across all industries are likely experiencing the same or similar pain points, so let’s all come together this May in Stockholm and discuss the root causes of these pain points and find the Best solutions.

Threat Management Practitioner MicroSummit

January 24, 2024 | UK

Attackers employ a variety of threats with the goal of deliberately infiltrating, disrupting, exposing, damaging or stealing from their intended targets. These cyberattacks come in many forms, understanding the various types of cyberthreats and how to properly defend against them is imperative for enabling secure and successful business growth. Following the success of our inaugural Practitioner MicroSummit in December we will be hosting our second event in January. Join us for an afternoon of technical insights where we will look at how the network, endpoint and cloud all provide the necessary information to effectively identify, protect, detect and respond to these threats and Unit 42 - our class-leading Threat Intelligence and consultancy services arm - will bring these data-points into line with the essential processes needed to effectively recover from an attack. Post Summit, join the team for an informal evening reception whilst admiring the best views of London on the 55th floor of our flagship London office at 22 Bishopsgate.

CyberSmart 2024: Cybersecurity Faces a Rapidly Changing Landscape

January 25, 2024 | USA

Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance, artificial intelligence is being incorporated into software, even as elected officials and regulatory agencies are trying to develop new rules of the road for its use. At the same time, historically-offline operations technology is beginning to be integrated with IT systems, opening up the OT to attacks that previously weren’t feasible.

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

resources