Go Back
United States Summit

The CISO Chapter North America

Chateau Elan, Braselton, GA

2 Days
-
Chataeu Elan

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director, Heads of

Agenda

Day 1

18:30 - 19:00
Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés

19:00 - 21:30
Gala Dinner

Enjoy a 3 course silver service dinner in the ballroom and hear from some special guest speakers

21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

07:30 - 08:30
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 09:15
Welcome Address

MOC

Opening Keynote with Q&A

Signature Sponsor

09:20 - 10:00
Advanced Threat Detection: Harnessing AI-Driven Solutions for Sophisticated Cybersecurity

Explore the transformative power of AI in advanced threat detection. You will learn how to implement AI-driven security solutions to identify and mitigate sophisticated threats, enhancing your organisation's security posture. The session will cover practical strategies, real-world case studies, and the latest advancements in AI technologies tailored for cybersecurity applications.

Key Takeaways:

  • Understand how AI can enhance threat detection capabilities and improve incident response times.
  • Learn best practices for integrating AI-driven solutions into existing security frameworks for maximum effectiveness.
09:20 - 10:00
Zero Trust Architecture: A CISO's Imperative for Enhanced Data Protection

In an era of escalating cyber threats, adopting a Zero Trust Architecture is essential for CISOs to strengthen data protection and mitigate risks. This workshop will delve into the principles of Zero Trust, emphasising the importance of identity verification, least privilege access, and continuous monitoring. Participants will learn how to implement a Zero Trust model effectively, ensuring robust security in an increasingly complex digital landscape.

Key Takeaways:

  • Gain insights into the core principles of Zero Trust and their impact on organisational security.
  • Learn actionable strategies for implementing Zero Trust Architecture to enhance data protection and risk management.
09:20 - 10:00
Enhancing Cloud Security: Strengthening Security in Multi-Cloud Environments

As organisations increasingly adopt multi-cloud strategies, robust security measures become essential to protect sensitive data across diverse platforms. This workshop will explore the unique challenges of securing multi-cloud environments and provide practical strategies for implementing effective security protocols. Participants will learn about best practices for data protection, identity management, and compliance across different cloud services.

Key Takeaways:

  • Identify key security challenges and risks associated with multi-cloud environments.
  • Develop actionable strategies to enhance data protection and compliance in a multi-cloud strategy.
09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:05 - 10:45
Demo / Innovation Sessions
10:45 - 11:00
Networking Break
11:00 - 11:40
Navigating Data Privacy Compliance: A CISO's Guide to Evolving Global Regulations

As data privacy regulations become increasingly complex and stringent worldwide, CISOs must prioritise compliance to protect sensitive information and mitigate risks. This workshop will examine the latest global regulations impacting data privacy, offering strategies for effective adaptation and compliance management. Participants will learn how to develop a robust data privacy framework that meets regulatory requirements while safeguarding organisational data.

Key Takeaways:

  • Understand the key global data privacy regulations and their implications for cybersecurity practices.
  • Gain practical insights on implementing a compliance framework that adapts to evolving regulatory landscapes.
11:00 - 11:40
Incident Response Planning: Building Robust Strategies for Effective Recovery

In today’s threat landscape, having a well-defined incident response plan is crucial for minimising damage and ensuring swift recovery from cyber incidents. This workshop will focus on the importance of developing and implementing robust incident response and recovery strategies. CISOs will learn how to identify potential threats, establish clear communication protocols, and create a response framework that enhances organisational resilience.

Key Takeaways:

  • Learn the key components of an effective incident response plan to mitigate risks and enhance recovery.
  • Explore best practices for testing and refining incident response strategies to ensure preparedness in the face of cyber threats.
11:00 - 11:40
Navigating Third-Party Risk Management: Evaluating Vendor and Partner Risks

As organisations increasingly rely on external vendors and partners, managing third-party risks has become a complex challenge. This workshop will delve into the intricacies of third-party risk management, providing participants with the tools and strategies to assess, monitor, and mitigate risks associated with their external relationships. Attendees will learn best practices for establishing a comprehensive risk evaluation framework that safeguards their organisation’s data and reputation.

Key Takeaways:

  • Understand the critical components of a robust third-party risk management strategy.
  • Learn effective techniques for ongoing risk assessment and monitoring of vendors and partners.
11:00 - 11:40
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:45 - 12:30
Panel Discussion

"Humanising Security: Navigating Burnout and the Evolving Role of the CISO."

