Keynote Stage

  • Keynote Stage 

    In association with content partner Infosecurity Magazine and sponsor Anomali, the Keynote Stage will bring together CISOs, policy-makers, analysts academics and thought-leaders to share practical insight into how to overcome the latest challenges in information security.  

    View the full program

     

    Confirmed speakers to date include:

    • Jim Routh, CSO, Aetna
    • Dr Flavio Villanustre, VP, Technology & CISO, LexisNexis Risk Solutions
    • Michael Yamamoto, CISO, Beth Israel Deaconess Medical Center
    • Kevin Powers, Director, Masters of Science in Cybersecurity Policy & Governance Program, Boston College
    • Matt McKeever, CISO, LexisNexis Legal and Professional
    • Bill Hill, CISO, MITRE Corporation
    • Alex Cunningham, CISO, Commonwealth Financial Network
    • Phillip Miller, Head of Infrastructure & CISO, Brooks Brothers
    • Christian Hamer, CISO, Harvard University
    • Lance Spitzner, Director, SANS Securing the Human, SANS
    • Jigar Kadakia, Chief Information Security and Privacy Officer, Partners HealthCare
    • Esmond Kane, Deputy CISO, Partners Healthcare
    • Doug Domin, Special Agent, Federal Bureau of Investigation
    • Simon Taylor, President & CSO, Comtrade Software
    • Scott T. Lashway, Partner, Holland & Knight
    • Lauren Claypoo, Director of Professional Services, Alta Associates
    • Derek Brink, VP, Research Fellow, Aberdeen Group
  • Securing the Human Factor

    Wednesday 4th October, 2017 – 8.30am-12.30pm

    Topics to be addressed include:

    • Psychologist Insight: Getting to Grips with the Psychology of User Behaviour
    • From Cyber Threat to Cyber Ally: How to Build, Implement & Measure an Information Security Awareness Program to Drive Smart Secure Behavior
    • Hacking Humans: Dissecting a Social Engineering Attack
    • Mitigating the Insider Threat: Closing Down the Human Attack Vector
    • Building a Next-Gen Security Team in a Red Hot Cyber Job Market

    Privacy, Security, Governance & Risk

    Wednesday 4th October, 2017 – 1.30pm-5.30pm

    Topics to be addressed include:

    • Integrating EU GDPR into Your Organization’s Risk Framework to Enable Cross Border Business, Boost Security & Achieve Compliance
    • Protecting Your Organizations’s Sensitive Data: Gaining Visibility of Critical Data Assets to Manage Information Risk
    • HIPAA, Patients & Privacy: Managing Privacy & Security for Digital Health
    • Having the Risk Conversation with Senior Execs: Demonstrating the Impact of Good Security on the Bottom Line
  • Ten Steps to a Strong Cybersecurity Program - Combatting Cyber Risks & Threats

    Thursday 5th October, 2017 – 8.30am-12.30pm

    Topics to be addressed include:

      • Profiling the Agile Cyber Adversary
      • Do You Really Know Who is in Your Supply Chain? - Managing 3rd Party Risk
      • Countering Ransomware: Attack Analysis & Lessons Learned
      • What does Blockchain Mean for Cybersecurity?
      • Hacking the IoT: Driving Security When Everything is Connected
      • Managing & Mitigating Risks & Threats in the Digital Enterprise

    Building Cyber Response & Resilience

    Thursday 5th October, 2017 – 1.30pm-5.30pm

    Topics to be addressed include:

      • SOC 2.0: Developing a Next-Gen SOC Capability to Detect & Respond
      • Lessons in Resilience from Critical Infrastructure
      • Cutting Through the Noise: Translating Threat Intelligence into Action
      • Harnessing the Potential of Disruptive Technologies for Effective Incident Response
      • Building a Roadmap for an Enterprise-wide Cyber Incident Response Capability
  • Register

    Don't miss out - secure your Keynote Pass for the modules of your choice. Register today

    Interested in speaking?

    Enquire with us about speaking opportunities. Contact us

    What else is on?

    Find out what else will be happening at the show. See more

Media Partners

EC-Council Infosecurity Magazine

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.