DRAFT AGENDA

No results

Monday 3 | 11

Grande Bretagne Hotel, BallroomMon 3 | 11


          As global tensions rise, the critical link between geopolitics and cybersecurity is reshaping the threat landscape, fueling sophisticated state-sponsored attacks, supply chain vulnerabilities, and cyber warfare. Organizations must adapt strategies, build resilience, and enhance defenses to counter these globally-driven cyber risks. 


            Deploying AI enterprise-wide demands a strategic, meticulous approach. It's about designing robust systems that seamlessly integrate AI applications into existing infrastructure, ensuring data quality and accessibility. Crucially, this includes establishing stringent security measures to protect sensitive information and prevent misuse. The ultimate goal is a secure, scalable framework that drives significant business outcomes, from boosting efficiency to fostering innovation across all departments. 


              It highlights the proactive measures needed to build robust and adaptable systems capable of withstanding the constant onslaught of cyberattacks, which range from espionage to outright sabotage. The title underscores that securing these essential grids isn't just a technical challenge, but a fundamental requirement for ensuring Europe's stability and continuous operation in an increasingly digital and volatile world. 


                Achieving NIS2 compliance requires concrete technical implementation and operational strategies. This means applying practical cybersecurity measures, configuring systems securely, and establishing robust procedures across areas like incident response, vulnerability management, and supply chain security. The goal is to not only meet regulatory mandates but also significantly strengthen overall organizational cybersecurity.


                  Under the NIS2 Directive, enhancing critical infrastructure's resilience against cyber threats is paramount. This involves Cyber Resilience Testing, a method for actively evaluating an organization's ability to withstand, adapt to, and recover from cyberattacks while maintaining essential services. ENISA's new Cyber Stress Testing handbook provides practical guidance for organizations and national authorities to rigorously conduct these tests, systematically identifying vulnerabilities and improving defenses to meet NIS2 requirements and secure vital European energy grids.


                        Cybersecurity practitioners know the threat landscape. However, if there's a successful attack on a system, does the insurance policy cover the damage? A panel of insurance and legal experts will break down what to expect in the underwriting process, coverages, claims trends, and regulatory, litigation, and legislative developments during the past year. 


                          From technical guardian to strategic business leader. Unpack the shifting priorities every CISO should focus on today: from aligning with business goals and managing third-party risk, to championing a strong security culture and navigating AI and regulatory change. Lead with influence, resilience, and vision.


                            In the financial sector, where trust and security are paramount, an effective Identity and Access Management (IAM) strategy is the bedrock of a robust security posture. It's crucial for verifying every individual who accesses for example bank systems, from employees to third-party partners. By strictly adhering to the principle of least privilege, we have to ensure that each person only has access to the applications and data essential for their role, which drastically reduces the risk of internal fraud and data breaches. Continuous monitoring and auditing of all access to financial systems are also non-negotiable, as this allows you to quickly detect and investigate suspicious activity. Ultimately, a strong IAM program is your first line of defence against cyber threats, helping you maintain regulatory compliance and build unwavering trust with your customers. 


                              The maritime transport sector stands as an indispensable pillar of global supply chains, rendering the industry a prime target for sophisticated cyber threats originating from both criminal enterprises and state-sponsored entities. As modern vessels integrate increasingly advanced Operational Technology (OT) and Information Technology (IT) systems, their heightened interconnectivity significantly amplifies the potential ramifications of a successful cyber incident.