Industry leading CISOs will discuss the importance of integrating the human element into cybersecurity strategies while addressing the growing issue of burnout among security teams. The panel will explore how to foster a supportive culture, prioritise mental health, and ensure that cybersecurity initiatives engage employees effectively, ultimately strengthening the organisation’s overall security posture.

12:30 - 13:30
Lunch
13:30 - 14:00
Keynote with Q&A - Platinum Sponsor
14:05 - 14:45
Empowering Employees: The CISO’s Role in Cybersecurity Training

In a landscape where cyber threats are ever-evolving, fostering a culture of cybersecurity awareness is essential. This workshop will equip CISOs with the strategies to lead effective employee training programs that enhance awareness and prepare teams to recognise and respond to security threats. Participants will explore best practices for designing engaging training modules and fostering a proactive security mindset across the organisation.

Key Takeaways:

  • Discover effective techniques for developing impactful cybersecurity awareness training programs.
  • Learn how to measure training effectiveness and ensure continuous improvement in employee engagement with security practices.
14:05 - 14:45
Strengthening Identity and Access Management (IAM): Best Practices for Enhanced User Control

As organisations grapple with increasing cybersecurity threats, strengthening Identity and Access Management (IAM) frameworks is essential for controlling user access effectively. This workshop will explore the key components of robust IAM systems, including authentication, authorisation, and user lifecycle management. Participants will learn practical strategies for implementing IAM solutions that enhance security, streamline access control, and comply with regulatory requirements.

Key Takeaways:

  • Understand the core principles of IAM and their role in securing user access.
  • Discover best practices for deploying and managing IAM frameworks to mitigate security risks.
14:05 - 14:45
Operational Technology Security: Bridging IT and OT for Comprehensive Cyber Defence

As the convergence of Information Technology (IT) and Operational Technology (OT) accelerates, securing these integrated systems is critical for maintaining operational integrity and safety. Explore the unique security challenges associated with OT and provide strategies for CISOs to effectively protect these environments. Participants will learn how to assess vulnerabilities, implement security protocols, and foster collaboration between IT and OT teams to create a cohesive security strategy.

Key Takeaways:

  • Identify the specific security risks associated with integrating IT and OT systems.
  • Learn best practices for developing a comprehensive security strategy that encompasses both environments.
14:05 - 14:45
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:50 - 15:30
Demo / Innovation Sessions
15:30 - 15:45
Networking Break
15:45 - 16:25
Supply Chain Security: Mitigating Vulnerabilities in Today’s Ecosystem

As organisations increasingly rely on complex supply chains, safeguarding against vulnerabilities is more critical than ever. CISOs need to address the unique security challenges faced in supply chain management and have effective strategies for identifying, assessing, and mitigating risks. Attendees will learn how to strengthen their security posture by collaborating with suppliers, implementing best practices, and leveraging technology to enhance supply chain resilience.

Key Takeaways:

  • Understand the key vulnerabilities within supply chains and their potential impact on organisational security.
  • Learn actionable strategies for creating a secure supply chain framework that protects against evolving threats.
15:45 - 16:25
Automation in Security Operations: Enhancing Efficiency and Responsiveness

In the fast-paced world of cybersecurity, automation has become essential for improving efficiency and responsiveness in security operations. This workshop will explore how organisations can leverage automation tools to streamline incident response, reduce manual workloads, and enhance overall security posture. Participants will gain insights into practical applications of automation in threat detection, monitoring, and remediation, enabling them to respond more effectively to emerging threats.

Key Takeaways:

  • Discover key automation tools and techniques that can enhance security operations and reduce response times.
  • Learn how to implement automation strategies that improve efficiency and bolster your organisation’s cybersecurity defences.
15:45 - 16:25
Fighting for Funding: The CISO’s Challenge in Budget Allocation for Cybersecurity

In an era of increasing cyber threats, securing adequate funding for cybersecurity initiatives is critical for CISOs. This workshop will explore the challenges of advocating for budget allocation, including the need to demonstrate the return on investment (ROI) of cybersecurity measures. Participants will learn effective strategies for communicating the importance of cybersecurity to stakeholders and how to align funding requests with organisational goals.

Key Takeaways:

  • Understand how to articulate the value of cybersecurity investments to secure necessary funding.
  • Explore strategies for building a compelling case for budget allocation that aligns with business objectives.
15:45 - 16:25
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
16:30 - 16:45
Closing Remarks
16:45 - 17:30
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.